Now that we understand the problem [CRITICAL BACKGROUND HERE], we move into the solution discussion. There is a way to deconstruct the current system of corruption within the U.S. government that follows a path outlined by the framers of our constitution. In this series of articles we will outline what I believe to be the way forward. It is a narrow path, and each step is dependent on the American electorate understanding the challenge.

There is a way to stop the Intelligence Branch, but it requires some outside-the-box thinking and reliance on the Constitution as a tool to radically change one element within government. In order to achieve it, we must focus on three tiers needed for success:
• Tier One is “tactical civics” at a local level. Engaged and active citizen participation at the community, city, town and hamlet level of society. This is what might be described as grassroots level. School Board level; City Council level; County Commissioner level.
• Tier Two is “extreme federalism” at a state level. Engaged and active citizen participation through your State House and State Senate representative. This is state level assembly and action demands upon the House, Senate and State Governor.
• Tier Three the challenge of “federal offices” on a national level. This is where a singular action can be taken upstream that allows the first two tiers to retake control over federal offices. This is where we throw the One Ring into the fire of Mordor. CTH has tested this approach with a multitude of political allies who understand the issue. All eventually agreed with the solution at a federal level; it won’t be easy, but it will be possible.
I cannot emphasize enough how each tier is dependent on the preceding tier. Additionally, each voter has to understand the larger objective in order to see how they are all connected. That is the goal of this outline.
Today, the biggest names in Big Tech announce they have partnered with the Five Eyes intelligence network, ultimately controlled by the NSA, to: (1) monitor all activity in their platforms; (2) identify extremist content; (3) look for expressions of Domestic Violent Extremism (DVE); and then, (4) put the content details into a database where the Five Eyes intelligence agencies (U.K., U.S., Australia, Canada, New Zealand) can access it.