04. National/Global Security State, NSA and CIA | Global Power Structure | Sovereign’s Handbook

By Johnny Liberty

Establishing the National/Global Security State

The Central Intelligence Agency (CIA) was legislated into existence via the National Security Act (1947) with limited statutory authority.  It originally required that any covert action taken by the CIA must be authorized by the National Security Council. Countless times since its inception, the CIA has exceeded its congressional and constitutional authority.

After World War II, many former Nazi intelligence officers were brought to the United States and placed into various intelligence agencies, including the Office of Naval Intelligence and the CIA.  Having infiltrated many key positions in government agencies and private enterprises with people loyal to various CIA hierarchies, the CIA is a central hub of the actual United States Power structure.

Wiretapping & Due Process of Law

Originally, the National Security Agency (NSA) provided for checks and balances that have become meaningless today. The CIA has taken on functions never intended by the NSA, and has too often breeched its congressional mandate and authority. 

Though authorized only to operate outside of the “United States”, the CIA has been, and is today, involved in domestic affairs within the “United States”, and orchestrating media propaganda campaigns both domestically and abroad through the propaganda, mainstream media which they control. 

The National Security Agency (NSA) monitors phone calls between the United States and foreign nations. With revelations from Edward Snowden in 2013, we discovered that the NSA is prying and spying into every phone conversation on every smart phone in the united states of America. Snowden disclosed to the mainstream media and made public blatant violations of the law by the NSA. His punishment was to become an international scapegoat presently in exile in the country of Russia.

National Security Directives (NSD) issued by the NSA do not have to be reported, reviewed, made available to anyone or even acknowledged that they exist. These NSDs are further evidence of the existence of Power structures operating behind the scenes of de facto government.

The Computer Matching and Privacy Act gives the U.S. government absolute authority and discretion to wiretap phones and plant bugs in homes and businesses without the knowledge or consent of those being monitored.

The Digital Telephony Bill (HR 4922)(i.e. CALEA), passed by the House (Oct. 5, 1994), created and funded a national system for the interception of digital and other communications. It allows the easy isolation of individual communications for government wiretapping purposes, pursuant to a court order or other lawful authorization. 

Telephone corporations that do not comply or assist the government have been shut down. Computer chips are installed in all electronic devices including computers and cell phones so that the government can ceaselessly monitor each Citizens communications remotely.

“A revolutionary change, permits law enforcement agencies to pass around investigative information, much of it rumor and gossip, over a national computer system run by Big Brother.”
~ Representative Don Edwards (D-CA)

Undaunted by the public outcry against its maligned Clipper Chip, the NSA has developed the Fortezza Card. This technology encrypts data under the cloak of privacy, but retains a “back door” for government agents who believe they have the right to snoop into your private affairs. 

The NSA remains persistent in its efforts at cyber-spying and tightening its grip on the free enterprise, free expression of the Internet despite initial opposition by Silicon Valley executives. Today, Big Tech and social media companies are step-by-step in alignment with the government’s snooping, spying and censorship agenda.

The Federal Register contained a lengthy, detailed “notice of the maximum capacity required to accommodate all of the communication interceptions, pen registers, and trap and trace devices that the Attorney General estimates the government agencies authorized to conduct electronic surveillance may conduct and use simultaneously by 1998.”

Former FBI Director, Louis Freeh revealed that “Each telecommunications carrier must ensure that it can expeditiously increase its capacity to meet the assistance capability requirements [for] interceptions equal to 1% of the engineered capacity of the equipment, facilities or services that provide a [wired or wireless telecommunications] customer or subscriber with the ability to originate, terminate, or direct communications.”

More and more efforts to legislate and institutionalize welfare IDs, driver license and passport IDs, national IDs, digital banking IDs, travel IDs, vaccination IDs, forced implantation of biochips, contact tracing, and other forms of tracking and surveillance systems are rapidly becoming integrated into every aspect of modern life especially since the COVID-19 “plandemic”.

Executive Orders and CIA

Executive Orders (EOs) can be invoked in secret by the U.S. President. Secret government legislating in secret are evidence of the existence of United States Power structures operating behind the scenes of the de facto government. 

After U.S. President Jimmy Carter ordered the disbanding of the CIA’s covert operations in the 1970s, the CIA went deeper underground until U.S. President Ronald Reagan restored its covert operations. Covert operations and black budgets are evidence of the existence of Power structures operating behind the scenes of de facto government.

Three factions in the CIA are competing with each other. Faction One is controlled by the Department of Justice (DOJ) and the White House. Faction Two is controlled by the Office of Naval Intelligence (ONI), and is often at odds with Faction One. Faction Three is a small number of former Office of Strategic Services (OSS) personnel who answer to no one.

Today, the CIA has become so powerful that it can destroy any politician who seriously questions its activities. The CIA meddles in elections both abroad and domestically. The CIA conspires with underworld figures and organizations including the Mafia to carry out all sorts of criminal activities both abroad and in the united states of America. The CIA creates wars to serve the agencies interests, creates enemies such as ISIS, and even fights wars against the United States military, such as in Syria. The  United States military machine has killed more than 20 million people in 37 nations since World War II.

In 1953, U.S. President Dwight Eisenhower warned the American people of the dangers imposed by the military-industrial complex, which included the CIA.

“The National Security State uses Fascism to protect capitalism
while they say they’re protecting democracy from Communism.”
~ Michael Parenti

Mind Control and the Global Manipulators 

A notorious center of “mind control” and time travel research on the eastern end of Long Island, New York is The Montauk Project. Preston Nichols discovered a blocking frequency that was jamming the minds of psychics he was working with.

A blocking frequency was installed around the Earth to disconnect humanity from other dimensions, similar to being an astronaut on the moon being cut off from Mission Control. “Like radio or television waves broadcasted from a transmitter and decoded by a radio or television set, the human mind decodes thought-waves broadcast by the universe. Some people have their sets tuned for other frequencies and dimensions and are considered talented psychics or clairvoyants. These are talents once common to the entire human species that have been blocked, jammed or programmed out of us by the global manipulators.”

The CIA, and other intelligence communities, have long engaged in mind control”experiments – LSD and psychedelic experiments in the 1960s; HAARP engaged in weather control and blasting human population centers with Electromagnetic Radiation (EMFs); and training assassins for their political dirty work.

“For some time I have been disturbed 
by the way the CIA has been diverted 
from its original assignment.

The CIA has become an operational
and at times a policy-making
arm of the government…”

~ President Harry Truman (1963)

Facebook as CIA Data Mining Operation

Meta, originally called Facebook, was established by the Central Intelligence Agency (CIA) under the leadership of Mark Zuckerberg, who is coincidentally, a Rockefeller.  

Facebook was founded to operate as a “data mining” organization so as to collect as much information on as many people as possible to control human populations and selectively direct the flow of information. Facebook has very close ties to the Defense Advanced Research Projects Agency (DARPA).

From a national security standpoint, DARPA’s purpose is to find out lots of things about lots of people. Where they are going? What they are doing? What airlines are they using? Who do they associate with? Which types of online books and films do they read or watch? How do they think and feel politically? The list goes on. If you simply follow the money, it is quite easy to see what is happening behind the scenes of this sinister social media network. 

Facebook, the identifying book of faces, is a perfect technological partner to the CIA’s playbook of surveillance, propaganda and media manipulation.

Secret Directives Behind Airport I.D. Checks

Reporters or attorneys who follow federal FOIA requests may be interested in recent efforts by privacy advocates to get the government to release a secret directive that the airlines rely on as the basis for demanding that passengers show an official photo ID before boarding their flight. 

Some privacy advocates consider the photo ID requirement on domestic flights an unnecessary intrusion into the passenger’s privacy, since the metal detectors and luggage screening equipment that is already in place is sufficient to ensure the security of air travel without violating privacy rights.

While airline officials blame the Federal Aviation Administration (FAA) for the photo ID requirement, the FAA refuses to make public the secret directive the airlines say they are implementing. This, of course, raises questions as to why the directive itself is a secret. From the passenger’s perspective, the airlines are saying “the FAA makes us do it”, but the FAA says “no” when asked to produce the document that the airlines claim requires them to ask for photo ID.

“Privacy attorneys Robert Ellis Smith and Lee Tien have filed separate FOIA requests to obtain the FAA directive. Both FOIA requests were rejected, and Smith and Tien are doing more legal research to determine if there is sufficient grounds for a lawsuit. Meanwhile, passengers who refuse to show a photo ID, have in a few cases been prevented from boarding, subjected to abuse by airline officials, or treated with suspicion for exercising their Constitutional right to privacy.  Even more confusing, some passengers are not being asked for ID prior to boarding.”

Department of Homeland Security (DHS) and Transportation Security Administration (TSA)

Customs agents routinely search passengers leaving the country for smuggled items, including excess cash. Foreign mail is opened. Bank tellers are being ordered by their employers to report suspicious transactions. The U.S. government can use your household or office garbage to incriminate you, including medical records,  psychiatrist’s records, personal journals, or your attorney’s private notes?

In the wake of events of September 11, or September 11, 2001 (911), the “national security” system was reorganized, integrated and expanded. In October 2001, the Department of Homeland Security (DHS) was established within the Executive Office of the U.S. President. Due to pressure from the U.S. Congress, however, the original office became a cabinet department in 2003. 

The Department of Homeland Security (DHS) integrated 22 federal agencies, including the Federal Emergency Management Agency (FEMA), U.S. Coast Guard, U.S. Customs Service, and U.S. Secret Service under one department. Agencies created specifically in response to 911 were transferred to another new department; the Transportation Security Administration (TSA) is but one example.

References:

  1. Wikipedia | National Security Act.
  2. Connie Chung, Eye to Eye (television program) June 17, 1993 (drug trafficking into the US in military aircraft); 60 Minutes, November 21, 1993 (filmed several DEA officials and agents describing smuggling of large quantities of cocaine by the CIA into the US); Associated Press, May 3, 1993 (reported cooperation by U.S. Customs agents in drug trafficking); Clinton Chronicles (video portraying Clintons political machine and the financial involvement in drug money laundering and a blind eye turned to Mena, Arkansas); Spider’s Web by Alan Friedman; Compromised by Terry Reed and John Cummings; The Mafia and the CIA and George Bush  by Pete Brewton;  Deep Politics by  Peter Dale Scott; Defrauding America by Rodney Stitch (1994),  pp.199, 293, 327.
  3. Liberty International and The Guardian | With the latest WikiLeaks revelations about the CIA, is privacy really dead?
  4. Computer Matching and Privacy Act of 1988.
  5. Wikipedia | Communications Assistance for Law Enforcement Act; Digital Telephony Bill (H.R. 4922) (aka CALEA) passed on Oct. 5, 1994 sourced from Perceptions Magazine, May/June 1995, p.80;  See also Technology and Liberty: Police State Plans by Clark Matthews, The Spotlight, February 28, 1994, p.6.
  6. Quote by Don Edwards on “big brother”.
  7. Wikipedia | Fortezza; Everyone will have a Fortezza card to encrypt or de-encrypt DMS messages. Each command will have a number of Fortezza cards to be placed at the entrance to the command for organizational DMS messages.
  8. Federal Register, Doc. 95-25562, October 13, 1995.
  9. Wikipedia | Quote by Louis Freech.
  10. Wikipedia | National Security Directive (NSD); Behold A Pale Horse by William Cooper.
  11. National Security Directives are not published anywhere; Defrauding Americaby Rodney Stitch (1994), p.346 (full text of a standard CIA secrecy agreement) and p.346 (portions of the National Security Act);  What Uncle Sam Really Wants by Noam Chomsky, Odonian Press, pp.8-10 (National Security Council Memorandum 68 (1950) written by Dean Acheson, Paul Nitze and Policy Planning Study 23 written by George Kennan were the implementing policies for Soviet-American foreign policy which perpetuated the arms race and the eventual bankruptcy of both countries); The National Security State by Gore Vidal, Organica, Autumn 1993, p.4 (on the American empire).
  12. Liberty International and Sputnik News | Former NSA Officer William Binney: CIA Lying About Russians Hacking the Democratic National Committee.
  13. Liberty International | Putin: Who Created ISIS?; Liberty International and AWD News | Assange released 500,000 diplomatic cables which reveals how the CIA created ISIS; If you ever wondered why Western governments hate Julian Assange so much and are willing to torture him to death in prison without trial, it’s because he has exposed the deep cover game; Liberty International | CIA Must Stop Illegal, Counterproductive War to Overthrow Assad; Liberty International and ZeroHedge | Pentagon At War With CIA In Syria; Liberty International and Global Research | US Has Killed More Than 20 Million People in 37 “Victim Nations” Since World War II; Liberty International and Newsweek | U.S. has spent six trillion dollars on wars that killed half a million people since 9/11.
  14. National Security Agency (NSA), Central Intelligence Agency (CIA) and Computer Matching and Privacy Act. Sourced from L. Fletcher Prouty who is supposedly the deep cover CIA operative that was portrayed in Oliver Stones movie JFK.
  15. Wikipedia | Michael Parenti; Wikiquotes | Quote sourced from Michael Parenti.
  16. Wikipedia | The Montauk Project; Regarding CIA experimentation and using the public as guinea pigs, see also the article Microwave Harassment and Mine-Control Experimentation by Julianne McKinney, Electronic Surveillance Project, Association of National Security Alumni.
  17. Quote by U.S. President Harry Truman; Washington Post, Dec. 21, 1963.
  18. Wikipedia | Defense Advanced Research Projects Agency.
  19. The Real News | Facebook and its Connections to the CIA and DAARPA by Brian S. Staveley. 
  20. New York Sun | Legality of Airport ID Checks Probed
  21. Wikipedia | Department of Homeland Security (2001) www.dhs.gov

Source: Sovereign’s Handbook by Johnny Liberty (30th Anniversary Edition), Volume 1 of 3, p.159 – 164

ORDER YOUR LIBERTY BOOKS TODAY!

Sovereign’s Handbook by Johnny Liberty 
(30th Anniversary Edition)
(3-Volume Printed, Bound Book or PDF)

A three-volume, 750+ page tome with an extensive update of the renowned underground classic ~ the Global Sovereign’s Handbook. Still after all these years, this is the most comprehensive book on sovereignty, economics, law, power structures and history ever written. Served as the primary research behind the best-selling Global One Audio Course.Available Now!

$99.95 ~ THREE-VOLUME PRINT SERIES
$33.33 ~ THREE-VOLUME EBOOK

Dawning of the Corona Age: Navigating the Pandemic by Johnny Freedom 
(3rd Edition)
(Printed, Bound Book or PDF)

This comprehensive book, goes far beyond the immediate impact of the “pandemic”, but, along with the reader, imagines how our human world may be altered, both positively and negatively, long into an uncertain future. Available Now!

$25.00 ~ PRINT BOOK
$10.00 ~ EBOOK

01. An Independent Press | Reclaiming the Sovereign Mind | Sovereign’s Handbook

By Johnny Liberty

There is no doubt that the legacy news media are no longer reliable sources of solid facts, valid truth and honest opinion. Fortunately, there are now thousands of alternative sources from across the political spectrum. 

Likely, there is a 5% fact base in the legacy news media upon which rests propaganda, advertising, hype, entertainment, spin, corporate and U.S. government narratives intended to distract or misinform us from what is actually going on in our world today. 

Enjoying the Evening Snooze

The legacy news media is spoon-fed a daily dose of snooze via editorial boards, intelligence agencies, public relations departments and advertisers whereas the alternative press is reporting either a counterpoint or a reaction/response to the news of the day.

May we begin to think for ourselves, do our own research, come to our own conclusions and “detox” our minds from the evening snooze. May we learn to either “fast” or boycott both the legacy and alternative press and consider this maxim – “no garbage in, no garbage out”. 

The Global and American Power structures control all major television/cable networks, public broadcasting and major cable/satellite networks. Six corporations not only own, but control thousands of channels with a relatively consistent liberal bias and mainstream narrative. 

The same six corporations control major radio stations, magazines and newspaper chains. Most Americans get a majority of their news, information, opinions and political world view from the same legacy news sources, and now more than ever, from the internet and social media which are revolutionizing the way news is delivered.

What passes off as “news” these days is quite appalling to anyone with a modicum of intelligence and an insult to those who do not have the capacity to distinguish news from entertainment, fact from fiction or what constitutes propaganda and disinformation. 

Too many reporters, journalists and editors are busy snooping into the private lives of public officials and celebrities to actually accomplish any investigative journalism into the real issues of the day. Real journalism is an endangered species. Few have allocated the budgets necessary for independent reporting and investigative journalism as they did in the glory days of great reporters such as Walter Cronkite.

Stealing Attention from the Real Issues

In the early decades of the 21st Century there are serious concerns that deserve more attention than the sex lives of high-profile politicians or some popular celebrity’s most recent scandal. Irrelevant media spin keeps us distracted from real issues and concerns.

 Much of the legacy news media and the internet follows the path of the tabloids (e.g., National Enquirer), focuses public attention on non-issues and directs the political agenda towards the desired goals of the global elite. 

Much of the alternative independent press is busy reacting to whatever the legacy media is reporting to notice what’s really going on behind the scenes and take initiative in digging for the real news. This is changing.

FAKE NEWS = PROPAGANDA

Investigative Journalism & Whistleblowing

Investigative reporting and whistleblowing is difficult and often dangerous for a reporter if you want to keep your job and protect yourself from prosecution. 

Since September 11, 2001, “homeland security” and the resulting over-hyped war on terror, the U.S. government has used “national security” as an excuse for censorship and suppression of the free press.

Reporters whistleblowers and independent journalists (e.g., Julian Assange, Bradley Manning, Edward Snowden) have faced prosecution, torture or persecution for shedding the light on controversial topics such as the U.S. State Department or the shadowy business dealings of powerful politicians.

Maintaining an independent, free press is absolutely essential to the continued existence of a healthy constitutional republic. Whistleblowers,  reporters, editors and their sources should be protected by law not prosecuted for doing their job.

A whistleblower is a person who exposes any kind of information or activity that is deemed illegal, unethical, or incorrect within an organization that is either private or public. The Whistleblower Protection Act was passed in 1989. It supposedly protects federal whistleblowers who work for the government and report the possible existence of any activity constituting a violation of laws or rules.

Media Spin. Propaganda & Government Public Policy

Spin doctors, image-makers, and propagandists are key policymaking posts in any government or corporate public relations department. So how is the news engineered and manufactured to justify and then create public policy? 

Spin doctors, and those behind the scenes directing them, create public policy based on public opinion and what the public will accept. Legislators follow by writing statutes which are passed and enforced by the Executive Branch. Lawmakers and politicians don not lead, they follow public opinion often directed by corporate media.

Public policy is shaped by the “image of the issue”, not the “reality of the issue”. Public policy will become what the policy should appear like, not what addresses the issue at hand or solves the problem.

Corporate media may go as far as to manufacture or fabricate the news to suit their own political agenda. Watch the films, Wag the Dog with Dustin Hoffman and Manufacturing Consent by Noam Chomsky. These are shocking realities too true to ignore.

“Freedom of speech is a principal pillar of a free government; when this support is taken away, the constitution of a free society is dissolved, and tyranny is erected on its ruins.” ~ Benjamin Franklin

The government, or shadow partnerships within government, may go as far as to engineer a catastrophe or “false flag” operation to justify legislation to further their political agendas (e.g., Waco, Oklahoma City Bombing, 911, George Floyd). A “false flag” operation is an event created by a secret cabal or “deep state” operative within a nation, then blamed on another nation, group or individual to justify an already planned response.

“…It is not by any commission from the supreme executive council, who might previously judge of the abilities, integrity, knowledge, etc., of the person to be appointed to this great trust, of deciding upon the character and good fame of the citizens; for this court is above that council, and may accuse, judge, and condemn it at pleasure. Nor is it hereditary, as in the court of dernier resort in the peerage of England. But any man who can procure pen, ink, and paper, with a press, a few types, and a huge pair of blacking balls may commissionate himself; and his court is immediately
established in the plenary possession and exercise of its rights. 

For if you make the least complaint of the judge’s conduct, he dabs his blacking balls in your face wherever he meets you; and, besides tearing your private character to flitters, marks you out for the odium of the public, as an enemy to the liberty of the press.” ~ Benjamin Franklin

Abandoning the Ship of Freedom

An “independent” press is supposed to be the guardians of “liberty”, but have far too often abandoned the ship of freedom instead. Much of journalism has deteriorated into slick entertainment and sensationalism, even by the old vanguards of the media industry. 

Too often journalists, reporters and anchormen fan the flames of discontent by focusing the news on crime, violence, racism, sexism and government disinformation into their commentary. The New York Times, CNN, MSNBC, NBC, Washington Post are infamous for fanning the flames of political division and polarization in America. Many others in the alternative media have followed suit.

From the vantage point of this author, responsible citizenship is not meant to be a spectator sport orchestrated by the media and the government. Real issues must never be confused with “entertainment”. Real news is rarely what the media is directing your attention towards. Can you tell the difference between news and entertainment? If not, we are all in terrible trouble.

Since the advent of social media over less than twenty years ago the domain of legacy media and independent press has changed forever in both form and delivery.

  • Facebook (2004)(2.89b users), WhatsApp (2009), Messenger (2010), Instagram (2012)(1.5b users) 
  • YouTube (2005)(2.3b viewers)
  • LinkedIn (2003)(774m users)
  • Telegram (2013)(550m users)
  • X (Formerly Twitter) (2006)(400m users)
  • Rumble (2013)(321m users)
  • Signal (2018)(40m users)
  • Parler (2018)(2.5m users)
  • Gab (2016)(1.2m users)
  • WordPress (2003)(800k websites)
  • Delicious (2003), Pinboard (2009)(25k users)

In the words of the comedian and radio announcer Scoop Nisker, “If you don’t like the news go out and make some of your own.”

Instead of a few monopoly players on the media board there are now tens of thousands of bloggers, networks, channels, aggregators and compilers of news available for those with the eyes to see and ears to hear. This is indeed good news for a change. 

With more players on the field, legacy media has suffered an extreme loss of viewers, readers and credibility to the extent that many of the old vanguards will either transform their business model or go out of business for good.

With the aid of social media and easy to create websites, We the People can become our own media, become citizen reporters and do our own diligence with the news. 

We the People still have the power to discern and decide what is fact vs fiction. and what is truth. It’s up to us to hold both the legacy media and alternative press accountable for what it reports or doesn’t report.

“There is no such thing…in America as an independent press. You know it, and I know it. There is not one of you (reporters) who dares to write your honest opinion, and if you did, you know
beforehand it would never appear in print. 

I am paid weekly to keep my honest opinion out of the paper. Others of you are paid similar salaries for similar things, and any of you who would be so foolish as to write honest opinions would be out on the streets looking for another job.”..

“The business of the journalist is to destroy the truth, to lie outright, to pervert, to vilify, to fawn at the feet of Mammon, and to sell his country and his race for his daily bread.You know it, and I know it, and what folly is this, toasting an independent press?

We are the tools and the vassals of rich men behind the scenes. We are the Jumping Jacks.
They pull the strings, and we dance.

Our talents, our possibilities and our lives are all the property of other men. We are intellectual prostitutes.” ~ John Swinden, Former Head of The New York Times

References:

  1. See APPENDIX I, II & III.
  2. Wikipedia | List of U.S. Over the Air Networks; Liberty International & Truthout | Twenty Years of Media Consolidation Has Not Been Good For Our Democracy by Bill Moyers.
  3. Exposing Truth | Six corporations include: Time Warner, The Walt Disney Corporation, Viacom, News Corporation, CBS Corporation, Comcast.
  4. Wikipedia | List of most popular websites include: Google, YouTube, Email, Baidu, Facebook, Tencent QQ, Sohu, Taobao, Haosou, Jingdong Mall, Yahoo, Amazon, Wikipedia, Sina Corp, Sina Weibo, Zoom.
  5. Statista | Most popular social networks including Facebook, YouTube, WhatsApp, Facebook Messenger, Weizin/WeChat, Instagram, Tik Tok, QQ, Sina Weibo, QZone; Statista | Most popular global mobile messenger apps (July 2020) including WhatsApp, Facebook Messenger, WeChat, QQ, Telegram, Snapchat; Revive.
  6. Wikipedia | Whistleblower; Wikipedia | Whistleblower protection; Wikipedia | Whistleblower Protection Act of 1989, 5 U.S.C., 2302(b)(8)-(9), Pub.L 1010-12 as amended; Liberty International & Columbia Journalism Review | Journalism’s Gates keepers.
  7. IMDB | Wag the Dog with Dustin Hoffman and Robert De Niro, Woody Harrelson and Willie Nelson A comic satire about the use and abuse of power in America; IMDB | Manufacturing Consent by Noam Chomsky; Liberty International & New Matilda | Inside The Invisible Government: John Pilger On War, Propaganda, Clinton And Trump; Liberty International & Counterpunch | The Weaponization of Social Media; Children’s Health Defense | White House Enlists Social Media Giants to Suppress Vaccine ‘Misinformation’. RT | Democrats claim censorship necessary to stop ‘fascism’, but they still serve militarism and corporatism, Glenn Greenwald says.
  8. Wikipedia | Benjamin Franklin; History Guy | Quote from Benjamin Franklin from On Freedom of Speech and the Press, Pennsylvania Gazette, November 17, 1737.
  9. Liberty International, Collective Evolution & Global Research | War Propaganda: “Fake News” and the Pentagon’s Office of Strategic Influence (OSI).
  10. Harrisburg | Court of the Popular Press by Benjamin Franklin; Teaching American History | An Account of the Supremest Court of Judicature in Pennsylvania, The Court of the Press, September 12, 1789.
  11. Wikipedia | Daniel Schorr; National Press Club | Phrases excerpted from the comments of Daniel Schorr at the National Press Club.
  12. Wikipedia | Wes Nisker, Author, Radio Commentator, Comedian and Buddhist meditation instructor; Quote from If You Don’t Like the News…Go Out and Make Some of Your Own (Ten Speed Press).
  13. National Press Club | John Swinden as the former head of The New York Times toasting the independent press at the National Press Club (1953); Author of The Occult Technology of Power.

Source: Sovereign’s Handbook by Johnny Liberty (30th Anniversary Edition), Volume 1 of 3, p.30- 34

ORDER YOUR LIBERTY BOOKS TODAY!

Sovereign’s Handbook by Johnny Liberty 
(30th Anniversary Edition)
(3-Volume Printed, Bound Book or PDF)

A three-volume, 750+ page tome with an extensive update of the renowned underground classic ~ the Global Sovereign’s Handbook. Still after all these years, this is the most comprehensive book on sovereignty, economics, law, power structures and history ever written. Served as the primary research behind the best-selling Global One Audio Course.Available Now!

$99.95 ~ THREE-VOLUME PRINT SERIES
$33.33 ~ THREE-VOLUME EBOOK

Dawning of the Corona Age: Navigating the Pandemic by Johnny Freedom 
(3rd Edition)
(Printed, Bound Book or PDF)

This comprehensive book, goes far beyond the immediate impact of the “pandemic”, but, along with the reader, imagines how our human world may be altered, both positively and negatively, long into an uncertain future. Available Now!

$25.00 ~ PRINT BOOK
$10.00 ~ EBOOK