Final Thoughts: Enabling Sovereignty Violators


>