Truth in News

Documenting the Fall of Utopia

Welcome to the N.O.D. News Blog

Please bear with us as we reconstruct the site, it will soon be filled with fresh content. We are also looking for people to contribute articles and various material. Be sure to check back periodically for updates!

Spread the Truth to Those Around You.

The most effective way to spread truth is by first connecting with your family, friends and community. Knowledge brings power....Unity brings strength. ...No one person can fight the battle alone.

Protect the Free Flow of Information

In today's technological age, establishment sources are waging a war on information, for as our reliance on them as our sources dwindles away; they are losing their grasp on the minds of the masses. Embrace the free flow of information and watch establishment sources implode on themselves!

Dissent + Revolution = Freedom

Politicians do not serve in the best interest of the people. In fact, they are one of the reasons we are in this mess. A healthy distrust in government leads to objectivity within your reasoning. Evolve beyond the right/left paradigm and do not let yourself be fooled by these slick talking phonies.

The Death of the Dollar and the Free Market

As wealth is concentrated into the predatory hands of a few, it inevitably takes more away from the people! The criminal banking cartels and the federal reserve are playing with our economy like a marionette puppet. Protect your wallet, secure your assets, defend your household.

Saturday, April 20, 2013

Privacy Tools

With CISPA on the rise, as well as other surveillance conducted by governments and big business, many people feel the need to find more security in their online experience. This page is dedicated to bringing you the best privacy tools on the internet, to protect your personal information and safeguard your data against snoopers and spooks.

 Crypto -
Do you have important trade secrets that you would like to protect? How about personal information such as passwords, financial/tax info or even those risque photos of your wife she surprisingly let you take when she had one to many glasses of wine. The solution? CRYPTO.

 In Short, cryptographic programs allow you to store information within the program using extremely complex algorithms to password protect any file you store within the program. Sometimes, it is good to use multiple encryption programs on sensitive data such as trade secrets for business and personal information.  For example: create a Truecrypt partition, then encrypt THAT partition using Kremlin - Some great crypto programs I use are:

1) Truecrypt Download it Here

Safeguard your data against snoopers and/or adversaries. You create a partition, which is basically a locked folder for storing files that you can protect with a password. You can even add an image to the unlocking process for extra security measures. So a would be snoop would need to enter the password AND attach the correct picture in order to unlock your partition. You can also create a hidden partition within a partition, so an adversary forcing you to open your Truecrypt file can be duped as you open the "false" partition, which you will fill with non random files you don't care if people see.

Main features:
Algorithm Designer(s) Key Size
Block Size (Bits) Mode of Operation

AES J. Daemen, V. Rijmen 256 128 XTS
Serpent R. Anderson, E. Biham, L. Knudsen 256 128 XTS
Twofish B. Schneier, J. Kelsey, D. Whiting,
D. Wagner, C. Hall, N. Ferguson
256 128 XTS
256; 256 128 XTS
256; 256; 256 128 XTS
256; 256 128 XTS
256; 256; 256 128 XTS

Kremlin Encrypt -  Download it Here

Not only does Kremlin feature secure encryption with such algorithms as Blowfish, and RC4, Kremlin does more: Kremlin builds a wall around your computer.
In its most secure setting, Kremlin uses 160 bits of encryption key. It means that if one billion computers were each searching one trillion keys per second, it would take over 1019 years to recover a file encrypted with Kremlin. That's 10,000,000,000,000,000,000 years, much more than the life of the universe! Kremlin is so secure that the U.S. Government considers it a munition! To snoops, Kremlin is a deadly weapon.
Kremlin builds a wall around your data
  • When you log off, Kremlin clears sensitive areas of your hard disk and wipes all records of your activities.
  • Kremlin automates the process of securing your computer by scheduling itself to secure portions of your hard disk and all used memory when you log off your computer or your computer becomes idle.
  • Kremlin can automatically encrypt files and directories when you log off your computer and decrypt them when you log back on, providing a transparent way to protect your files from nosy intruders.
  • Kremlin provides a full-featured and secure text editor that automatically encrypts your documents. You can e-mail a secret memo to a co-worker from within Kremlin Text.
  • You can securely remove files from your computer by dragging them to the Kremlin Secure Recycle Bin (Windows) ot Kremlin Secure Delete (Mac OS).
  • Kremlin is cross-platform. You can encrypt your information on the PC and decrypt and use it on the Mac and vice versa.

If you are interested in more information on cryptography then I suggest heading over to this Cryptology Research website. 

A great book on the history of cryptography is "Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age" by Author Steven Levy.  The Book is extremely insightful and gives you an in depths analysis on the rise of crypto as well as some key players in the movement.

 PGP - Pretty Good Privacy - 
Developed by Phil Zimmerman was one of the first cryptographic programs widely available for download in the internets infancy stage.  Originally PGP used the RSA algorithm, which he did not obtain the proper license for.  Phil Zimmerman distributed PGP through a thirDjigzod party as to not get caught up in the crypto exportation laws of the early internet.  Government agencies such as the NSA were strict on crypto exportation and required key lengths to be shorter than American releases, allowing them to snoop on international adversaries in the name of national security.  After many battles with the government and their exportation laws, as well as the RSAgroup, PGP gave birth to a plethora of pro-crypto movements 
and programs

GNU Privacy Guard - GNUpg -
GnuPG is the GNU project's complete and free implementation of the OpenPGP standard as defined by RFC4880 . GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications. A wealth of frontend applications and libraries are available. Version 2 of GnuPG also provides support for S/MIME.

Email Encryption

Open PGP

OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil Zimmermann. The OpenPGP protocol defines standard formats for encrypted messages, signatures, and certificates for exchanging public keys.

Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or at rest, can read the content. Today, companies and governments realize that this is unacceptable. Email needs to be confidential, email needs to be encrypted.
DJIGZO offers open source products that help to automatically secure email and protect against unauthorized access of email in transit and at rest.
DJIGZO Email Encryption Gateway is a standards based centrally managed email server (MTA) that encrypts and decrypts your incoming and outgoing email at the gateway level. DJIGZO Email Encryption Gateway is compatible with any existing email infrastructure like Microsoft Exchange and Lotus Notes and has support for S/MIME and PDF encryption.
Data Leak Prevention (DLP) is a module that can be used to prevent certain information to leave the organization via email. DLP can configured to filter on credit card numbers, bank account numbers, excessive amounts of email addresses or other personal information in one email message, and more. DLP is implemented as a filter on outgoing email.
BlackBerry logo DJIGZO for BlackBerry® is an add-on to the DJIGZO Email Encryption Gateway which can be used to send and receive S/MIME digitally signed and encrypted email from a BlackBerry® smartphone.
Android logo DJIGZO for Android DJIGZO for Android is an Android application which can be used to send and receive S/MIME digitally signed and encrypted email.
DJIGZO can be installed on most Linux and Unix based systems. Installation packages are available for Ubuntu, Debian, Red Hat and CentOS. A ready to run virtual appliance for VMware and Hyper-V is available.

Great Articles and How-To-Guides on Encryption
PC world - how to encrypt your email
Life Hacker - how to encrypt your email - PGP - Get PGP

 Ghostery -  Anti Tracking Tool

Your online activities are tracked by organizations, businesses, governments and other data mining companies in an effort to provide intelligence about online activities.  This informaiton is typically gathered and sold to various entities for marketing purposes.

"Ghostery tracks over 1,200 trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity."

Using Ghostery helps you gain control on who is tracking, accessing and trading your personal data and online habits.  There is a huge move by business and the government to allow the sharing of your activities, that is why the establishment is attempting to pass CISPA.

 Download it here!
Here is some information from their website:
Firefox Full detection of tracker scripts, img tags, and iframes from over 1000 data collection services Blocking capability for each detected element 2.9.4 Download Ghostery for Firefox now!
Safari Full detection of tracker scripts, img tags, and iframes from over 1000 data collection services Blocking capability for each detected element 1.4.2 Download Ghostery for Safari now!
Google Chrome Full detection of tracker scripts, img tags, and iframes from over 1000 data collection services Blocking capability for each detected element 4.1.1 Download Ghostery for Google Chrome now!
Opera Almost full detection of tracker scripts, img tags, and iframes from over 1000 data collection services Blocking capability for each detected element 0.10.0 Download Ghostery for Opera now!
Internet Explorer Full detection of tracker scripts, img tags, and iframes from over 1000 data collection services Blocking capability for each detected element 3.1.0 Download Ghostery for Internet Explorer now!

Ghostery for Mobile - iOS Full detection of tracker scripts, img tags, and iframes from over 1000 data collection services Blocking capability for each detected element 1.2 Get Ghostery from iTunes Store now!

NO Script - Script Blocker Addon for Mozilla Firefox

Direct Download Here 

Many times, when you go onto a website, flash banner ads and "pop up" windows will open and display an advertisement.  Sometimes malicious scripts run in order to plant  viruses,  steal informatioin or redirect you to other webpages .  NoScript is a powerful tool that blocks Javascript and Flash scripts from running in your browser.  If you trust a website, or wish to view a video (which typically uses Flash) you can allow the script to run on that webpage.

True Story, bro - I personally accessed a file sharing website which ran a script that completely funked up my internet browser.  Things started going haywire and I could not regain control of my computer - So I had to reinstall my operating system.  I began searching for a way to block scripts from automatically running.  I wanted to pick and choose which scripts would be displayed, that is when I came across Noscript.  I have been a faithful user for years and have recommended it to many people.

Details from the NoScript website:
  • The NoScript Firefox extension provides extra protection for Firefox, Seamonkey and other mozilla-based browsers: this free, open source add-on allows JavaScript, Java, Flash and other plugins to be executed only by trusted web sites of your choice (e.g. your online bank).

  • NoScript also provides the most powerful anti-XSS and anti-Clickjacking protection ever available in a browser.

  • NoScript's unique whitelist based pre-emptive script blocking approach prevents exploitation of security vulnerabilities (known and even not known yet!) with no loss of functionality...

  • You can enable JavaScript, Java and plugin execution for sites you trust with a simple left-click on the NoScript status bar icon (look at the picture), or using the contextual menu, for easier operation in popup statusbar-less windows.

Friday, November 9, 2012

N.O.D. Music by x2die and Freedumb

Thursday, March 10, 2011

Pic Dump

Keep em on their toes

Tuesday, January 18, 2011

Sodahead Questions - Opinions....Everybody's got one.

SodaHead is a dynamic discussion community where you can discover, debate and discuss issues that get you fired up. Over 1.5 million SodaHeads share their unique views on hot topics, breaking news and controversial issues and a diverse panel of staff writers provide original and exclusive content daily. With that many angles, the discussions on SodaHead will open your eyes to a panoramic view of your world that you won't get anywhere else, allowing you to see the big picture and discuss it!

Monday, December 6, 2010

Is Wikileaks Founder Julian Assange the Victim of a Conspiracy?

Julian Assange, founder of the controversial whistleblowing website has been relentlessly attacked by the media, governments around the world & internet geeks everywhere. Firstly, why are internet geeks angry with Assange? From what I can tell, many view his actions as contributing to the reasons why the US government is attacking the internet & limiting the free exchange of information.
I won't mention any specific websites, but I have witnessed Wikileaks being targeted by those of the lurker variety, those who call themselves "Anonymous." An organized dDos attack was underway, and community participation was encouraged. On the other hand, "Anonymous" seemed to be split on the issue. Many support Assange as a Revolutionary who is exposing the corrupt actions of our government. Others support him simply because of their belief in the protection of free speech.

The NYTimes mentions the group in an article entitled Hundreds of WikiLeaks Mirror Sites Appear... unfortunately,they did not provide you with any of those mirror sites, which apparently number in the 500's.

Edit* The first list I posted is no more, go HERE. :)

Celente on WikiLeaks 'Cablegate': They want transparent govt - Let's have It!

Gerald Celente, owner of the Trends Research website can be counted on to blast through the agenda ridden deception of the mainstream media. Celente was interviewed about Assange by the Russia today news network back on Nov. 30, the following video was posted on the RTAmerica Youtube Channel

...Notice what Celente says @ 2:15; "They're going to start closing down sites." Apparantly that is not a baseless assertion. If you havent been living under a rock for the past year, they already HAVE been shutting sites down.

According to this Guardian UK article, a New York federal court forced LimeWire to cease operation back in late October.

You cannot even access the Limewire Website. A window pops up explaining they have been forced to cease software distribution by a federal court order; you can read the Injunction PDF here. Limewire urges all unauthorized apps to stop being distributed, and reminds people that uploading & downloading copyrighted material is illegal.

Could free speech on the internet be under attack as we speak? The answer is yes, it is under a direct orchestrated attack by the "elite" power forces of the world, who consider the internet too much of a liablibity; due to the exchange of free information and a large move away from reliance on establishment sources to alternative media. Since the establishment is no longer the primary source of info, they are losing their "grasp" on the minds of the masses. No longer are we strictly adhering to the manufactured, socially engineered mainstream mass reality, we are breaking through the facade, sleepily and sheepishly awakening from a lifelong lucid dream....

Jay Rockefeller: "Internet should have never existed" Youtube video.

Coming from a family who helped found the eugenics movement; these comments are extremely disturbing. Once again, an example of a wealthy "elitist" who get's off on playing God. In this video, when compared to the reality of today's headlines it seems as if the elite have been setting the stage for an internet crackdown for quite some time now.

Media uses propaganda to distract from Assange, WikiLeaks

Sites like Wikileaks, are a detriment to the secretive and sometimes shady tactics of the U.S. Goverernment, for it exposes them, and WE THE PEOPLE may hold them accountable for their atrocities. So naturally, the "elites" who face exposure would be scrambling to limit the information from spreading; they may also takes steps to counter-act the leaked documents social impact by damaging the credibility of Wikileaks...which they have.  An example is the rape allegation against Assange which the media has been feeding on.

Corporatism is killing free speech.

I say corporatism, because capitalism is not the fundamental problem. Abuse of the system of capitalism, is the problem. Main st. is suffering due to corporatism, and if we continue down the path we are headed here in America, the middle class will be forcefully truncated into the lower; ever widening the gap between the people, and the power, for if we have no way to fund our ourselves or our grassroots movements, we then cannot battle the system that is enslaving us; this is part of the social engineering aiming to collapse America.

Recently, "the man" has made efforts to give the federal government power to takeover the domain name's of websites that it deems an enemy. They are targeting torrent & wares sites, but could the whole internet crackdown be part of a wider agenda?

How to take Action

No Internet Takeover, a project started by the folks at the
Americans For Prosperity website, allows you to sign a petition against the FCC's regulation of the internet.  You can also write Congress a letter urging them to stop this madness, you can do that here.

The Citizen Media Law Project is a site which gives legal advice/protection to those who are being attacked through the court system for expressing their views through blogs, film, media etc... These attacks are called  "SLAPP's."

TheElectronic Frontier Foundation 
  as another great resource.

I'll update randomly as I see fit.

Thanks for reading. Please share!

Sunday, November 28, 2010

DA Calling to Investigate Felony Groping by the Federal TSA Gestapo

San Mateo, California DA Steve Wagstaffe recently made an appearance on the Alex Jones radio show, which I stream from every few days or so. Wagstaffe seemed adamant about keeping TSA in check, claiming that he will investigate felony groping and prosecute TSA agent's according to state & local law, without any special treatment.

The patdowns, which Homeland Security forced TSA to impose as an alternative for passengers who opt out of the Body Scanning process; have stirred up a large amount of controversy these past weeks as more and more reports of abusive interactions with TSA agents have surfaced.

For example, this video; where a man's colostomy bag burst's after an over aggressive TSA agent terrorized the poor man.

TSA Pat-down Leaves Mich. Man Covered in Urine - Associated Press Youtube report

This CBS News report details several viscous encounters with "TSApigs" including the violent stripping of a young woman & the harassment of a wheelchair-bound person.

Alternative articles:

Go to and read
The Freedom Watch Archives section, specifically this article

Furthermore, the folks at the have additional information on Wagstaffe's & the San Mateo prosecutors position; who are addressing the TSA situation (in my opinion) in the right manner. You can view one of the articles here although after searching a couple pages, you may need to sign

In this next video, John Tyner leaves his phone recording while going through the TSA security one point he says"..if you touch my junk, I am going to have you arrested"  which resulted in the "Don't touch my junk" slogan that is being spouted throughout media outlets.

TSA Screening, Terminal 2, SAN, Nov. 13, 2010 - part 1

"Don't touch my Junk" becoming a new internet meme????

Wednesday, November 24, 2010

Woman Sentenced to Death in Pakistan for Blasphemy

Woman Sentenced to Death in Pakistan for Blasphemy

Asia Bibi, a Christian woman was recently sentenced to death for insulting the Muslim's prophet, Muhammad. Pakistani President Zardari may pardon her, but only with the approval of the Prime Minister and the High Courts.

According to Shahbaz Bhatti from the Pakistani Minister for Minority Affairs "The president asked me to investigate her case, and my preliminary findings show she is innocent and the charges against her are baseless."

A quick Google search for Asia Bibi shows how far the mainstream American media is distancing itself from the issue, only a few have reported; most from overseas.

The Telegraph
The Huffington Post
The trouble started when Bibi insulted the Prophet Muhammad after a confrontation with co workers who refused to drink from a water bucket that she "touched"

The Manifesto of the Pakistan Peoples Party are pushing for the anti-blasphemy law to be repealed, but they lack the majority in parliament.

According to this article Pakistani religious leaders are battling the government on the anti blasphemy law, clearly angered that their government would pardon Bibi.

The Asia News network is heading a movement demanding the instant release of Asia Bibi. Read this article on Jihad Watch

You can support the AsiaNews movement by
emailing them @

or why not

email the Pakistani President, demanding Bibi's release?

Saturday, November 20, 2010

New World Order Documentary Film List - 2010 Edition

Comprehensive New World Order Documentary Film List - 2010 Edition

WIP and will be updated frequently!

American Drug War The Last White Hope - Kevin Booth

Immanuel Velikovsky - Worlds in Collision (Horizon - January 11, 1973) Favorite
The Decline and Fall of America

Wake Up Call - Remastered Edition

Alex Jones
1998 America: Destroyed by Design

1999 Police State 2000

2000 America Wake Up or Waco

2000 The Best of Alex Jones

2000 Dark Secrets Inside Bohemian Grove

2000 Police State II: The Takeover

2001 Comprehensive Annual Financial Reports: Exposed
2002 911: The Road to Tyranny

2002 The Masters of Terror: Exposed

2003 Matrix of Evil

2003 Police State 3: Total Enslavement

2004 American Dictators: Documenting the Staged Election of 2004

2005 Martial Law 9-11: Rise of the Police State

2005 The Order of Death

2006 TerrorStorm: A History of Government-Sponsored Terrorism

2007 Endgame: Blueprint for Global Enslavement

2007 Endgame 1.5

2007 TerrorStorm: A History of Government-Sponsored Terrorism - Second Edition

2007 Loose Change: Final Cut by Dylan Avery Alex Jones: Executive producer

2008 The 9/11 Chronicles: Part 1, Truth Rising

2008 Fabled Enemies by Jason Bermas Produced by Alex Jones

2009 The Obama Deception: The Mask Comes Off

2009 Fall of the Republic: Vol. 1, The Presidency of Barack H. Obama

2009 Reflections and Warnings: An Interview with Aaron Russo

2010 Police State IV: The Rise Of FEMA

2010 Invisible Empire: A New World Order Defined by Jason Bermas )Produced by Alex Jones

2010 The Fall of America and the Western World by Brian Kraft (part 1 of 31)

9/11 Documentaries
Continuous Pieces 9/11 V2.0 (part 1 of 8)


Black Panthers - Huey P. Newton: Prelude to Revolution

Black Panthers - Mayday

Black Panthers - Off The Pigs

Black Panthers - Repression

1987: CIA The Secret Government Of The USA

Science, Technology, Medicine, Food, and natural

Chernobyl & Pripyat 2007 (independent documentary) by Jason Strain

SRI-Experiments with Uri Geller

Google: Behind the Screen (IJsbrand van Veelen VPRO 2006)

HA ARP Holes In Heaven

The Missing Secrets Of Nikola Tesla

Nikola Tesla - The Genius Who Lit the World

Aerisol Crime (aka Chemtrails) - Clifford E Carnicom


The Classical Liberal Theory of Empire [Ralph Raico]

The Case for Free Trade, Not Imperialism [Walter Block]


Enron-The Smartest Guys in the Room

Life and Debt - Stephanie Black

The Money Masters - How International Bankers Gained Control of America


Iwo Jima: 36 Days of Hell (part 1)

North Korea - out of The North - BBC Documentary (part 1 of 3)

Islam/Israel/Middle East

Obsession - Radical Islam's War Against The West

Politically Incorrect Guide To Islam - Robert Spencer

Who is Afraid of Islam? (episode 1)

Islam: What the West Needs to Know

Documentary 'The Israel lobby - The influence of AIPAC on US Foreign Policy'

Where in the World is Osama Bin Laden?

Illuminati & and the Freemasons

Secret Mysteries of Americas Beginnings The New Atlantis — Volume 1

Secret Mysteries of America's Beginnings 2 - Riddles in Stone - Secret Architecture of Washington, D.C.

Secret Mysteries Of America's Beginnings - Vol 3 - Eye Of The Phoenix, Secrets of the Dollar Bill

The Illuminati 2-The Antichrist Conspiracy (part 1 (part 2) (part 2)

The Illuminati 3 – Murdered by the Monarchs

Trials Of Henry Kissinger

Thursday, November 18, 2010

Nation of Degeneration Music

If you have an extra minute, check out my instrumental page on Myspace.

I'm looking for people to collab with...Audio Engineers with mixing skills, Instrumentalists & Vocalists...anybody who is seriously attempting to pursue a career based on their ideas & talents...whether it be Revolutionaries with deep spoken word... socially conscience writer's, journalist's and bloggers... even graphic designers, web developers and other internet geniuses.

Contact me here

Wednesday, November 17, 2010

Naked Body Airport Scanners - TSA Invading the Lives of Americans.

I'm wondering at what point will Americans realize they are being slowly pacified and conditioned into domesticated, controlled, predictable pets; with a willingness to sacrifice their own freedoms, while disillusioned by the manufactured reality.

I've heard the fuss throughout the internet about these "naked body" airport scanners.  I asked myself these 2 questions.

1)Has ANY American been “caught” by the TSA trying to smuggle deadly liquids, gasses or anything other hazardous materials on-board an airplane with the intent of harming others? 
I can’t find 1 article other than the “Underwear Bomber” which was clearly staged and used as a pretext to usher in the naked body scanners.

2)Should children be subjected to scanners that create naked images of their bodies? Should they receive intrusive pat downs that border on molestation?
Clearly the answer is NO, and to me, any parent that consents to let their child be interrogated by the cold hearted(and sometimes brutal) searches of TSA agents….Does not care about the welfare of the child.  As of late, TSA have even been putting their HANDS DOWN people’s clothing, touching their genitals.  There is no possible way I would EVER subject my children to these sickening grimy pedophile’s, viciously fondling children, scaring them into tears…What type of effect occurs from violation?  TSA has gone too far and needs to be stopped, I suggest forming political alliances aimed at passing bills that will protect American’s and our children against these monstrous acts.

There is some hope, according to a New York Times article, New Jersey officials are opposing the scanners, stating that they violate Americans rights and invade privacy.

These scanners are meant to snoop further into our lives.  Not to "save us from the terrorists" That is a load of garbage.  They think we're so stupid, they figure we're to politically disinterested to take action against their abuse.  They continuously overstep their boundaries, dismissing and down playing all opposition.

Here's a video that infuriated me...

Do you see how those smug newscasters are laughing off the issue...treating it lightly so the easily frightened sheep won't stir...A common tactic media outlets use to gain support to a newly introduced agenda. 

Slowly Americans are being conditioned into total submission to ANY entity deemed as “authority.”  Are we to bow down to people like this?

Those who seek positions of power and control over others, tend to be full of themselves, they believe they hold higher status within the hierarchy.  You are to be viewed as an animal, a subject, a possible terrorist….American government views us all as potential domestic terrorists, and will continue to push the boundaries of personal invasion, until they control & dictate every aspect of our personal life. 

/end rant

Thursday, November 4, 2010

End of Liberty - By the NIA - Inflation US Documentary

"End of Liberty" is a documentary outlining the level of absurdity that the American government has risen to. The film was produced by the National Inflation Association which is primarily a business/financial news site that gives insider advice and notes key economical trends. Instead of Google searching lil weezy getting out of jail or the SF Giants riot; you should visit the site to watch the documentary.

The InflationUS Youtube Channel has 146 videos, nearly 20,000 subscribers, and about 7.5 million video plays, a clear indication that people are waking up to the tyranny. The videos: a plethora of news clips, interviews, and solo rants exposing the harsh, and sometimes hilarious tactics the US government uses in order to expand and maintain control over the population.
You can view the InflationUS Youtube channel here:

As of today "End of Liberty" on Youtube has less than 200,000 views, this alone is an injustice.

Please post this video onto your Facebook or other social networking sites, Digg the link, email it to friends and family, anything you can do to spread the word. Break through the facade and help expose the corrupt elite engineering the cataclysm.



Sponsers and Affiliates

Your banner here.