How FISC-DOJ-CIA-FBI Secret Pedophile's Courts, Justice System, Government Works

1 year ago
5.93K

Government Surveillance Security v. Liberty v. Your Privacy Rights v. Body Count! Modern Surveillance Activities by the United States Government have taken place since World War 1 an 2 and continue to this day, especially in the aftermath of the September 11 attacks. Proponents of such efforts argue that un-lawful surveillance is necessary to protect national security and that the FISA-DOJ-CIA-FBI-NSA-DEA court system is designed to prevent abuses. Opponents argue that such surveillance rarely produces actionable intelligence and can be wielded by unaccountable bureaucrats at the expense of targeted individuals and groups.

How FISA-DOJ-CIA-FBI-NSA-DEA. Secret Pedophile's Motivation and Government Killing and Rape and Body Count for Top Government Misc. Jobs Initiations. Dirty Tricks Cops Use And Why They Use Them - This info. below describes some of the illegal tactics and questionable techniques police officers use to increase the chances of obtaining a conviction or to administer punishment to persons they perceive as having committed a crime. Police officers are outnumbered and restricted by legal mandates in their efforts to counter street-smart gangsters who can often afford highly skilled defense attorneys. Police officers often rationalize that they need an additional "edge" in their fight against crime. Thus, at times they break the rules and use illegal methods to obtain and increase evidence against a suspect they believe to be guilty of a crime. the use of "speed traps," the handling of suspects, search and seizure, the use of civil asset forfeiture and informers, the obtaining of confessions, the use of "alibi guns" when police kill a suspect, methods of obtaining evidence, the manipulation of evidence, entrapment, and proactive law enforcement. Some of the incidents described are the police planting of drugs on a private plane so it can be seized for police department use; the spraying of mace on a suspect's car seat, so that after a few minutes of driving he experiences excruciating pain on his crotch and buttocks; the use of a blank tape at an illegal interrogation, adding the reading of rights to the suspect later; the use of stun guns to torture suspects without leaving marks; vigilante cops conducting an "execution;" police instigation of gang wars to thin out gang members; and the adding of drugs to evidence so as to increase the charge from a misdemeanor to a felony. Other police practices discussed are the use of illegal wiretaps; the use of snitches; getting search warrants without probable cause; and keeping confiscated drugs, guns, and cash to pay for "Dirty FISA-DOJ-CIA-FBI-NSA-DEA Business.
we tackle the pressing issue of judicial corruption in the U.S. justice system—a system that isn't as ideal as we may think. Discover the shocking "kids for cash" scandal, financial ties between judges and companies, and statistics revealing widespread perceptions of corruption. Join us as we delve into cases of biased rulings, challenges in prosecuting corrupt judges, and systemic loopholes that enable misconduct. We explore the complexities of judicial oversight and the need for accountability in the quest for justice.

FBI Director announced that the bureau would recommend that charges not be filed in the probe into Clinton’s use of a private email system while heading the State Department. On Sept. 26, 2016, the FBI executed a search warrant on former Rep. Anthony Weiner’s iPhone, iPad and laptop computer, and discovered 141,000 emails on the laptop that were potentially relevant to the FBI’s closed investigation of Clinton. Within hours of the Sept. 26, 2016, search warrant, FBI technicians noticed there were 340,000 emails on the laptop between Clinton and her top aide, Weiner’s wife Huma Abedin — many of them from domain addresses such as “hillaryclinton.com” and “state.gov.” Documents belonging to former Hillary Clinton aide Huma Abedin that were discovered on her estranged husband Anthony Weiner’s personal computer during an FBI investigation were released Friday by the State Department, including five that were marked classified. FBI Director James Comey cited the emails recovered on Weiner’s laptop as the reason he reopened the investigation of Clinton’s mishandling of classified information 11 days before the November election. Report: Huma Abedin’s Emails On Weiner’s Laptop Were In a File Marked “My Life Insurance”

Federal Agents at the FBI have discovered 650,000 emails on Anthony Weiner’s laptop, reportedly hidden in a file marked “Life Insurance”… We reported earlier that Huma Abedin has been kicked off of Hillary’s “Stronger Together” Campaign Plane. Perhaps this is the reason? 10,000 new emails found on Huma Abedin and Anthony Weiner’s computer and phones. They were in a file marked “My Secret Pedophile's Life Insurance” - Source, New World Order with xxx and kids sexual pics and video's from Disney Pedophile's Branson Necker Island 40 Miles To Epstein Orgy Island Global Elite - https://rumble.com/v2dim5k-disney-pedophiles-branson-necker-island-40-miles-to-epstein-orgy-island-glo.html - In fact, the complaint argues that Epstein’s purchase of Great St James was simply a ruse to hide what was happening on Little St James. “The Epstein Enterprise purchased the island for more than $20 million because participants wanted to ensure that it did not become a base from which others could view their activities or visitors,” it says. “Epstein purchased these properties to further shield his conduct from view, prevent his detection by law enforcement or the public,
and allow him to continue and conceal his criminal enterprise.”

Deep State Pedophiles Exposed: Child Trafficking, Hollywood Pedophiles, Major Companies, Politicians, Vatican, Deep State Demons Mother of Darkness Witch Hillary Clinton, Huma, & Anthony Weiner Exposed Deep State Pedophiles have been in the underground news more now than ever, with researchers and truth seekers looking for answers. Child trafficking is deeply-embedded within Hollywood, CIA, politicians and famous people.

Perhaps you’ve heard of Pizzagate or Comet Ping Pong. The videos below tell the story on child trafficking by demonic predators. Isaac Kappy, actor, blew the whistle on Hollywood pedophiles and was suicided days later.

Pedophilia (alternatively spelt paedophilia) is a psychiatric disorder in which an adult or older adolescent experiences a primary or exclusive sexual attraction to prepubescent children.

There is so much info on Human Trafficking of children by Hollywood Pedophiles and politicians (Deep State) that it would take days to type all. I will let these videos speak for themselves. Some organizations involved in pedophilia and human trafficking are Puma, Nike, the Vatican and Disney, just to name a few. As always, it’s up to you to make your own decisions on Hollywood pedophiles, Child Trafficking and how the Deep State is involved.

Convicted sex offender Anthony Weiner, 55, 'is lobbying to be allowed inside his eight-year-old son's prestigious New York school causing panic among parents who have children the same age as the teen he sexted. Anthony Weiner has been lobbying to be allowed access to his son's school again, after he was blocked from the premises following his conviction for sexting a 15-year-old girl.

Pedophile and A Pizza Secret Human Trafficking and Child Sex Ring Evidence - https://rumble.com/v2bbfv2-pedophile-and-a-pizza-secret-human-trafficking-and-child-sex-ring-evidence-.html - Found nothing, yet this "fact" has been repeated in virtually every post about Pizzagate. What's the source? Of course it's possible that the only Pedophile using these words and their kid sex friends. It may be their own private language.

Podesta’s email account was hijacked and the hackers took his entire private library of emails. This sucked hard for Podesta because the hackers had tons of high ranking-sensitive information. From October through November 20,000+ pages of emails were uploaded to wiki-leaks.

Epstein Island Guestbook and Visitor List They Do Not Want You to See Ever - https://rumble.com/v293sb4-epstein-island-guestbook-and-visitor-list-they-do-not-want-you-to-see-ever-.html -

There our 1,000 a video's of drugs, rape, sex with kids, killings, etc. for every name on the listed at Epstein Island Visitor List, and Podesta’s and Anthony Weiner’s computer and 1,000 phones records. They were in a file marked “My Secret Pedophile's Life Insurance” Epstein island guests, jeffrey, epstein, lolita express, Epstein passenger list, pedophile island, sexual predators, perverts, Donald J. Trump, Bill Clinton, Kevin Spacey, Chris Tucker, Bill Gates, Prince Andrew, Robert F. Kennedy Jr, Prince Andrew, Bill Gates, Donald J. Trump, Bill Clinton, Kevin Spacey, Chris Tucker, Bill Gates, Prince Andrew, Robert F. Kennedy Jr, Chelsea Handler, Ben Affleck, Phil Collins, The Queen, Betty White, Violinist Itzhak Perlman, John Legend, Cher, Lady Gaga, Madonna, John Cusack, Jim Carrey, Tom Hanks, Oprah Winfrey, Steven Tyler, Richard Branson, Naomi Campbell, Charlie Sheen, Prince Philip, Ellen DeGeneres, Pharell Williams, Christy Teagan, Bill Clinton, Hillary Clinton, Jay Z, Beyonce Knowles, Eminem, Marshall Mathers, Alex Baldwin, Meryl Streep, Will Ferrell, Seth Green, Will Smith, Jada Pinkett Smith, Hollywood Celebrities, U.S. Sen. John Glenn, Former Senate majority leader George Mitchell, Quinton Terentino, Robert Downey Jr, Nadia Bjorlin, Catherine Hudson, Gwen Stefani, James DeFranco, Anderson Cooper, Demi Moore, Stephen Colbert, Wanda Sykes, Michelle Wolfe, Bill Murray, James Gunn, Kathy Griffin, Katy Perry, Brian Afleck, Etc.

John Paul Mac Isaac, the laptop repairman at the center of the Hunter Biden laptop saga, is still alive according to Sean Hannity. Robert Hunter Biden (born February 4, 1970) is an American attorney, businessman and artist who is the second son of U.S. President Joe Biden and his first wife Neilia Hunter Biden
How Hunter Biden became the unkempt man who left his laptop in a nondescript computer store in a Delaware shopping mall - and never returned Contained details of Hunter's drug and sex issues - $312,000 spent on adult site's between and hookers and sex workers and prostitutes. New laptop revelations: An IT expert last night described as a 'national security nightmare' and 'classic blackmail material' the revelation that Hunter Biden protected his laptop - which was filled with with a treasure trove of top-secret material - with a single, simple password: Hunter02. He is pictured with what appears to be sex an drug paraphernalia in his mouth A contact database of 1,500 people # on the laptop included the phone's numbers of Bill and Hillary Clinton, actress Gwyneth Paltrow, her ex-husband Coldplay singer Chris Martin, former Presidential candidate John Kerry and ex-FBI boss Louis Freeh. Unkempt and unshaven, the man stumbled into the nondescript computer store at a Delaware shopping mall.

Entering The Mac Shop carrying three water-damaged computers, he approached owner John Paul MacIsaac, who later claimed that he smelled alcohol on the customer's breath.

Mr MacIsaac was able to fix two of the machines, but the third was beyond repair. Then the customer gave his name: Hunter Biden.

The seemingly innocuous encounter on April 12, 2019, has now become a global news story reaching the White House via Silicon Valley and inhabited by a colourful cast of characters. As well as the albino shop owner, there's Donald Trump's personal lawyer Rudy Giuliani, a burly wrestler turned US Navy officer, a nerdy tech wizard and the President himself.

Mr MacIsaac, 44, completed a one-page form with Hunter's name, address and mobile phone details – all of which have been verified – and a bill for $85 due on completion of the work.

He told his customer he would need to copy the contents of the MacBook on to an external hard drive to recover them and the process would take a few days.

The man left – but never returned. Under US law, when 90 days had passed, the uncollected laptop legally became Mr MacIsaac's property. He decided to look at the recovered material on the laptop – which is now in the hands of the FBI as part of an investigation in which Mr MacIsaac is a material witness – and says a chill ran down his spine.

The Mail on Sunday today reveals some of that material for the first time – exposing how the son of the man tipped to be America's next President left himself wide open to blackmail.

Mr MacIsaac fears repercussions. 'I have everything documented. I have everything saved. But the shop is over. I won't be able to sustain my business… too many people are angry.' He eventually alerted the FBI who collected the laptop on December 9, 2019. An agent left a 'receipt for property' and a Grand Jury subpoena ordering Mr MacIsaac to testify about its contents.

At this point, the story becomes murkier. Mr MacIsaac began emailing various senators about what he had found. After getting no reply, he contacted Mr Giuliani who put him in touch with his lawyer, Robert Costello.

On October 14, the New York Post ran a front-page story with the headline: BIDEN SECRET EMAILS. Inside they published a few emails relating to Hunter's business dealings in the Ukraine and alleged links to his father. Joe and Hunter Biden have denied any impropriety. Strangely, the story got little traction in the US media. Stranger still, Twitter blocked the New York Post's account while Facebook and Google censored any mention of the article. Under pressure, they relented.

Even when Tony Bobulinski, a former US Navy serviceman and ex-wrestling champion who was Hunter's business partner, went on Trump-supporting Fox News to confirm he had emails verifying those on the laptop, the story was largely ignored.

Meanwhile, a cyber-security expert hired by a freelance journalist drove to Mr Costello's home on October 19 to copy the hard drive. He then spent 'hundreds of hours' verifying the information and satisfying himself that the data had not been interfered with. Finally, as Mr Trump fumed about the absence of media coverage for the Biden Files, the material was offered to The Mail on Sunday and MailOnline.

Secret Court Rules That the FBI’s “Backdoor Searches” of Americans Violated the Fourth Amendment But the Court Misses the Larger Problem: Section 702’s Mass Surveillance is Inherently Unconstitutional
EFF has long maintained that it is impossible to conduct mass surveillance and still protect the privacy and constitutional rights of innocent Americans, much less the human rights of innocent people around the world.

This week, we were once again proven right. We learned new and disturbing information about the FBI’s repeated and unjustified searches of Americans’ information contained in massive databases of communications collected using the government’s Section 702 mass surveillance program.

A series of newly unsealed rulings from the federal district and appellate courts tasked with overseeing foreign surveillance show that the FBI has been unable to comply with even modest oversight rules Congress placed on “backdoor searches” of Americans by the FBI. Instead, the Bureau routinely abuses its ability to search through this NSA-collected information for purposes unrelated to Section 702’s intended national security purposes.

The size of the problem is staggering. The Foreign Intelligence Surveillance Court (FISC) held that “the FBI has conducted tens of thousands of unjustified queries of Section 702 data.” The FISC found that the FBI created an “unduly lax” environment in which “maximal use” of these invasive searches was “a routine and encouraged practice.” But as is too often the case, the secret surveillance courts let the government off easy. Although the FISC initially ruled the FBI’s backdoor search procedures violated the Fourth Amendment in practice, the ultimate impact of the ruling was quite limited. After the government appealed, the FISC allowed the FBI to continue to use backdoor searches to invade people’s privacy—even in investigations that may have nothing to do with national security or foreign intelligence—so long as it follows what the appeals court called a “modest ministerial procedure.” Basically, this means requiring FBI agents to document more clearly why they were searching the giant 702 databases for information about Americans. Rather than simply requiring a bit more documentation, we believe the court should have imposed a real constitutional solution: it should require the FBI to get a warrant before searching for people’s communications.

Ultimately, these orders follow a predictable path. First, they demonstrate horrific and systemic constitutional abuses. Then, they respond with small administrative adjustments. They highlight how judges sitting on the secret surveillance courts seem to have forgotten their primary role of protecting innocent Americans from unconstitutional government actions. Instead, they become lost in a thicket of administrative procedures that are aimed at providing thin veil of privacy protection while allowing the real violations to continue.

Even when these judges are alerted to actual violations of the law, which have been occurring for more than a decade, they retreat from what should now be clear as day: Section 702 is itself unconstitutional. The law allows the government to sweep up people’s communications and records of communications and amass them in a database for later warrantless searching by the FBI. This can be done for reasons unrelated to national security, much less supported by probable cause. No amount of “ministerial” adjustments can cure Section 702’s Fourth Amendment problems, which is why EFF has been fighting to halt this mass surveillance for more than a decade.

Opinion Shows FBI Engaged in Lawless, Unconstitutional Backdoor Searches of Americans
These rulings arose from a routine operation of Section 702—the FISC’s annual review of the government’s “certifications,” the high-level descriptions of its plans for conducting 702 surveillance. Unlike traditional FISA surveillance, the FISC does not review individualized, warrant-like applications under Section 702, and instead signs off on programmatic documents like “targeting” and “minimization” procedures. Unlike regular warrants, the individuals affected by the searches are never given notice, much less enabled to seek a remedy for misuse. Yet, even under this limited (and we believe insufficient) judicial review, the FISC has repeatedly found deficiencies in the intelligence community’s procedures, and this most recent certification was no different.

Specifically, among the problems the FISC noticed were problems with the FBI’s backdoor search procedures. The court noted that in 2018, Congress directed the FBI to record every time it searched a database of communications collected under Section 702 for a term associated with a U.S. person, but that the Bureau was simply keeping a record of every time it ran such a search on all people. In addition, it was not making any record of why it was running these searches, meaning it could search for Americans’ communications without a lawful national security purpose. The court ordered the government to submit information, and also took the opportunity to appoint amici to counter the otherwise one-sided arguments by the government, a procedure given to the court as part of the 2015 USA Freedom Act (and which EFF had strongly advocated for).

As the FBI provided more information to the secret court, it became apparent just how flagrant the FBI’s disregard for the statute was. The court found no justification for FBI’s refusal to record queries of Americans’ identifiers, and that the agency was simply disobeying the will of Congress.

Even more disturbing was the FBI’s misuse of backdoor searches, which is when the FBI looks through people’s communications collected under Section 702 without a warrant and often for domestic law enforcement purposes. Since the beginning of Section 702, the FBI has avoided quantifying its use of backdoor searches, but we have known that its queries dwarfed other agencies. In the October 2018 FISC opinion, we get a window into just how disparate the number of FBI’s searches is. In 2017, the NSA, CIA and National Counterterrorism Center (NCTC) “collectively used approximately 7500 terms associated with U.S. persons to query content information acquired under Section 702.” Meanwhile, the FBI ran 3.1 million queries against a single database alone. Even the FISC itself did not get a full accounting of the FBI’s queries that year, or what percentage involved Americans’ identifiers, but the court noted that “given the FBI's domestic focus it seems likely that a significant percentage of its queries involve U.S.-person query terms.”

The court went on to explain that the lax—and sometimes nonexistent—oversight of these backdoor searches generated significant misuse. Examples reported by the government included tens of thousands of “batch queries” in which the FBI searched identifiers en masse on the basis that one of them would return foreign intelligence information. The court described a hypothetical involving suspicion that an employee of a government contractor was selling information about classified technology, in which the FBI would search identifiers belonging to all 100 of the contractor’s employees.

As the court observed, these “compliance” issues demonstrated “fundamental misunderstandings” about the statutory and administrative limits on use of Section 702 information, which is supposed to be “reasonably likely to return foreign intelligence information.” Worse, because the FBI did not document its agents’ justifications for running these queries, “it appears entirely possible that further querying violations involving large numbers of U S.-person query terms have escaped the attention of overseers and have not been reported to the Court.”

With the benefit of input from its appointed amici, the FISC initially saw these violations for what they were: a massive violation of Americans’ Fourth Amendment rights. Unfortunately, the court let the FBI off with a relatively minor modification of its backdoor search query procedures, and made no provision for those impacted by these violations to ever be formally notified, so that they could seek their own remedies. Instead, going forward, FBI personnel must document when they use U.S. person identifiers to run backdoor searches—as required by Congress—and they must describe why these queries are likely to return foreign intelligence. That’s it.

Even as to this requirement – which was already what the law required -- there are several exceptions and loopholes. This means that at least in some cases, the FBI can still trawl through massive databases of warrantlessly collected communications using Americans’ names, phone numbers, social security numbers and other information and then use the contents of the communications for investigations that have nothing to do with national security.

Secret Court Rulings Are Important, But Miss the Larger Problems With Section 702 Mass Surveillance
It is disturbing that in response to widespread unconstitutional abuses by the FBI, the courts charged with protecting people’s privacy and overseeing the government’s surveillance programs required FBI officials to just do more paperwork. The fact that such a remedy was seen as appropriate underscores how abstract ordinary people’s privacy—and the Fourth Amendment’s protections—have become for both FISC judges and the appeals judges above them on the Foreign Intelligence Court of Review (FISCR).

But the fact that judges view protecting people’s privacy rights through the abstract lens of procedures is also the fault of Congress and the executive branch, who continue to push the fiction that mass surveillance programs operating Section 702 can be squared with the Fourth Amendment. They cannot be.

First, Section 702 allows widespread collection (seizure) of people’s Internet activities and communications without a warrant, and the subsequent use of that information (search) for general criminal purposes as well as national security purposes. Such untargeted surveillance and accompanying privacy invasions are anathema to our constitutional right to privacy and resembles a secret general warrant to search anyone, at any time. Second, rather than judges deciding in specific cases whether the government has probable cause to justify its surveillance of particular people or groups, the FISC’s role under Section 702 is relegated to approving general procedures that the government says are designed to protect people’s privacy overall. Instead of serving as a neutral magistrate that protects individual privacy, the court is several steps removed from the actual people caught up in the government’s mass surveillance. This allows judges to then decide people’s rights in the abstract and without ever having to notify the people involved, much less provide them with a remedy for violations. This likely leads the FISC to be more likely to view procedures and paperwork as sufficient to safeguard people’s Fourth Amendment rights. It’s also why individual civil cases like our Jewel v. NSA case are so necessary.

As the Supreme Court stated in Riley v. California, “the Founders did not fight a revolution to gain the right to government agency protocols.” Yet such abstract agency protocols are precisely what the FISC endorses and applies here with regard to your constitutionally protected communications.

Third, because Section 702 allows the government to amass vast stores of people’s communications and explicitly authorizes the FBI to search it, it encourages the very privacy abuses the FISC’s 2018 opinion details. These Fourth Amendment violations are significant and problematic. But because the FISC is so far removed from overseeing the FBI’s access to the data, it does not consider the most basic protections required by the Constitution: requiring agents to get a warrant.

We hope that these latest revelations are a wake-up call for Congress to act and repeal Section 702 or, at minimum, to require the FBI to get individual warrants, approved by a court, before beginning their backdoor searches. And while we believe current law allows our civil litigation, Congress can also remove government roadblocks by providing clear, unequivocal notice, as well as an individual remedy for those injured by any FBI or NSA or CIA violations of this right. We also hope that the FISC itself will object to merely being an administrative oversight body, and instead push for more stringent protections for people’s privacy, and pay more attention to the inherent constitutional problems of Section 702. But no matter what, EFF will continue to push its legal challenges to the government’s mass surveillance program and will work to bring an end to unconstitutional mass surveillance.

The FISC-DOJ-CIA-FBI-DEA-ATF Secret Pedophile's body count list draws ties to several 1,000 suspicious deaths of the family’s allies and government officials.

Secret Pedophile's Attorney General Merrick B. Garland was sworn in as the 86th Attorney General of the United States on March 11, 2021. As the nation’s chief law enforcement officer, Attorney General Garland leads the Justice Department’s 115,000 employees, who work across the United States and in more than 50 countries worldwide. Under his leadership, the Department of Justice is dedicated to upholding the rule of law, keeping our country safe, and protecting the civil rights of all Americans.

Immediately preceding his confirmation as Attorney General, Attorney General Garland was a judge of the United States Court of Appeals for the District of Columbia Circuit. He was appointed to that position in 1997, served as Chief Judge of the Circuit from 2013-20, and served as Chair of the Executive Committee of the Judicial Conference of the United States from 2017-20. In 2016, President Obama nominated him for the position of Associate Justice of the United States Supreme Court.

No-one will be prosecuted by Secret Pedophile's Attorney General Merrick B. Garland because he will go to jail himself for crimes by him and secret video surveillance of him in crimes and accompanying privacy invasions. There our 1,000 a video's of drugs, rape, sex with kids, killings, etc. for every name on the listed at Epstein Island Visitor List, and Podesta’s and Anthony Weiner’s computer and 1,000 phones records. A puppet government is a government with no sovereign authority over its territory, whose actions and policies are controlled by a foreign or domestic power. Many puppet people and puppet governments convey an image of sovereignty, but in reality, they cannot do anything without the consent of whichever foreign or domestic power tyrannical government who controls them.

Alvin Bragg, Jr. is the 37th District Attorney elected in Manhattan. A son of Harlem who has served as both a state and federal prosecutor, Alvin has spent more than two decades fighting to make our communities safer and our criminal justice system fairer. He is the first Black Manhattan DA in the history of the office.

No-one will be prosecuted by Secret Pedophile's Attorney Alvin Bragg is the 37th District Attorney elected in New York City. because he will go to jail himself for crimes by him and secret video surveillance of him in crimes and accompanying privacy invasions. There our 1,000 a video's of drugs, rape, sex with kids, killings, etc. for every name on the listed at Epstein Island Visitor List, and Podesta’s and Anthony Weiner’s computer and 1,000 phones records. A puppet government is a government with no sovereign authority over its territory, whose actions and policies are controlled by a foreign or domestic power. Many puppet people and puppet governments convey an image of sovereignty, but in reality, they cannot do anything without the consent of whichever foreign or domestic power tyrannical government who controls them.

Secret Pedophile's Democratic congresswomen has continued to escalate following a controversial campaign rally. Alexandria Ocasio-Cortez of New York, Ilhan Omar of Minnesota, Ayanna Pressley of Massachusetts and Rashida Tlaib of Michigan will return to their seats in the US Congress. There our 1,000 a video's of drugs, rape, sex with kids, killings, etc. for every name on the listed at Epstein Island Visitor List, and Podesta’s and Anthony Weiner’s computer and 1,000 phones records. A puppet government is a government with no sovereign authority over its territory, whose actions and policies are controlled by a foreign or domestic power. Many puppet people and puppet governments convey an image of sovereignty, but in reality, they cannot do anything without the consent of whichever foreign or domestic power tyrannical government who controls them.

Secret Pedophile's Congresswoman Maxine Waters, an extraordinarily low IQ person, has become, together with Secret Pedophile's Nancy Pelosi, the Face of the Democrat Party. She has just called for harm to supporters, of which there are many, of the Make America Great Again movement. Be careful what you wish for Max!

"If you see anybody from that Cabinet in a restaurant, in a department store, at a gasoline station, you get out and you create a crowd and you push back on them, and you tell them they're not welcome anymore, anywhere," Waters, who has called for President Donald Trump to be impeached, told supporters over the weekend. There our 1,000 a video's of drugs, rape, sex with kids, killings, etc. for every name on the listed at Epstein Island Visitor List, and Podesta’s and Anthony Weiner’s computer and 1,000 phones records. A puppet government is a government with no sovereign authority over its territory, whose actions and policies are controlled by a foreign or domestic power. Many puppet people and puppet governments convey an image of sovereignty, but in reality, they cannot do anything without the consent of whichever foreign or domestic power tyrannical government who controls them.

Executive Orders Can’t Save The U.S.A. ? It's “WE THE PEOPLE” Who Own America ? https://rumble.com/v2cgic2-executive-orders-cant-save-the-u.s.a.-its-we-the-people-who-own-america-.html
Executive orders are a powerful tool for presidents when they can’t come to an agreement with Congress. However, there are limitations on what a president can do, especially when it comes to the economy. After all, Congress appropriates spending and the Federal Reserve sets monetary policy. Still, a number of executive orders have influenced the economy in both positive and negative ways. Watch the video to learn more about some of Presidents.

These Executive Orders have been on record for nearly 30 years and could be enacted by the stroke of a Presidential pen:
EXECUTIVE ORDER 10990 allows the government to take over all modes of transportation and control of highways and seaports.
EXECUTIVE ORDER 10995 allows the government to seize and control the communication media.
EXECUTIVE ORDER 10997 allows the government to take over all electrical power, gas, petroleum, fuels and minerals.
EXECUTIVE ORDER 10998 allows the government to seize all means of transportation, including personal cars, trucks or vehicles of any kind and total control over all highways, seaports, and waterways.
EXECUTIVE ORDER 10999 allows the government to take over all food resources and farms.
EXECUTIVE ORDER 11000 allows the government to mobilize civilians into work brigades under government supervision.
EXECUTIVE ORDER 11001 allows the government to take over all health, education and welfare functions.
EXECUTIVE ORDER 11002 designates the Postmaster General to operate a national registration of all persons.
EXECUTIVE ORDER 11003 allows the government to take over all airports and aircraft, including commercial aircraft.
EXECUTIVE ORDER 11004 allows the Housing and Finance Authority to relocate communities, build new housing with public funds, designate areas to be abandoned, and establish new locations for populations.
EXECUTIVE ORDER 11005 allows the government to take over railroads, inland waterways and public storage facilities.
EXECUTIVE ORDER 11051 specifies the responsibility of the Office of Emergency Planning and gives authorization to put all Executive Orders into effect in times of increased international tensions and economic or financial crisis.
EXECUTIVE ORDER 11310 grants authority to the Department of Justice to enforce the plans set out in Executive Orders, to institute industrial support, to establish judicial and legislative liaison, to control all aliens, to operate penal and correctional institutions, and to advise and assist the President.
EXECUTIVE ORDER 11049 assigns emergency preparedness function to federal departments and agencies, consolidating 21 operative Executive Orders issued over a fifteen year period.
EXECUTIVE ORDER 11921 allows the Federal Emergency Preparedness Agency to develop plans to establish control over the mechanisms of production and distribution, of energy sources, wages, salaries, credit and the flow of money in U.S. financial institution in any undefined national emergency. It also provides that when a state of emergency is declared by the President, Congress cannot review the action for six months. The Federal Emergency Management Agency has broad powers in every aspect of the nation.

The FBI has said Williams was recorded on closed-circuit cameras in the Capitol going into and coming out of Pelosi’s office.

An FBI affidavit said a cellphone video likely shot by Williams showed a man’s gloved hand lifting an HP laptop from a table, and the caption read, “they got the laptop.”

That is how it is going to go down, the timeline might be a bit off. You will have one world faith, which is what the ecumenical movement is about. One world government, and all under control of the New World Order by July 4th 2026 on this the day of America’s up coming 250nd year of independence, unveiled a new updated flag which better reflects the nation in its present form, signaling the aspirations it has for its ever bright future.

Confiscating Entire Wealth of All The Billionaires and Kill Them and Family Too! There are 724 (billionaires) in the U.S., and more overseas according to the 2021 Forbes billionaires list, released in April,” the Journal reports. “At that point their collective net worth was $4.4 trillion, although that figure has presumably since risen along with the stock market. So Per 60% Death taxes are taxes imposed by the federal and some state governments on someone's estate upon their death - Death taxes are also called death duties, estate taxes, or inheritance taxes. After getting the money maybe in 20 weeks or so - Own Government plan's are to kill rest of the family member for more estate taxes, or inheritance taxes.

Also Government Plan's are to Kill and or Black Mail for Lot's of Money All Epstein’s and Maxwell Private Pedophile Islands Visitor Log's including video equipment and sex tape's of rich people and with DNA Sample Testing and secret video tapes and missing body in underground lairs and a bizarre teen sex temple from Pedophile Islands Guestbook and Visitor List They Do Not Want You to See Ever!

Loading 7 comments...