Main Core - The US Government's Database of MILLIONS of Americans Suspected of Not Trusting the Organized Crime "government"
This Entry from the Grokopedia Breaks Down the Basics
Summary by Grok via Grokipedia

Main Core is a classified database reportedly maintained by the U.S. federal government since the 1980s, compiling extensive personal, financial, and surveillance data on millions of American citizens flagged as potential threats to national security.[ Developed under the Reagan administration as part of Continuity of Government (COG) protocols to ensure governmental survival amid catastrophes like nuclear war or systemic collapse, it serves as a centralized repository for identifying individuals warranting heightened monitoring or restriction during declared emergencies.The system’s origins trace to early COG exercises, integrating inputs from agencies such as the NSA, FBI, and FEMA, with allegations of drawing on intercepted communications, financial transactions, and intelligence reports to populate profiles on up to 8 million persons, including dissidents, activists, and ordinary citizens based on vague threat criteria. It has been linked to historical programs like Rex 84, a 1980s FEMA initiative explored during Iran-Contra investigations for contingency mass detentions, though official details remain obscured by classification.Post-9/11 expansions reportedly enabled its use in guiding warrantless surveillance, raising alarms over privacy erosions and the potential override of constitutional protections without judicial oversight.Public awareness emerged through investigative reporting citing former intelligence officials, highlighting Main Core’s role in preemptive threat categorization but lacking declassified corroboration, amid broader critiques of opaque executive powers in national security apparatuses.Its defining controversy centers on the risk of enabling arbitrary detentions or martial law impositions, underscoring tensions between security imperatives and individual liberties in unverified emergency scenarios.
Origins and Early Development
Inception in the Cold War Era
Main Core originated in the late Cold War period as part of broader U.S. government efforts to prepare for potential national emergencies, including nuclear war or widespread domestic unrest amid perceived Soviet subversion threats. Drawing from earlier intelligence practices, such as the FBI’s Security Index—a watchlist of individuals targeted for detention during wartime or crises, maintained since the 1940s but updated through the 1970s—the database consolidated data on suspected subversives to support continuity of government (COG) protocols.[5][6]Development accelerated in the early 1980s under the Reagan administration, amid heightened tensions from events like the Soviet invasion of Afghanistan and the Euromissile crisis, which underscored vulnerabilities in domestic stability during a potential breakdown of civil order. Investigative reporting citing government insiders indicates Main Core was formalized around 1982 by the Federal Emergency Management Agency (FEMA), integrating inputs from agencies including the FBI and NSA to aggregate personal, financial, and behavioral records on up to eight million Americans flagged as risks. This built on post-Watergate intelligence reforms, such as the Foreign Intelligence Surveillance Act of 1978, yet prioritized preemptive threat identification over procedural constraints in COG scenarios.The system’s inception reflected first-principles assessments of causal threats: communist infiltration, anti-government activism remnants from the 1960s-1970s era (including echoes of COINTELPRO-era tracking, officially discontinued in 1971 but with data legacies persisting), and the need for rapid response capabilities against hypothetical martial law impositions.Aligned with Reagan’s National Security Decision Directive 55 (September 1982), which directed enhancements to enduring constitutional government structures, Main Core served as a foundational tool for executive branch contingency planning, emphasizing empirical risk profiling over ideological profiling alone
Integration with Continuity of Government Plans
Main Core’s embedding within U.S. continuity of government (COG) frameworks facilitated the preemptive neutralization of perceived threats to executive continuity during hypothetical disruptions, such as nuclear war or civil unrest. Originating in the Reagan administration around 1982 under FEMA auspices, the database was structured to interface with broader COG protocols, providing prioritized lists of individuals for apprehension to safeguard governance structures. This integration was evident in FEMA-led exercises like Rex 84, conducted in April 1984 as Readiness Exercise 1984 Bravo, which simulated martial law declaration amid mass migration or invasion scenarios, involving the designation of detention facilities for up to 400,000 civilians.Rex 84 planning, coordinated with the Departments of Defense and Justice, incorporated database-driven threat assessments akin to Main Core’s capabilities to identify “subversive” elements for swift isolation, aligning civilian control measures with military relocation protocols.Declassified aspects of contemporaneous plans, such as the Army’s 1968 Civil Disturbance Plan (Garden Plot), underscore the doctrinal emphasis on pre-crisis profiling to preempt cascading failures in command chains, with Main Core reportedly extending this by aggregating intelligence for real-time COG activation. Investigative reporting indicates that Main Core’s outputs would feed into executive branch decision trees for rapid-response detentions, prioritizing causal disruptions like organized dissent over post-event reactions.Such linkages ensured interoperability with military assets, as tested in Rex 84’s joint operations simulating federal overrides of state authority.
Operational Description
Data Sources and Collection Methods
Main Core aggregates data primarily from federal intelligence and law enforcement agencies, including the National Security Agency (NSA), Federal Bureau of Investigation (FBI), Central Intelligence Agency (CIA), and Internal Revenue Service (IRS). NSA contributions include signals intelligence intercepts of communications involving U.S. persons identified as potential threats, while FBI inputs encompass watchlists and criminal surveillance records.IRS data focuses on financial records such as tax filings and transaction histories, often cross-referenced with Treasury Department tracking of banking and credit card activities.Collection methods rely on automated ingestion and pattern-matching algorithms to flag and compile personal identifiers, including banking details, travel records, and financial transactions, drawn from inter-agency databases without individualized judicial oversight.These processes involve querying existing government repositories for indicators of subversion, terrorism, or disloyalty, such as associations on no-fly lists exceeding 1 million entries by the mid-2000s. Data from state and local agencies, including criminal histories and credit reports, feeds into subsidiary databases that consolidate into Main Core via software tools adapted for rapid searching. By the 2000s, the database reportedly held entries on millions of U.S. persons, with estimates from former intelligence officials citing approximately 8 million individuals as potentially suspect based on algorithmic threat profiling. These figures derive from disclosures by anonymous sources within U.S. intelligence circles, whose accounts align across multiple investigative reports but lack independent official verification.
Database Structure and Capabilities
Main Core operates as a centralized, classified database repository compiling profiles of individuals deemed potential threats to national security, drawing on personal, financial, and surveillance data aggregated from federal agencies such as the NSA, FBI, and CIA. Established in the early 1980s under continuity of government protocols, it functions primarily as an emergency internal security system accessible to military and intelligence personnel for rapid threat assessment during national crises, including scenarios involving constitutional suspension or martial law.The system’s capabilities center on efficient data querying and profiling, reportedly enhanced by advanced search technologies like the PROMIS software, which enables complex retrieval of interconnected records across vast datasets without standard warrant requirements. This allows for the identification of subversives through indicators such as financial transactions, associations with watchlisted entities, or patterns in intercepted communications, with the database serving as a foundational index—or “table of contents“—for deeper intelligence on up to 8 million Americans. Inter-agency feeds provide ongoing updates, ensuring the repository’s relevance for executive and military decision-making in high-stakes contingencies. Unlike public or routine government databases, Main Core employs stratified classified access levels, limiting use to cleared insiders and integrating directly with operational protocols for threat mitigation, such as preemptive detention lists tailored to causal risk factors like material support for perceived enemies of the state. Its architecture prioritizes scalability and speed for crisis response, distinguishing it through non-public aggregation methods and exclusion from routine oversight mechanisms.
Legal Framework and Authorization
Executive Orders and Legislative Basis
The legal foundation for Main Core rests primarily on executive branch authorities rather than a dedicated public statute, with operations enabled through classified mechanisms embedded in broader national security frameworks. The National Security Act of 1947 established the institutional structure for intelligence agencies, including provisions for coordinating threat assessments and information sharing among entities like the CIA and NSA, which form the basis for aggregating data on potential domestic risks without requiring individualized warrants for national security purposes. This act provided the enduring legislative scaffold, emphasizing integrated policies for U.S. security while deferring operational details to executive discretion.Post-World War II executive orders further delineated emergency data management roles, evolving into Cold War-era directives that authorized federal agencies to compile and control information flows during crises. Executive Order 10995, issued by President Kennedy on February 16, 1962, assigned telecommunications management functions to the Office of Emergency Planning, enabling centralized oversight of communication networks critical for threat monitoring and response coordination.[17] These early measures laid groundwork for database systems by prioritizing executive control over data in exigencies, without explicit congressional oversight for classified implementations.Under President Reagan, subsequent directives expanded these capacities, particularly through Executive Order 12333 (December 4, 1981), which governed U.S. intelligence activities and permitted collection on U.S. persons when linked to foreign intelligence or counterintelligence threats, facilitating the aggregation of domestic data streams into centralized repositories. Executive Order 12656 (November 18, 1988) assigned emergency preparedness functions across agencies, including FEMA’s role in continuity of government planning, under which Main Core reportedly emerged as a watchlist tool for internal security threats. These Reagan-era instruments, informed by National Security Decision Directives on crisis management, emphasized preemptive data compilation for executive-led responses, bypassing routine Foreign Intelligence Surveillance Act requirements for perceived domestic emergencies.No declassified public law explicitly names or funds Main Core, with sustainment occurring via classified annexes to annual defense appropriations acts, which allocate black budget resources for intelligence databases without line-item disclosure. Such annexes, consistent with practices for covert programs since the 1970s, provide fiscal cover while deriving implicit expansion from post-2001 laws like the PATRIOT Act, which broadened data access for threat aggregation but did not originate the system’s core architecture. Reports from intelligence sources indicate these authorizations prioritize causal threat mitigation over privacy constraints in classified contexts, though details remain unverified beyond journalistic accounts reliant on anonymous officials.
Relation to Emergency Powers
Main Core functions as a contingency tool within frameworks of invoked emergency authorities, such as declarations under the Insurrection Act of 1807, which empowers the president to deploy federal troops to quell domestic insurrections, rebellions, or obstructions to federal law enforcement when state authorities prove inadequate. In such activations, the database enables the executive branch to target individuals pre-identified as potential threats for apprehension and detention, facilitating rapid stabilization of governance continuity amid verifiable disruptions like widespread civil disorder or insurgent activities.Under martial law impositions—historically contemplated in scenarios overriding civilian judicial processes during acute national crises—Main Core supports executive detentions without immediate judicial review, prioritizing operational speed to neutralize risks to constitutional order. This aligns with continuity of government protocols, where causal imperatives for preempting threats, such as coordinated domestic insurgencies, necessitate preemptive identification over protracted legal safeguards. Planning integrations trace to post-World War II expansions but intensified in the 1970s amid preparations for potential civil unrest scenarios, including economic shocks and social upheavals that could escalate to governance-threatening levels, positioning the system as a mechanism for executive-led restoration against empirically observable patterns of instability. Simulations incorporating Main Core have demonstrated efficacy in modeling responses to such threats, enhancing preparedness for scenarios where delayed action could cascade into broader systemic failure, though inherent potentials for overapplication underscore the tension between necessity and restraint in emergency contexts.
Revelations and Public Disclosure
Initial Reporting in 2008
In May 2008, investigative journalist Christopher Ketcham published “The Last Roundup” in Radar magazine, marking the first detailed public disclosure of Main Core as a clandestine federal database purportedly designed to catalog potential domestic threats for apprehension and detention during national emergencies or martial law scenarios.Ketcham, drawing on interviews with anonymous former senior government officials and intelligence sources, described Main Core as originating in the early 1980s amid Reagan-era preparations for continuity-of-government operations, with significant expansions following the September 11, 2001, attacks under the George W. Bush administration. One source alleged that the database then contained dossiers on approximately 8 million Americans, aggregating data from public and classified sources including financial records, telephone logs, and intelligence feeds to flag individuals deemed “suspect” based on criteria such as political activism or associations.[14]Ketcham’s reporting tied Main Core to broader contingency frameworks, including historical exercises like Rex 84, which simulated mass roundups of civilians during crises, though officials denied operational integration; the article emphasized that activation would occur only under presidential directive amid catastrophic threats to constitutional order.Despite its decades-long existence—allegedly predating widespread digital surveillance—Main Core had evaded prior leaks, surfacing amid heightened post-9/11 scrutiny of executive overreach, including debates over warrantless wiretapping and the USA PATRIOT Act. Building on Ketcham’s revelations, July 2008 coverage amplified the story through outlets like Salon, where national security journalist Tim Shorrock cited additional intelligence insiders confirming Main Core’s role as an “emergency internal security database system” for military or FEMA-led responses, with Bush-era enhancements incorporating post-9/11 data troves from programs like those under the Total Information Awareness initiative. These accounts, reliant on unnamed sources with direct knowledge, portrayed the database as operational but classified, capable of enabling rapid targeting without judicial oversight in declared emergencies. No official government confirmation emerged at the time, leaving the exposures grounded in whistleblower assertions amid a landscape of unverified but consistent insider claims.
Subsequent Investigations and FOIA Attempts
In the years following the 2008 public disclosures, multiple Freedom of Information Act (FOIA) requests targeted information on Main Core, primarily yielding non-disclosures or absences of records that preserved operational opacity. A July 16, 2018, request to the National Archives and Records Administration sought documents referencing “Main Core,” described as a database from the 1980s compiling data on U.S. citizens viewed as national security threats; the agency responded on July 31, 2018, stating no responsive documents were found.Similarly, a 2019 request to the Central Intelligence Agency for records on Main Core received a Glomar response on June 5, 2019, in which the agency neither confirmed nor denied the existence of relevant documents, citing national security exemptions under FOIA.Agency FOIA logs document additional post-2008 inquiries, often resulting in withholdings or referrals due to classification. The Defense Intelligence Agency’s 2014 FOIA log includes a request (FOIA-00172-2014) specifically for information on Main Core, processed amid broader denials for sensitive intelligence matters. A 2014 FEMA case (2014-FEF0-00313) under the Department of Homeland Security addressed queries about the “Main Core” database, but responses involved redactions or non-releases to protect continuity-of-government functions. These outcomes confirmed procedural barriers without substantiating or refuting the program’s details, as agencies invoked exemptions for classified information and internal deliberations.Congressional oversight attempts faced similar impediments from classification protocols, with limited declassified insights emerging. Post-2008 committee reviews, such as those tied to broader surveillance reforms, referenced aggregated data systems but stalled on specifics like Main Core due to executive branch assertions of ongoing national security needs. The 2013 Edward Snowden disclosures on NSA bulk metadata collection indirectly aligned with descriptions of Main Core’s data ingestion mechanisms, as NSA programs like MAINWAY were noted in leaks to enable contact chaining and threat profiling—capabilities consistent with the database’s alleged architecture—yet no direct program documentation was released. By 2025, no material declassifications or successful challenges to these withholdings had occurred, reflecting institutional prioritization of secrecy over transparency in continuity planning. FOIA appeals and litigation, where pursued, reinforced Glomar and Exemption 1 (classified information) invocations, leaving public knowledge confined to initial journalistic accounts without empirical expansion from official sources.
Controversies and Debates
Allegations of Overreach and Privacy Infringements
Civil liberties organizations, including the American Civil Liberties Union (ACLU), have alleged that the Main Core database facilitates warrantless accumulation of personal and financial data on millions of U.S. citizens, constituting a direct infringement on Fourth Amendment protections against unreasonable searches and seizures. Reports from investigative journalism indicate the system compiles dossiers on up to 8 million individuals categorized as potential national security threats, drawing from sources like financial transactions and communications metadata without individualized judicial oversight.[1]Critics contend this data hoarding extends beyond criminal investigations to preempt non-criminal ideological or associative risks, raising fears of arbitrary designations that could enable preemptive detentions during declared emergencies under Continuity of Government protocols. Such scenarios evoke historical precedents of mass internment, like the World War II relocation of Japanese Americans based on ethnic profiling rather than evidence of wrongdoing, where over 120,000 individuals were detained without due process amid unproven loyalty concerns. In Main Core’s case, advocates warn of similar potential for extrajudicial roundups targeting perceived subversives, absent transparent criteria or appeal mechanisms. These allegations highlight systemic privacy erosions, as the database’s origins in 1980s-era emergency planning reportedly evolved post-9/11 to integrate NSA surveillance streams, bypassing Foreign Intelligence Surveillance Act (FISA) warrants for domestic profiles. However, some security analysts familiar with threat profiling argue the selections derive from empirical indicators—such as links to terror financing networks or anomalous financial patterns—rather than blanket population sweeps, countering narratives of universal monitoring by emphasizing risk-based prioritization over indiscriminate collection. This perspective posits that while scale invites abuse, the focus on verifiable threat vectors aligns with causal necessities for disrupting plots, as evidenced by post-9/11 finance-tracking successes that curtailed funding to groups like al-Qaeda without broad civil liberties fallout.
Government Defenses and National Security Justifications
US government officials have justified bulk metadata collection programs as critical tools for identifying and disrupting terrorist networks before attacks materialize, emphasizing the need to analyze vast datasets to uncover hidden connections that traditional methods might miss. In a 2014 address, President Barack Obama described these capabilities as adapted to counter the evolving threat of individuals or small cells operating covertly, arguing that post-9/11 legal frameworks enabled proactive intelligence gathering to avert catastrophes similar to the September 11, 2001, attacks. Officials maintained that such programs uphold the government’s responsibility to safeguard the nation against asymmetric threats, where delays in detection could lead to mass casualties.NSA Director General Keith Alexander testified in June 2013 that surveillance efforts under authorities like Section 215 of the USA PATRIOT Act had contributed to foiling over 50 potential terrorist plots globally, including disruptions in the United States and Europe. A specific instance cited involved the 2009 New York City subway bombing plot led by Najibullah Zazi, where metadata analysis reportedly provided pivotal leads linking him to al-Qaeda operatives, facilitating his arrest and preventing the attack. These assertions underscored the programs’ role in enabling rapid correlations across communication patterns, which officials argued were indispensable for maintaining a monopoly on defensive force amid risks of subversion or large-scale domestic incidents.Department of Justice and intelligence community leaders further defended the initiatives by highlighting their compliance with oversight mechanisms, such as Foreign Intelligence Surveillance Court approvals, while prioritizing foreign intelligence objectives that inherently bolster domestic security. Proponents contended that forgoing comprehensive data access would cede strategic advantages to adversaries exploiting open societies, drawing parallels to historical intelligence failures that permitted unchecked threats to escalate. This rationale positioned the databases as foundational to causal chains of threat prevention, where empirical pattern recognition outweighs theoretical privacy absolutes in preserving societal stability.
Perspectives from Civil Liberties Advocates vs. Security Experts
Civil liberties advocates, particularly those aligned with left-leaning perspectives, have framed databases like Main Core as harbingers of authoritarian overreach, arguing that they normalize the compilation of politicized “threat” lists that could encompass dissidents, journalists, or activists opposing government policies. Investigative journalist Christopher Ketcham, citing anonymous intelligence community sources in his 2008 Radar Magazine exposé, described Main Core as a tool potentially enabling warrantless detentions and the suspension of habeas corpus during declared emergencies, evoking fears of a “last roundup” reminiscent of internment precedents but expanded via modern data aggregation.[1] Such views align with broader critiques from organizations like the ACLU, which contend that unaccountable surveillance infrastructures erode Fourth Amendment protections and invite abuse by future administrations, even absent immediate evidence, prioritizing theoretical risks of state weaponization over operational secrecy. These concerns are amplified in media and academic circles, where systemic biases toward highlighting government encroachments often overshadow historical contexts of internal threats.Security experts and right-leaning analysts, conversely, advocate for the empirical imperatives of such systems in countering asymmetric warfare and covert infiltrations, asserting that databases tracking potential risks are indispensable for continuity-of-government protocols amid evolving threats like terrorism or espionage. They critique sensationalized reporting on programs like Main Core as media-driven hype that disregards 20th-century precedents, such as the FBI’s Venona Project, which decrypted Soviet communications to expose hundreds of U.S. infiltrators between 1943 and 1980 without documented mass civil liberties infringements on non-threat populations. Proponents, including former intelligence officials, emphasize that post-9/11 legal authorizations reflect pragmatic adaptations to non-state actors’ tactics, where data-driven threat identification has empirically bolstered stability by preempting disruptions, as evidenced by disrupted plots under enhanced surveillance frameworks since 2001. This stance privileges causal linkages between intelligence aggregation and deterrence, viewing privacy absolutism as naive given documented foreign adversary penetrations in prior eras.Objectively, no verified abuses attributable to Main Core—such as improper detentions or targeting of innocents—have been disclosed in public records or investigations, despite FOIA requests and journalistic scrutiny since its alleged 2008 revelation, though its opaque, unacknowledged status fuels speculation. Theoretical vulnerabilities to misuse, including algorithmic errors or executive overreach in crises, are acknowledged across viewpoints, yet balanced against quantifiable benefits in threat mitigation, as successive administrations have sustained similar architectures without confirmed escalations to martial law scenarios. This tension underscores ongoing debates where civil liberties priors often amplify unproven risks, while security rationales ground arguments in historical efficacy and the absence of systemic failures.
Impact and Ongoing Relevance
Influence on Post-9/11 Surveillance Programs
The Main Core database, established in the late 1970s as a repository for personal and financial data on individuals deemed potential threats to national security, underwent significant expansion following the September 11, 2001, terrorist attacks. Reports indicate that it incorporated data from the National Security Agency’s (NSA) warrantless domestic surveillance programs, initiated under Executive Order 12333 and expanded post-9/11, thereby augmenting its original focus on continuity-of-government scenarios with real-time intelligence on terrorism-related risks. This integration enhanced the database’s capacity for data fusion, allowing cross-referencing of financial transactions, communications metadata, and other indicators to flag domestic threats more efficiently. By the mid-2000s, elements of Main Core’s architecture contributed to heightened executive branch readiness for emergency responses, paralleling the development of post-9/11 intelligence-sharing mechanisms. Its pre-existing framework for compiling vast datasets on U.S. citizens provided a foundational model for aggregating disparate sources—such as NSA intercepts and FBI watchlists—into actionable profiles, a practice echoed in the expansion of terrorist screening databases.[1] This evolution supported proactive threat mitigation, with indirect references in agency assessments to bolstered resilience against plots disrupted in the 2010s, though specific attributions remain classified. Main Core’s influence extended to informing the conceptual basis for programs emphasizing preventive data analytics, predating and complementing initiatives like the Department of Homeland Security’s fusion centers, which by 2007 integrated federal surveillance feeds for localized terrorism prevention. While not directly operationalized within these centers, the database’s emphasis on centralized threat profiling underscored the shift toward comprehensive domestic monitoring architectures post-9/11.
Current Status and Speculation on Evolution
As of October 2025, the MAIN CORE database remains fully classified, with no declassifications or official acknowledgments from U.S. intelligence agencies since its initial exposure in investigative reporting over a decade prior. The National Declassification Center’s 2025 quarterly releases, encompassing millions of pages from various agencies, include no references to MAIN CORE or related continuity-of-government databases, indicating persistent secrecy amid ongoing national security priorities. This opacity aligns with the broader endurance of post-9/11 surveillance frameworks, such as Section 702 of the Foreign Intelligence Surveillance Act, which was reauthorized in April 2024 for another two years despite debates over warrantless collection, suggesting analogous programs like MAIN CORE have not been dismantled but rather sustained for emergency preparedness. Evolutionary adaptations are inferred from documented advancements in NSA capabilities, including integration of artificial intelligence for processing vast datasets against emerging threats such as cyber intrusions and hybrid warfare tactics. For instance, NSA operations have incorporated AI-driven analytics to enhance signals intelligence responsiveness, as evidenced by real-time threat detection in foreign operations reported in 2024, which could parallel domestic contingency tools like MAIN CORE by enabling faster pattern recognition in behavioral or network data. Post-2020 shifts in threat landscapes, including the January 6, 2021, Capitol events, have prompted expanded focus on domestic violent extremism, with congressional assessments noting the evolution of intelligence coordination to address ideologically motivated actors, potentially extending MAIN CORE’s scope to monitor risks paralleling historical unrest patterns like civil disturbances. Empirical rises in such incidents—e.g., FBI reports of over 2,700 domestic terrorism investigations opened since 2021—provide causal justification for refined querying mechanisms, prioritizing verifiable threats over speculative overreach.Speculation on further evolution centers on trend-based enhancements rather than unverified projections: integration with cloud-based AI security platforms to handle exponential data growth from financial and digital footprints, as federal cybersecurity demands have escalated with AI-native threats documented in 2025 reports. While civil liberties critiques persist, the absence of documented tyrannical deployments—despite decades of program maturity and multiple high-profile crises—underscores a legacy of causal deterrence, where preemptive cataloging has arguably forestalled escalations without eroding constitutional norms, as no peer-reviewed analyses or declassified audits reveal systemic abuse leading to martial law impositions. This framework’s relevance endures in an era of hybrid risks, balancing empirical threat mitigation against privacy baselines recalibrated by technological inevitabilities.
Get a NEW 2026 Liberator for “Going Paid” (or upgrading from monthly) as a $50 Yearly Subscriber to This Substack.

We just announced the BRAND NEW 2026 Liberator (Version 2.3), which includes the ePub versions of “Government” - The Biggest Scams in History Exposed! AND To See the Cage is to Leave It - 25 Techniques the Few Use to Control the Many, Important books in PDF, truth documentaries, dank liberty memes, and music from the Liberty movement’s hottest artists.
Get a new 2026 Liberator for “Going Paid” (or upgrading from monthly) on Substack as a $50 yearly member. We will throw in a paperback version of either: To See the Cage is to Leave It- 25 Techniques the Few Use to Control the Many OR a NEW 5.5 version of “Government” - The Biggest Scam in History… Exposed! for an additional $15. Domestic S&H included, international gets a $10 S&H credit & pays the difference. E-mail us for an international shipping quote.
Go Paid as a $250 Founding Member and get the New 2026 Liberator Flash Drive with signed/personalized High-Resolution Hard Copies of BOTH To See the Cage is to Leave It- 25 Techniques the Few Use to Control the Many AND “Government” - The Biggest Scam in History… Exposed! AND an Art of Liberty “Everything Bundle.”
Comments ()