?????????????????????????

Download & Forward PDF

David Chase Taylor
December 16, 2014
Truther.org

SWITZERLAND, Zurich — Unable to execute an EMP attack or man-made asteroid strike thus far in 2014, it now appears that the CIA, a global entity which is in command and control of all 206 countries and their respective governmental agencies, is planning to stage some sort of space-based phenomenon as an excuse to take down the internet, possibly for good.. This unprecedented event is expected by Doomsday, December 21, 2014.

Exactly what type of space-based phenomenon will be scapegoated as the primary cause of the blackout is not known, but a number of different phenomenon have been portrayed as threats in the media as of late (e.g., asteroids, comets, meteors, meteorites, magnetic field of Earth, radio bursts, the moon, solar flares, space storms, the sun, etc.).

In what appears to be pre-blackout programming, it was reported on December 12, 2014, that the U.S. Department of Homeland Security has state that 100 million Americans could “lose power” in a major sun storm. Considering that the Earth has never experienced a major sun storm during the age of electricity, it can be deduced that the propaganda report was published in order to program Americans for the introduction of a space-based phenomenon which will be scapegoated as the cause of the loss of electricity.

?????????????????????????????????????????

Blackouts Trending
In order to psychologically program the world for the eventual loss of electricity, it was reported on November 2, 2014, that a country-wide blackout occurred in Bangladesh after the power grid inexplicably collapsed. Exactly one month later on December 2, 2014, it was reported that the entire city of Detroit, Michigan went dark after a massive power outage. These beta tests will likely be witnessed on a global scale in the wake of a man-made space-based phenomenon such as a space storm.

Electronic Grids Vulnerable to Space
In what appears to be state-of-the-art propaganda aimed at convincing humanity that the world’s electronic grids and systems are vulnerable to an array of space-based phenomenon, it was reported on April 25, 2014, that massive solar flares triggers temporary communications-related blackouts on parts of Earth. Roughly 2-months later on June 11, 2014, it was once again reported that solar flares disrupted communications on Earth. Lastly, on November 7, 2014, it was reported that a solar eclipse was threatening Europe’s solar grid, further confirming that electrical grids are the intended target. Based on this small sample of reports, it can be deduced that terrestrial communication grids (e.g., power grids, internet grids, etc.) will suffer a total blackouts due to some form of space-based phenomenon, possibly solar-related.

Killer Electrons
In what appears to be the #1 space-based phenomenon that will be scapegoated in the aftermath of a global blackout, it was reported on November 29, 2014, that scientists have discovered a “killer electron” shield just 200 miles above Earth. According to the report, a team of researchers led by scientists at the University of Colorado Boulder, have discovered a “Star Trek”-style shield located above Earth. According to their research, the shield blocks “killer electrons” from reaching Earth. In other words, Earth is being threatened and this shield protects Earth. Therefore, if and when this mythical shield is destroyed in a solar storm or due to some other unknown form of space-based phenomenon, the “killer electrons” will kill electricity on Earth, hence the name. Needless to say, a cheesy and disingenuous government and media narrative could not be produced.

Global Blackout Hoax
Aside from the plethora of space storm-related propaganda which has been disseminated by the government and media (see list below), CNN published an iReport on September 20, 2012, entitled “NASA Predicts Total Blackout on 23-25 Dec 2012 During Alignment of Universe”. The story was uploaded onto CNN’s iReport in order to further acclimate the public to the notion of a global blackout. Although the report was all allegedly published in 2012, all the social media response to the story came in 2014 which suggests that the story was purposely pre-dated. This confirms, albeit in a de facto manner that the plan to execute a global blackout is pulling out all the stops to pull off this hoax. After CNN’s blackout story went viral on the internet, television and social media, NASA confirmed on October 24, 2014, that no global blackout is predicted in December of 2014. By working in tandem, CNN and NASA were able to quickly and effectively spread the false notion of a global blackout by first claiming that it was true and then quickly stating it was a hoax.

NASA Hoax

6 Days of Darkness Hoax
Aside from the plethora of space storm-related propaganda which has been disseminated by the government and media (see list below), Huzzlers published a report on October 28, 2014, entitled “NASA Confirms Earth Will Experience 6 Days of Total Darkness in December 2014!”. After the hoax went viral on the internet, television and social media, NASA confirmed on October 28, 2014, via a Times of India report entitled “NASA’s ‘Six Days of Total Darkness in December 2014’ is a Hoax” that the story was not true. By working in tandem, state-sponsored web blogs along with NASA were able to quickly and effectively spread the false notion of 6 days of darkness by first claiming that it was true and then quickly stating it was a hoax. The fact that NASA addressed the outlandish claim to being with confirms that they were party to the propaganda.

Space Storm Terror Trending
Prior to a high-profile space-based phenomenon attack, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced space-based phenomenon terror is now at an all-time high which suggests that a state-sponsored space-based phenomenon attack is imminent.

Space Storm Propaganda Headlines:

1. March 31, 2014: Major Solar Flare Erupts from the Sun
2. April 25, 2014: Massive solar flare triggers temporary communications blackout on parts of Earth
3. May 7, 2014: NASA captures huge explosion on the surface of the sun
4. May 13, 2014: Rare meteor shower may turn into a storm next week
5. May 15, 2014: Do Solar Winds Whip Up Lightning Storms On Earth?
6. June 1, 2014: NASA captures close-up details of solar storm for first time
7. June 11, 2014: Solar Flares Disrupt Communications on Earth, Could Send Shockwaves
8. June 24, 2014: Weakening Of Earth’s Magnetic Field Revealed By ESA’s Swarm
9. July 9, 2014: NASA Voyager I struck by solar tsunami, now confirmed in interstellar space
10. July 11, 2014: Scientists ‘Have No Handle On’ Radio Bursts Coming From Deep Space
11. August 1, 2014: Killer solar superstorm could destroy Earth at any moment, scientists warn
12. September 11, 2014: ‘Giant magnetic explosion on sun’ racing to Earth
13. September 11, 2014: Solar storm heading for Earth
14. September 20, 2012: NASA predicts total blackout on 23-25 Dec 2012 during alignment of Universe
15. October 24, 2014: No, NASA Has Not Predicted A Global Blackout in December
16. October 24, 2014: Massive sunspot: 80,000 miles across, active sunspot energy could affect Earth
17. October 26, 2014: Jupiter-Sized Sunspot Largest for 24 Years
18. October 28, 2014: Nasa’s ‘six days of total darkness in December 2014’ is a hoax
19. October 28, 2014: NASA: Earth Will Experience 6 Days of Total Darkness in December 2014!
20. November 7, 2014: Solar eclipse threatens Europe solar grid, temp ‘may drop 6C in 30 minutes’
21. November 9, 2014: Mars hit by once-in-8-million years comet dust shower
22. November 29, 2014: Scientists Discover “Killer Electron” Shield 200 Miles Above Earth
23. December 12, 2014: DHS: 100 Million Americans Could Lose Power in Major Sun Storm

[Does not purport to be a complete list of space storm-related headlines]

grid2exfp

“GridEx II” Power Grid Drill
Considering that on November 13-15, 2013, a massive power grid terror drill entitled “GridEx II” was executed on the East Coast of America, there is a real possibility that some sort of space-based phenomenon will be blamed in order to take down the internet in America for good. According to the August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

customLogo.gif

Download & Forward PDF

David Chase Taylor
December 21, 2014
Truther.org

SWITZERLAND, Zurich — Greenland Theory: Apocalypse Now” (2014) is a new book by David Chase Taylor which explores the unrecognized but mighty conspiracy which has been hidden from humanity for ages, unfortunately to the detriment of all life forms which have inhabited planet Earth.

Briefly, the Roman Empire, commonly referred to as Ancient Rome, evidently faked its own death 714 years ago and now excerpts command and control of all 206 nations of the world though its primary proxy state of Switzerland which was coincidently formed in c.1300 A.D., exactly 714 years ago.

Roughly 1,300 years were added to the modern Gregorian calendar, taking the world to the date of 2014 (The Roman New Year officially starts on April 1, April Fool’s Day). The 1,300 years which were added to the calendar are commonly referred to as the “Dark Ages” for they never saw the light of day.

The capital of the Roman Empire was the city of Babylon (i.e., modern day Rome, Italy), and although it was later publically moved to Constantinople (modern day Istanbul, Turkey), the true capital was secretly moved to the new city of Thule which was founded on the island of Greenland.

The alleged fall of the Roman Empire and the notion that Greenland is mostly covered ice and snow are both colossal hoaxes perpetrated onto the world in order for Rome to collectively deceive and survive her enemies of the day (i.e., the Persian Empire, the Yuan Dynasty, the Ming Dynasty, etc.), and for the Roman Empire to thrive unchecked and unabated in Greenland.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCTtruther-rss

cnnasteroid

Download & Forward PDF

David Chase Taylor
December 21, 2014
Truther.org

SWITZERLAND, Zurich — Back on December 10, 2013, Truther.org published a terror warning in respect to a man-made asteroid attack from the alleged comet known as ISON. Less than 24-hours later, comet ISON was officially declared dead by NASA.

Although the brazen attack was ultimately thwarted, the plot to terrorize humanity with a man-made asteroid is unfortunately alive and well. Based on breaking news and events, namely the 22 asteroids, comets, fireballs, meteoroids and meteorites (see list below), which have entered or passed by planet Earth within the last year, another man-made asteroid attack now appears imminent.

Aside from the plethora of space rock attack propaganda (see below) which has been disseminated by the government and media, CNN reported on May 27, 2014, that a giant asteroid is possibly on a collision course with Earth. The report was uploaded onto CNN’s iReport in order to further acclimate the public to the notion of an asteroid attack.

After CNN’s asteroid story went viral on the internet, television and social media, NASA confirmed on May 28, 2014, that an asteroid is not on a collision course with Earth. By working in tandem, CNN and NASA were able to spread the false notion of an asteroid attack globally by first claiming that it was true and then quickly stating it was a hoax.

When the European Space Agency (ESA) allegedly landed the Philae spacecraft on the 67P/Churyumov–Gerasimenko comet which was reportedly traveling 84,000 MPH, it was a publicity stunt designed to program the masses for the impending asteroid attack. The November 12, 2014, comet landing is completely debunked in the Truther.org report entitled “10 Reasons Why the Rosetta Comet Landing was a Hoax”.

If and when a Doomsday asteroid strikes planet Earth, it will most likely land in the Pacific Ocean and the so-called Ring of Fire, causing earthquakes, tsunamis and volcanoes. The man-made asteroid would never strike land because there it could be located, examined and tested by scientists for its authenticity. This obviously cannot be allowed to happen so it must quickly sink into the abyss of the ocean never to be seen again.

Asteroid_m

2014 UR116 Asteroid
Back on November 25, 2014, Truther.org published a man-made asteroid warning in respect to the Beast” aka “2014 HQ124”. The report stated that in the event that “The Beast” is not used as the man-made asteroid culprit, a backup asteroid known only as 2014 UR116 has also been primed. Similar to “The Beast”, scientists estimate that if 2014 UR116 strikes Earth, the explosion would be 1000 times more potent than the Chelyabinsk meteor explosion in 2013. Predictably, on December 8, 2014, the Christian Science Monitor published a report entitled “Russian Scientist Spies Mountain-Sized Asteroid Heading Our Way”. According to the report, the asteroid known only as 2014 UR116 is a huge, mountain-sized asteroid that Russian astrophysicists say is heading towards Earth. Although there is allegedly no immediate threat, the asteroid will likely be scapegoated for the impending Doomsday man-made asteroid strike.

Space Rock Activity at All-Time High
Reports in respect to asteroids, comets, fireballs, meteors, meteorites and streaking lights are currently at an all-time high. This phenomenon commenced on November 28, 2013, just prior to the slated arrival of the man-made comet ISON on December 10, 2013. This sudden influx of space rocks confirms that there is a concerted agenda to develop a believable asteroid narrative prior to an unprecedented and earth changing Doomsday asteroid-like attack.

2013-2014 Space Rock Timeline:

1. November 28, 2013: Meteor confirmed as cause of loud boom in Quebec, Ontario
2. December 29, 2013: Blinding fireball meteor caught on CCTV shooting across night sky
3. February 13, 2014:
Mysterious fireball in the sky caught on camera
4. February 24, 2014: Biggest meteor ever recorded hits Moon
5. March 4, 2014: 98-foot asteroid flashes between moon and Earth within 24 hours
6. March 19, 2014:
Asteroid 163 Erigone blots out star
7. April 3, 2014:
Meteorite narrowly misses Norwegian skydiver
8. April 21, 2014: Dazzling Meteor Fireball Streaks Across the Sky in Northern Russia
9. May 3, 2014: Bus-Size Asteroid Buzzes Earth, Comes Closer Than the Moon
10. May 5, 2014: Bright daytime meteor seen over Canada and U.S. Northeast
11. May 16, 2014: Australia: Flaming Ball Falls from Sky and Crashes ‘Like a Bomb’
12. May 24, 2014: Comet to pass by Earth closely after meteor shower
13. June 6, 2014: Enormous ‘Beast’ Asteroid to Fly Past Earth on Sunday
14. July 11, 2014: Mystery ‘meteor’ burning over Australian sky baffles eyewitnesses
15. September 8, 2014: Large space object slams Nicaragua’s capital as asteroid passes Earth
16. September 8, 2014: Great balls of fire: Meteor illuminates Spanish skyline
17. September 12, 2014: Strange Streak Of Light In San Francisco Area Sky on Friday Morning
18. September 15, 2014: ‘Fireball’ reported along East Coast Sunday night
19. October 9, 2014: Man Believes Debris Fell From Sky Onto Secaucus
20. November 3, 2014: Meteor streaks over eastern US Monday night
21. November 9, 2014: Fireball lit up Texas sky, residents say; was caught on camera
22. November 18, 2014: Massive flash over Russia’s Urals stuns locals & scientists

[Does not purport to be a complete list of space activity]

I. ASTEROID ATTACK SET-UP:

Asteroide-2014-HQ124-bestia-2

1.1: Surprise Asteroid Attack
In order to gain plausible deniability in the aftermath of Doomsday asteroid, comet or meteoroid strike, NASA has created a media narrative whereby they will be “taken by surprise” when an alleged space rock suddenly appears out of the east, directly in the Sun’s glare. This is likely why reports on ISON were so ambiguous since ISON’s all alleged trip around the sun. An indication of exactly how this particular scenario would play out occurred on March 7, 2013, when it was reported that an asteroid the size of a city block would pass Earth that weekend. According to the report, “The asteroid was only discovered Sunday because search telescopes can’t find objects of that size until they get close.” Wikipedia further stated that the “2013 ET is a Near-Earth asteroid that was discovered on March 3, 2013, six days before its closest approach to Earth”. If and when the Doomsday asteroid, comet or meteoroid hoax is finally triggered, the world will likely have only a few days to panic prior to its alleged impact. A few weeks later on March 21, 2013, it was revealed that White House science adviser John Holdren reportedly wanted to put “an infrared telescope in a Venus-like orbit to spot asteroids that can’t be seen from the ground because they’re lost in the Sun’s glare” and that “the Chelyabinsk meteorite was exactly that kind of meteor, which came in from a direction that Earthbound telescopes can’t look in.” Bolden then stated, “If [the asteroid] is coming in three weeks…pray”. The January 10, 2013 propaganda report by Forbes entitled, “We Probably Wouldn’t Even See A Doomsday Asteroid Until It Was Too Late” indicates that the sneak attack by a wayward asteroid, comet or meteoroid is in fact part of the working Doomsday space terror script. The notion of a rogue asteroid was recently highlighted in a January 19, 2014 report entitled, “NASA says Mars Mystery Rock ‘Appeared’ from Nowhere”. Eleven days later on January 31, 2014, Christian Science Monitor published a report entitled, “Going Rogue could be the Norm for Asteroids, say Astronomers”. Although these reports were not directly made in respect to asteroids per se, they do confirm that a “surprise” asteroid attack is in play.

1.2: Asteroid Hunter Lost
If and when a Doomsday asteroid strikes Earth, government agencies like NASA will need plausible deniability to excuse their gross maleficence. Coincidentally, on September 10, 2013, it was reported that NASA conveniently lost contact with the comet-hunting Deep Impact spacecraft sometime between August 11 and August 14, 2013. This news was confirmed yet again 11 days later on September 21, 2013, when it was reported that NASA had officially closed the books on the most-traveled comet-hunter in history due to a “software bug” which subsequently cut off communication with the 9-year old spacecraft. The timely loss of the world’s greatest comet hunter suggests that the space attack depicted in “Deep Impact” (1998), a film (see trailer) about an apocalyptic asteroid strike on Earth, is now imminent. As of August 14, 2013, NASA is conveniently and officially blind to incoming Earth threatening asteroids, comets or meteoroids. In order to pretend that there is a real asteroid problem and that they are actively trying to thwart an impending asteroid attack, a number of propaganda reports have been disseminated in order to give governments and their respective space programs the excuses they will need in the aftermath of an asteroid attack that kills millions.

1.3: “Chelyabinsk” Asteroid Beta-Test
In what appears to have been a beta-test for an impending Doomsdays asteroid, comet, o meteoroid strike, on February 15, 2013, a small asteroid struck in Chelyabinsk, Russia, allegedly injuring 1,500 people. This suspicious event was made even stranger because it happened on the same day that the asteroid known as “2012 DA14” flew by within 17,200 miles of Earth. According to Wikipedia, the Chelyabinsk asteroid was the largest known object to have entered Earth’s atmosphere since the 1908 Tunguska event, and it’s the only asteroid to date which has caused a large number of injuries. The “Chelyabinsk” event appears to have been nothing more than a staged beta-test to assess the hoax-ability of a future Doomsday asteroid, comet or meteoroid. Although this alleged asteroid strike was completely unexpected, there were numerous video cameras shooting its entry from almost every conceivable angle (all of which were recovered, downloaded, uploaded, edited, produced, uploaded again and broadcast within minutes of the event on February 15, 2013). The fake asteroid also appeared to burn out prior to ever hitting the ground, making the hoax even easier to pull off. A year later on February 15, 2013, it was reported that “conspiracy theorists” have claimed that the Russian meteorite was shot down by a military missile. Like most intelligence reports, the information was presented backwards. The reality is that the Chelyabinsk Asteroid was most likely a missile itself, albeit a doctored one designed to look like a meteorite. In order to rehash the Russian meteorite narrative just prior to an impending asteroid strike, it was reported on November 19, 2013, that a new meteor has once again struck Russia.

2.2: “Chelyabinsk” Asteroid Odds: 1 in 100 Million 
Aside from the question posed in the headline “Where Exactly Did The Russian Meteor Come From?”, there are other pressing questions in respect to Chelyabinsk asteroid of February 15, 2013, that demand answers. What are the chances of 2 major astrological events occurring on the same day? Where these 2 astrological events related to each other? In a February 19, 2013, CNN report entitled “A Meteor And Asteroid: 1 In 100 Million Odds”, the  notion that the two events were related was openly dismissed: “…the time between the two events, the Earth moved roughly 300,000 miles, meaning the asteroid and the meteor were in completely different places. So there is no way the meteor and the asteroid are connected. It has to be a coincidence that the two events happened on the same day….the chance of both events happening on any one day are indeed very small…about 1 in 100 million”. As luck would have it, the alleged manifestation of these two mathematically impossible asteroids just happened to coincide with hundreds of propaganda articles warning Earth of an impending asteroid strike.

Meteor Strike Illuminati Card Game

2.3: Doomsday Asteroid Programming
Hollywood movies blockbusters such asArmageddon” (1998) (see trailer) and “Deep Impact” (1998) (see trailer) were made with the sole purpose of psychologically preparing humanity for the notion that an asteroid could in fact strike Earth and that its aftermath would be apocalyptic in nature. Although there will likely be plenty of video footage of a Doomsday asteroid, comet or meteoroid striking Earth (people have to see it to believe it), the asteroid will quickly and conveniently disappear beneath the Pacific Ocean, never to be seen again. After all, a Doomsday asteroid will never strike land because there it can be located, examined and tested for its authenticity; that obviously cannot be allowed to happen. The notion of a man-made asteroid or meteor attack was ominously depicted in the “Meteor Strike” card of the Illuminati Card Game (1995). The game was created in order to program the conspiracy minded for upcoming events (e.g., 9/11) as well as to discount their man-made nature in the aftermath.

2.4: Asteroid Attack Propaganda
Prior to a high-profile man-made asteroid attack, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, space rock-related terror is now at an all-time high which suggests that a man-made asteroid attack is imminent.

Asteroid Propaganda Timeline:

1. April 17, 2014: Astronauts to reveal sobering data on asteroid impacts
2. April 19, 2014: Far More Asteroids Have Hit The Earth Than We Thought, Astronauts Say
3. April 20, 2014: Huge meteor explosion a “wake-up call” to Earth
4. April 21, 2014: Pat Robertson Says Doomsday Asteroid Could Hit Next Week
5. April 23, 2014: Group: Deadly asteroids more frequent than thought
6. April 23, 2014: Nuclear-scale asteroid blasts in atmosphere ’10 times more common’ than thought
7. April 23, 2014: Time-lapse video shows powerful asteroids strike Earth with surprising frequency
8. April 24, 2014: Risk of asteroid hitting Earth higher than thought
9. May 16, 2014: NASA’s Asteroid-Capture Mission May Test New Method to Defend Earth
10. May 27, 2014: Giant Asteroid Possibly on Collision Course with Earth
11. May 28, 2014: An Asteroid Is Not On A Collision Course With Earth, Despite CNN Report
12. October 2, 2014: US stores old nukes…to fight off asteroid threats
13. November 3, 2014: New asteroid discovered that may threaten Earth

[Does not purport to be a complete list of asteroid attack propaganda]

II. THE SPACEX PROGRAM:

2.1: SpaceX Program
Just as asteroid rhetoric and propaganda is reaching an all-time high, the mysterious space program entitled “SpaceX”  is working overtime. On May 25, 2012, SpaceX made history as the world’s first privately held company to send a spacecraft to the International Space Station (ISS). Curiously, almost everything SpaceX does, it does wrong, or at least that’s the way the alleged space transport company would like to be publicly perceived. Starting with its launch reported on October 8, 2012, SpaceX was allegedly sent into the wrong orbit because of a booster problem during launch. Four days later on October 12, 2012, the communications satellite flying piggyback aboard a SpaceX’s Falcon 9 rocket allegedly fell out of orbit and burned up in the atmosphere following another problem during liftoff. Five months later on March 1, 2013, it was reported that SpaceX, allegedly on route to the ISS, ran into thruster trouble shortly after liftoff and consequently missed its docking date with the ISS. These are rocket scientists, not armatures. A truly private company could never afford to do business in such an unprofessional manner further raising suspicions that there is more than meets the eye in respect to SpaceX. On March 21, 2013, it was reported that SpaceX’s “Dragon” supply spacecraft was set to leave the ISS and return to Earth while three new crew members are scheduled to arrive at the ISS shortly. Whatever is going on up there with SpaceX and the ISS is still unknown, but it is anything but kosher. Although only time will tell, it appears that SpaceX may be the private space program set-up to attack Earth with a man-made Doomsday asteroid.

2.2: Space X Grasshopper VTVL Rockets
The fuel cells needed for a man-made asteroid appear to be SpaceX’s Grasshopper VTVL Rockets which have been launched at least 5 times in 2013 in so-called tests. However, since SpaceX has a private launch site in McGregor, Texas, there is no way to confirm just how many Space X-related rockets have been launched into space. While most rockets are designed to burn up in the atmosphere during reentry, SpaceX’s Grasshopper rockets are designed to return intact to the launch pad for a vertical landing so it can be reused for future launches, possibly involving man-made asteroids.  According to SpaceX themselves, “Grasshopper … continues SpaceX’s work toward one of its key goals—developing fully and rapidly reusable rockets, a feat that will transform space exploration by radically reducing its cost”. Although the true mission of the Grasshopper program is not public, in the event that a massive man-made asteroid, comet, or meteoroid-like structure was being constructed in space just above the Earth, reusable fuel cells would be needed to project the given object back into the Earth’s atmosphere in a slow, fiery and believable fashion. The command and control exerted over the Grasshopper rockets is quite extraordinary as they can launch and land upright in the exact same fashion. As witnessed on August 14, 2013, when a SpaceX’s Grasshopper test rocket successfully flew sideways, the Grasshopper is essentially a massive remote-controlled rocket that can be directed any which way. This type of fluidity and control would definitely be needed in order to guide a fake Doomsday asteroid or comet across the sky and into the ocean in a manner which does not draw any suspicion by the billions watching around the world with baited breath. As witnessed on November 18, 2013, when NASA’s Atlas V rocket was loaded with 50,000 gallons of liquid oxygen and launched into space, the fuel within this rocket and that of the 10 or so rockets which have launched thus far in 2013 could be used to fuel the man-made Doomsday asteroid. One in space, the rocket fuel could theoretically be transferred and stored in a secondary location such as International Space Station (ISS) for future use. Once the Doomsday asteroid mission was given the official green light, the fuel could then be injected into the 50 or so Grasshopper-like rockets that will likely make up the Doomsday comet. Coincidentally, the Grasshopper VTVL vehicle uses many of the same rocket parts that SpaceX employs for its official spaceflight missions with NASA and the ISS, making the likelihood of collusion on a undercover project such as a man-made asteroid all the more feasible. In a telling sign that a “Deep Impact” strike in the Pacific Rim of Fire is upon us, the official video released by SpaceX of a Grasshopper launch was accompanied by Johnny Cash’s “Ring of Fire”.

2013 SpaceX Grasshopper Launches

1. March 12, 2013: SpaceX ‘Grasshopper’ Reusable Rocket Breaks Record (McGregor, Texas)
2. April 23, 2013: SpaceX Showcases Grasshopper VTVL Rocket Test (McGregor, Texas)
3. July 9, 2013: SpaceX Grasshopper Reusable Rocket Soars to New Heights (McGregor, Texas)
4. August 14, 2013: SpaceX’s Grasshopper test rocket flies sideways successfully (McGregor, Texas)
5. October 14, 2013: SpaceX Reusable Grasshopper Rocket Climbs to 2,440 Feet (McGregor, Texas)

[Does not purport to be a complete list of launches]

2.3: Asteroid Exhaust
The easiest way to tell if an asteroid is fake is by looking at its vapor trail (or lack thereof) . Because real asteroids are driven by gravity, they has no exhaust or vapor trail. However, in order to program scientists for a fire breathing asteroid, it was reported on January 22, 2014, that the Ceres asteroid vents a water vapor, a laughable notion to be sure. This pseudo-science report was quickly followed by another on March 26, 2014, which stated that astronomers found the first asteroid with rings. Aside from the fact that these finding go against everything known about asteroids, they have been disseminated because a man-made asteroid attack will produce a noticeable exhaust trail. This is because a man-made asteroid is in essence many rockets which have been molded together to look like an asteroid.

2.4: Rocket Launches Trending
Including the aforementioned SpaceX rocket launches, there have been at least 51 other rockets which have taken places in various counties around the world. These launches have involved such entities as the European Space Agency, NASA, SpaceX and Orbital Sciences. What exactly is causing the space rush is not clear, but that fact that these rockets are being launched at an unprecedented rate suggests that there is a sinister plan in the works. If the following reports are to be believed, there are a total of 2 probes, 2 explorers and over 40 satellites which have left planet Earth since September 6, 2013. There have also been at least 6 trips to the alleged International Space Station (ISS) which suggests that the ISS may be the official cover for the black operation that is the man-made Doomsday asteroid.

2013-2014 Space Launches:

1. March 1, 2013: SpaceX Falcon 9 SpaceX CRS-2 Launches to ISS
2. June 14, 2013: SpaceX’s new Falcon 9 v.1.1 test mission launch
3. September 6, 2013: Orbital’s Minotaur V launches LADEE mission
4. September 29, 2013: SpaceX Launches Falcon 9 Rocket on Test Flight
5. November 5, 2013: India launches rocket with Mars satellite
6. November 18, 2013: NASA launches MAVEN on Atlas V rocket to Mars
7. November 20, 2013: Orbital launches 29 satellites into orbit for DOD
8. November 22, 2013:EAS launches 3 satellites to study magnetic field
9. November 25, 2013: Russian rocket transports satellite en route to space station
10. December 1, 2013: China’s Chang’e-3 rocket blasts off carrying moon probe
11. December 4, 2013: SpaceX Falcon 9 rocket lifts off with SES-8 satellite
12. December 6, 2013:
U.S. launches Atlas V on classified NROL-39 mission
13. December 27, 2013: SpaceX Falcon 9 rocket will light up Florida
14. December 27, 2013: Russia launches upgraded Soyuz rocket
15. January 6, 2014:
SpaceX Falcon 9 rocket launch successful
16. January 5, 2014: India has successful launch of cryogenic rocket
17. January 9, 2014: Orbital launches rocket to space station after solar scare
18. January 10, 2014: SpaceShip “Two” hits new heights during rocket test
20. January 24, 2014: NASA Launches Relay Satellite Into Orbit
21. February 6, 2014: Russian spaceship docks with International Space Station
22. March 25, 2014: Soyuz Rocket Launches US-Russian Crew toward Space Station
23. April 3, 2014: $518M military weather satellite launches after 15-year wait
24. April 5, 2014: Indian navigation satellite soars into orbit
25. April 14, 2014: SpaceX Falcon 9 rocket launch moved to April 14
26. March 25, 2014: Soyuz Rocket Launches New US-Russian Crew Toward Space Station
27. April 3, 2014: $518M military weather satellite launches after 15-year wait
28. April 5, 2014: Indian navigation satellite soars into orbit, step closer to own GPS-like system
29. April 10, 2014: Israel launches cutting-edge satellite to spy on MidEast adversaries
30. April 16, 2014: Weather 40% favorable for Friday’s SpaceX Falcon 9 launch
31. May 15, 2014: Proton-M rocket carrying Russia’s most advanced satellite crashes
32. May 17, 2014: United Launch Alliance rocket brings $245 million GPS satellite into orbit
33. May 22, 2014: ULA Atlas 5 Rocket Launches Classified Satellite Into Space Today!
34. May 28, 2014: French satellite Eutelsat 3B successfully launched from Russian sea platform
35. June 19, 2014: Russian-Ukrainian ‘Satan’ rocket blasts into orbit with 33-satellite load
36. June 25, 2014: NASA to Test Rocket Technologies During Wallops Launch
37. June 26, 2014: Satellite that measures carbon dioxide to launch July 1
38. June 30, 2014: NASA to launch global warming satellite after loss
39. July 2, 2014: Do-over satellite launch called success
40. July 2, 2014: Morning Wallops Launch Ends in a Crash
41. July 9, 2014: Russia test launches first newly designed ‘Angara’ space rocket
42. July 13, 2014: Space station shipment launched from Virginia
43. July 29, 2014: Delta IV rocket vaults off launch pad to orbit
44. August 2, 2014: Atlas V rocket vaults GPS satellite into orbit
45. September 6, 2014: AsiaSat 6 poised to launch atop Falcon 9 rocket this weekend
47. September 15, 2014: NASA ready to Launch ISS-RapidScat on Saturday, September 20th
48. September 24, 2014: India successfully sends ‘MOM’ to Mars
49. October 24, 2014: China’s first ‘moon & back’ mission blasts off
50. October 26, 2014: Spectacular rocket launch on Monday should be visible in NC
51. October 29, 2014: Antares rocket on ISS resupply mission explodes seconds after launch

[Does not purport to be a complete list of rocket launches]

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

Freedom Tower Nuke Attack

Download & Forward PDF

David Chase Taylor
December 21, 2014
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA is about to execute a terror attack using the previously hijacked Malaysian Airlines Flight MH370 which was explicitly disappeared by CIA on March 8, 2014, in order to execute a surprise WMD attack on America.

Although the impeding nuclear terror attack by Islamic terrorists could theoretically transpire at any time, it may occur on December 21, 2014, when the New York Jets host the New England Patriots at MetLife Stadium in New York City.

Although MetLife Stadium or another target in New York City could be attacked, the most likely target is the Freedom Tower (i.e., One World Trade Center) which has been rigged for nuclear detonation. It was apparently chosen because it will invoke the 9/11 attacks as well as end freedom in America, bringing about the naked dictatorship of Obama.

Because New York City is located adjacent to the Atlantic Ocean, Flight MH 370 could theoretically fly in off the water from an undisclosed location at full speed, attacking the game in question prior to a retaliatory military response from the U.S. Air Force.

In order to raise the specter of an ISIS-related nuclear terror attack just prior to it transpiring in reality, Obama stated that he will send US troops to fight ISIS if they get nukes on November 18, 2014. Needless to say, the publicity stunt was orchestrated by the CIA is order foreshadow a nuclear attack, most likely in New York City.

In what appears to pre-nuclear terror foreshadowing, it was revealed on December 10, 2014, that U.S. officials stated that the Khorasan Group’s bomb maker survived a drone strike. Therefore, in the wake of a successful nuclear terror attack on America, either Al Qaeda, ISIS, or the Khorasan Group will be scapegoated.

In order to sell the notion to the public that Flight MH 370 could avoid radar detection while flying from en route from Pakistan to the United States, it was reported on November 2, 2014, that a German minister’s plane disappears from radar “for hours”.

A week later on November 9, 2014, the Washington Post published a report entitled “The flying of Unauthorized Drones at Stadiums Prompts Safety Concerns”. The timely report was evidently designed to foreshadow an aerial-related attack on a sports arena or stadium.

In order to provide a timely motive for an ISIS-related terror attack on America, it was reported on December 11, 2014, that a U.S. Senate committee voted to authorize war against ISIS. The timely vote was designed to precede a WMD strike by ISIS on the United States.

A day later on December 12, 2014, an unprecedented so-called “computer failure” closed London airspace. In the wake of a successful attack by Flight MH 370, it will likely be said that the terrorists launched a cyber-attack in order to disable U.S. defense radar systems, allowing them to fly unabated from Pakistan to the America.

New York City Nuclear Attack
The latest Flight MH370 nuclear terror target has been identified as the Freedom Tower which has previously been rigged for a nuclear detonation. Therefore, a 9/11-style attack on the WTC tower may transpire on December 14, 2014, when the New York Giants host the Washington Redskins at MetLife Stadium in New York City. Due to the fact that the skyline of New York is visible from MetLife Stadium, the “live” broadcast of the game will convey the nuclear detonation to the world in HD. In the immediate aftermath of the attack, the New York crowd will panic and a massive stampede will occur, likely killing tens of thousands. The plan to stage a nuclear terror attack on the Freedom Tower was a direct result of Truther.org foiling two previous nuclear terror plots targeting Dallas, Texas and New York City (i.e., the 2011 Super Bowl Nuclear Terror Plot and the 2014 Super Bowl Nuclear Terror Plot). Therefore, a third prospective nuclear terror target had to be chosen—One World Trade Center. In order to foreshadow the notion that the Freedom Tower will suffer a nuclear terror attack, it was reported back on September 6, 2014, that a “prank caller” called 911 on September 5, 2014, claiming to have planted a nuclear bomb next to One World Trade Center. Port Authority police and members of the Joint Terrorism Task Force predictably raced over but found nothing. Most recently, on November 12, 2014, New York workers allegedly go stuck on scaffolding outside 69th floor of World Trade Center. The literal publicity stunt was designed to draw international attention to the newly finished Freedom Tower just prior to a nuclear terror attack by Flight MH 370.

ISIS-Nukes

Nuclear Terror Trending
In order to condition the masses for a New York City-based nuclear terror attack, a Hollywood television series entitled “Manhattan” (2014) premiered on July 27, 2014, about the Manhattan Project and the secret building of America’s first nuclear bomb. In order to provide plausible deniability for the U.S. and Israeli governments just prior to a historic nuclear terror attack in New York City, it was reported on November 10, 2014, that 5 nuclear scientists were assassinated in Syria. In the aftermath of a nuclear attack, it will likely be said that these scientists helped Islamic terrorists build a nuclear bomb. In order to bring unprecedented media publicity to nuclear weapons just prior to an attack, it was reported on November 13, 2014, that U.S. Secretary of Defense Chuck Hagel has ordered an overhaul of America’s nuclear force. Less than 24-hours later on November 14, 2014, it was also reported that the U.S. will increase its nuclear weapons spending. In order to raise the specter of an ISIS-related nuclear terror attack just prior to it transpiring in reality, Obama reportedly stated that he will send US troops to fight ISIS if they get nukes on November 18, 2014. Needless to say, the publicity stunt was orchestrated by the CIA is order foreshadow a nuclear attack, most likely in New York City. As of December 8, 2014, it was reported that ISIS claims to have smuggled a “radioactive device” into Europe. A day later on December 9, 2014, it was also reported that police in Moldova have detained seven people suspected of smuggling radioactive Uranium-238 on a train from Russia, a substance they said could be used to make a “dirty bomb”.

New York City Nuclear Terror Drill
Prior to a state-sponsored nuclear terror attack in New York City, local, state and federal officials must drill the exact scenario so that they are psychologically prepared for the real thing. Coincidentally, it was reported on October 22, 2014, that the city’s Office of Emergency Management (OEM) ran a training exercise which simulated a 10-kiloton nuclear device exploding in Times Square. According to the drilled scenario, 100,000 people were instantly killed and a wave of overpressure took down buildings for a half-mile radius, doing damage for up to two miles. OEM also practiced rehearsing communications with the federal government and local law enforcement agencies in the Tri-State area. Considering that OEM Commissioner Joe Esposito stated that the nuclear blast would produce an electromagnetic pulse (EMP), the entire East Coast will likely be without electricity—permanently.

MetLife Stadium
A nuclear attack in New York City would be witnessed by the capacity crowd at MetLife Stadium which would obviously panic, likely sparking a stampede which would likely cause thousands to perish. Naturally, the NFL and the U.S. government have prepared for the stampede scenario and have erected a double chain link and jersey barricade fence nearly 4 miles long completely encircling MetLife Stadium. NFL fans which aren’t trampled to death in the stampede will be crushed to death against the chain-link fence while trying to escape the dreaded wave of deadly radiation. In essence, the scene from the movie “Terminator 2: Judgment Day” (1991) in which a nuclear detonation is witnessed from behind a chain link fence will be reenacted for all the world to see on “live” television.

Flight MH 370 Attack by ISIS
In order to provide the alleged fuel for Flight MH370 which is now in Pakistan (see below), it was reported on October 8, 2014, that pirates hijacked an oil tanker off the coast of Singapore back on October 2, 2014. Less than 24-hours later, the missing oil tanker was found, minus 2,000 gallons of fuel. Therefore, unknown Islamic terrorists now have enough fuel to fly Flight MH 370 from Pakistan to the U.S. in order to launch their surprise attack. While airliners do not run on crude oil, the terrorists could theoretically trade the stolen fuel for jet fuel or distil it themselves. To further psychologically prepare the world for an ISIS-related aerial attack, it was reported on October 17, 2014, that ISIS militants are training to fly warplanes in Syria. Needless to say, the timely report was designed to foreshadow an ISIS-related attack using Flight MH370.

Pre-Flight MH370 Attack Programming

Prior to a high-profile 9/11-style attack my Flight MH370 in Miami, Florida, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. For example, on October 30, 2014, it was reported that an airplane crashed into an airport building in Wichita, Kansas, resulting in a fiery crash that killed 4 people. The 9/11-style “accident” was designed to invoke memories of 9/11 just prior to the impending Flight MH370 attack. Also on October 30, 2014, it was reported that the Boeing Everett plant received bomb threats, linking the manufacturer of Flight MH370 to bombs just prior to the planned aerial attack. In more plane crash-related programming, 1 person was killed and another injured when the SpaceShipTwo plane crashed on October 31, 2014. That same day, it was also reported that Malaysia Airlines is being sued by 2 boys over the disappearance of Flight 370, thrusting the plane back into the international spotlight just prior to its grand entrance into Miami, Florida.

9/11-Style Attack by ISIS

In order to set up ISIS for a 9/11-style attack, the CIA has repeatedly had their intelligence operatives state that this type of attack is now being planned. For example, on June 15, 2014, U.S. Senator Lindsay Graham stated that ISIS held territory in Iraq will be the next 9/11 “staging area”. Less than 24-hours later on June 16, 2014, CBS News published a report entitled “Will ISIS Plan a 9/11-Style Terror Plot Against the U.S.?”, further foreshadowing the notion if a 9/11-style attack by ISIS. Roughly a week later on June 23, 2014, former Vice President Dick Cheney stated that another 9/11 is coming, only “far deadlier”. Two days later on June 25, 2014, it was reported that ISIS is trying to grab its own air force, foreshadowing the notion that ISIS is planning an aerial-related terror attack. Lastly, on August 22, 2014, the White House stated that ISIS could “pivot” to a 9/11-style attack, ultimately confirming that a 9/11-style attack by ISIS is now in play. How U.S. politicians and the White House in Washington, D.C. know the secret plans of terrorists hiding in the deserts of Iraq is unknown unless of course both the U.S. government and ISIS are being controlled by the same entity—the CIA.

ISIS-nuclear-Iraq-620x435

ISIS Nuclear Attack
In order to create the necessary media narrative that ISIS is capable of executing a nuclear terror attack, a number of CIA-spawned propaganda reports have been published within the last 6-months. For example, on May 2, 2014, it was reported by Veterans Today that 1.05 tons of stolen Pakistani nuclear material is now headed to the United States, ultimately connecting Pakistan to a future nuclear terror strike on America. The notion of an ISIS nuclear terrorist attack was witnessed on June 23, 2014, when ISIS terrorists reportedly threatened a nuke attack on Israel, a laughable notion to be sure. A few weeks later on July 9, 2014, it was reported that ISIS seized 88 pounds of Uranium in Northern Iraq, ultimately providing them will enough uranium to make a nuclear bomb. This report was corroborated a day later on July 10, 2014, by Russia Today who reported that Sunni insurgents have taken over nuclear materials in northern Iraq. These preliminary reports were ultimately confirmed by Fox News on July 10, 2014, in a report entitled “ISIS Seizes Uranium from Lab; Experts Downplay ‘Dirty Bomb’ Threat”. Lastly, on August 28, 2014, it was reported that a black Dell laptop was found in an ISIS safe house in Syria which contained instructions on how to weaponize the bubonic plague as well as “missives on using WMDs (Weapons of Mass Destruction)”. Needless to say, the ISIS endgame is a biological and/or nuclear terror attack on America. Anything less would be unsatisfactory to the CIA which is in command and control of ISIS. In order to raise the specter of an ISIS-related nuclear terror attack just prior to it transpiring in reality, Obama reportedly stated that he will send US troops to fight ISIS if they get nukes on November 18, 2014. Needless to say, the publicity stunt was orchestrated by the CIA is order foreshadow a nuclear attack, most likely in New York City.

Pakistan
The country of Pakistan was the slated scapegoat for the nuclear terror attack at Super Bowl XLV on February 6, 2011. In fact, President Obama reportedly stated on November 25, 2009, that, “We need to make clear to people that the cancer is in Pakistan”. Since then, Osama bin Laden was allegedly assassinated in a compound in Abbottabad, Pakistan on May 2, 2011, at the direct request of President Obama. Never mind that bin Laden’s death comes roughly 10 years after Fox News reported that Osama bin Laden died back on December 26, 2001. Needless to say, the 2011 death of bin Laden was fabricated in order to tie Pakistan to Al Qaeda and international terrorism prior to a WMD attack in which Pakistan will be implicated. Allegations of a “support system” for bin Laden in Pakistan were conveniently revealed in a March 19, 2014, report by the New York Times entitled “What Pakistan Knew about Bin Laden”. In time, the state-sponsored terror group known as ISIS will also be linked to the Pakistani ISI. Since “ISIS” has also been called “IS”, it has always remained just one letter off from the “ISI” of Pakistan. This rudimentary logic will ultimately convince the panicked masses that ISIS is code word for the Pakistani ISI and that Pakistan was indeed behind the impending nuclear terror attack. In order to directly link Pakistan to the attack, it was reported on May 2, 2014 (exactly 2 years after the death of one Osama bin Laden), that nuclear material that was stolen in Pakistan is now headed toward the United States. In the aftermath of a nuclear terror attack on America, it’s highly likely that the Obama administration will bomb Pakistan, a nuclear country, who biggest ally is China. Needless to say, the dreaded Word War III scenario will likely commence. Lastly, in order to provide a timely motive for a Pakistani attack on the United States, it was reported on October 31, 2014, that a top commander in the Haqqani terror network was killed by a U.S. drone strike. In the wake of a successful nuclear attack on America, the drone strike will likely be cited as the key motivating factor.

paki-flight

Flight MH370 in Pakistan
The mysterious and unprecedented disappearance of Flight MH 370 on March 8, 2014, occurred just 35 days after the nuclear terror attack on New York City during Super Bowl XLVIII was foiled by Truther.org. Since then, numerous reports have linked its disappearance to the nuclear country of Pakistan which is the alleged home of the Taliban. The first report that Malaysian Airlines Flight MH 370 was hijacked by Pakistan was revealed in an ominous Tweet by Fox News owner Rupert Murdoch on March 14, 2014, just 6 days after the flight disappeared: “World seems transfixed by 777 disappearance. Maybe no crash but stolen, effectively hidden, perhaps in Northern Pakistan, like Bin Laden.” Murdoch, a Zionist operative, was evidently instructed to foreshadow the notion that Pakistan was responsible. Two days later on March 16, 2014, it was reported that Malaysian authorities were seeking diplomatic permission to investigate a theory that the Flight MH370 was flown to a Taliban stronghold in North West Pakistan near the Afghan border. Two days later on March 18, 2014, U.S. Lt. General Thomas McInerney stated that Flight MH370 could have landed in Pakistan and may be used for terrorism. McInerney stated that according to unverified reports, the plane could have been flying in the shadow of Singapore Airlines Flight 68 over India. He stated that a LIGNET cited Boeing sources who believe the plane is in Pakistan and would be used against America at a later date. “If the Pakistani government doesn’t talk soon they’re going to be complicit in this,” McInerney told Fox News. He went on to state that the plane could be used to carry weapons of mass destruction to hit an aircraft carrier or attack Israel. McInerney’s theory was reportedly based on the idea that Pakistan would have been consistent with the final ping from the plane to a satellite. Roughly a month later on April 13, 2014, a Russian newspaper claimed that Flight MH370 was hijacked by “unknown terrorists” and that “We know that the name of the terrorist who gave instructions to pilots is “Hitch”. The name “Hitch” is curious because it corroborates the theory posed by Lt. General McInerney who stated that Flight MH 370 “hitched” a ride along with Singapore Airlines Flight 68. The report went on to state that “The plane is in Afghanistan not far from Kandahar near the border with Pakistan” and that the crew and passengers are now being held hostage. Roughly 2-months later on June 22, 2014, it was revealed that Flight MH 370 captain Zaharie Shah was now the prime suspect in the hijacking of Flight MH 370 on March 8, 2014. In the aftermath of an attack using Flight MH370, it will predictably be stated that Shah was working for ISIS or Pakistan. Roughly 2 months later on August 18, 2014, it was reported that Malaysia officials are now searching for a Pakistani suspect in the hijacking of MH370 theft. According to reports, a Pakistani national is wanted over the alleged theft of money from bank accounts belonging to 4 victims aboard Flight MH370. This report was designed to show that money from Flight MH370 passengers is now being stolen from their bank accounts by Pakistani terrorists. This is only possible if the plane has not crashed and remains intact.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

 

3141

Download & Forward PDF

David Chase Taylor
December 21, 2014
Truther.org

SWITZERLAND, Zurich — As previously reported, this December I will publish “Greenland Theory: Apocalypse Now”, a new book which shall bring Peace to the World. Due to the impending release of my book and recent events that shall be disclosed at a later date, I feel it necessary to publish an open letter in respect to my personal safety (or lack thereof) in Switzerland.

Consequently, I must reiterate that if I, David Chase Taylor, am assassinated, framed (setup), kidnapped, held hostage, suicided or killed in a terror attack in Switzerland prior to my case for political asylum being heard by the Federal Office of Migration in July of 2015, know that the Federal Intelligence Service (FIS), the Central Intelligence Agency (CIA) of Switzerland, is ultimately responsible.

Any attack on my person (e.g., alleged suicide, house fire, kidnapping, hostage crisis, random act of terror, random act of violence, staged accident, etc.) or setup would either be committed by or have the seal of approval of the Federal Intelligence Service (FIS) who goes by the aliases of the Nachrichtendienst des Bundes (NDB), the Service de renseignement de la Confédération (SRC), and the Servizio di Intelligence Federale (SIF).

The Federal Intelligence Service (FIS) or their minions could frame me by placing into my possession criminal or espionage-related paraphernalia (e.g., binoculars, cameras, forged documents, hard drives, phones, video cameras, etc.) in order to make it appear that I am working as an American or German spy.

I have never worked for any government or intelligence agency and would never do so. Historically speaking, the person or entity framing someone is the actual perpetrator of the crime. This is generally done in order to circumvent due process which, in my particular case, is my upcoming political asylum hearing in July of 2015.

The Federal Intelligence Service (FIS) or their minions could also frame me by placing into my possession criminal or terrorist-related paraphernalia (e.g., chemicals, explosives, terrorist-related propaganda, weapons, etc.) in a premeditative effort to frame me for a crime which I did not commit or plan to commit.

I have no criminal record and no terrorist ties. If I did, I would never have been allowed to legally live in Switzerland since 2009. I do however have a 7-year track record of peace activism which started at my alma mater San Diego State University where I founded Truther.org, the first-ever 9/11 Truth group at an NCAA university.

Since 2011, I have written over 500 reports directly aimed at preventing state-sponsored terrorism around the world. Therefore, any future allegation, arrest or conviction for criminal, espionage or terrorist-related activity in Switzerland or elsewhere is politically motivated and blatantly false.

To date, the Swiss federal government has done everything in their power to subvert my case for political asylum (e.g., repealing Article 19, Paragraph 2 of the Swiss Asylum Act). I have been denied gainful employment, legal representation, and access to social programs, both public and private. Therefore, the notion of being assassinated and/or framed in Switzerland is unfortunately not out of the realm of possibility.

Without gainful employment, I cannot retain a new Swiss “B” Permit which would subsequently allow me to continue living in Switzerland past July 19, 2015. Therefore, I have no financial resources and no way to hire legal representation. Needless to say, I am vulnerable, making me an easy target.

For the record, I am a 37-year old vegan in excellent health who exercises regularly. I do not do drugs or drink in excess. I absolutely love life and I would never ever harm myself or another person. Any future allegation or event which contradicts these statements should now and forever be considered patently false.

Yours truly,

David Chase Taylor

fis-iii

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

sonypictureshack-640x1136

Download & Forward PDF

David Chase Taylor
December 20, 2014
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA will execute a massive and unprecedented cyber-related attack on Europe and/or the United States, scapegoating North Korea’s “Guardians of Peace” hackers.

Exactly what form this cyber-attack will take is not known, but the internet itself, the U.S. electrical grid, and web-related entities such as Apple, Google, Microsoft, and WordPress may be targeted. Although the attack could theoretically transpire at any time, it will most likely come in the coming days.

Back on December 13, 2014, the Sony Hackers promised to deliver a large “Christmas Gift”, inferring that North Korea is planning a surprise cyber-related attack around December 25, 2014. Therefore, a second and far more deadly cyber-related attack is expected just prior to, on, or shortly after Christmas Day.

Interestingly, on December 18, 2014, the U.S. House cybersecurity chairman warned that the electric grid or Wall Street may be the next cyber target of North Korea, confirming, albeit in a de facto manner, that North Korea will be scapegoated for a cyber-related attack on the U.S. power grid.

Also on December 18, 2014, the White House stated that the Sony hack is as national security matter, further confirming that a national security-related attack by North Korean is imminent. That same day, the files of more than 40,000 U.S. federal workers were breached, a cyber-attack which will likely be scapegoated onto North Korea.

Top North Korean Targets:

1. The Internet
2. U.S. Power Grid
3. Web Companies (Apple, Google, Microsoft, WordPress, etc.)

reign-malware-1000x520

Regin Malware
In what could be pre-North Korean cyber-attack malware, on November 23, 2014. CNN published a report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure has been hijacked by the Regin malware and therefore any type of cyber-related attack on America’s financial infrastructure is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

Kim Jong-un Under CIA Mind Control
Shortly after the mysterious death of North Korean President Kim Jong-il on August 24, 2012, his son, Kim Jong-un was placed into power. Since then, Jong-un has been routinely portrayed in the media as being mentally unstable, highly insecure, and willing to attack anyone at a moment’s notice. Not surprisingly, Kim Jong-un exhibits all the telltale signs of being brainwashed and under state-sponsored mind-control. Jong-un was reportedly spotted with his “handler” on numerous occasions while attending a “private school” in Switzerland. According to Wikipedia, “mind control” was first developed in Korea during the Korean War and involves a process in which a group or individual “systematically uses unethically manipulative methods to persuade others to conform to the wishes of the manipulator(s), often to the detriment of the person being manipulated”. Needless to say, Un is a patsy of the CIA who holds no real power. Like his father, he will be assassinated once he fulfills his respective mission which evidently consists of an unprovoked attack on the United States while Obama is in office.

grid2exfp

“GridEx II” Power Grid Drill
Considering that on November 13-15, 2013, a massive power grid terror drill entitled “GridEx II” was executed on the East Coast of America, there is a real possibility that a massive nuclear EMP attack could turn the lights out on America for good. According to the August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

chinese-emp-nuke-drone-attack

Download & Forward PDF

David Chase Taylor
December 20, 2014
Truther.org

SWITZERLAND, Zurich — The notion that the CIA is actively trying to trigger World War III between the U.S. and China has been exposed ad nauseam by Truther.org. To date, at least 6 different of Chinese “surprise” attack plots have been identified and exposed, this being the latest.

In the wake of these “surprise” Chinese attack plots being exposed, roughly 60 Chinese officials suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots.

In order to make the United States appear vulnerable just prior to the slated Chinese attack, U.S. President Obama fired Secretary of Defense Chuck Hagel on November 25, 2014, making a spectacle of it while doing so. The timely firing was designed to make America look weak, thus inviting a surprise attack by China.

Back on November 9, 2014, the Financial Times of London published a report entitled “Beijing Sees the U.S. President as a Weak Leader in the Autumn of His Presidency”. The firing of the Secretary of Defense with no replacement will predictably be touted as the straw which broke the camel’s back.

The notion that China may take down the U.S. power grid was first reported on November 20, 2014, when the U.S. government stated that China could take down the power grid. Exactly how this will be accomplished is not known, but a cyber-attack, nuclear EMP attack, nuclear attack, or space-related attack could theoretically work.

Most recently, on December 18, 2014, it was reported that China was testing ICBM with multiple warheads. The timely report was evidently designed to foreshadow that China may strike the U.S. with nuclear missile in multiple cities.

Top 5 Chinese Attack Scenarios:

1. Nuclear EMP Attack (Power Grid)
2. Cyber-Terror Attack (Drones, Military, Power Grid)
3. Drone Attack (US Cities, Military Bases)
4. Nuclear Attack (US Cities)
5. Space Attack (US Satellites, Power Grid)

Asian “Surprise” Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”.

Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California

I: EMP ATTACK
:

1.1. EMP Attack
Although reports in respect to China’s EMP program have been public since 2011 (see below), it was revealed on January 30, 2014, that China’s EMP weapons are an “ace” against U.S. defense systems and that the Chinese military is looking to use an EMP attack as part of a “one-two punch to knock out – literally within seconds – all defensive electronics”. The one-punch being the EMP attack followed by a two-punch nuclear attack. The notion that China plans to target the U.S. with an EMP strike was reiterated in the February 3, 2014, report entitled “U.S. Evaluates China’s EMP Threat”. Predictably, the Department of Defense (DOD) publically stated that they are “unaware of any increase in the threat of a deliberate destructive use of an EMP device”.

1.2: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

1.3: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

I. CYBER TERROR:

2.1: U.S. Vulnerable to Chinese Cyber Attack
Aside from the fact that Chinese hackers reportedly crashed Federal Election Commission website on December 19, 2013, recent reports in respect to cyber-security (or lack thereof) suggests that cyber-attacks against U.S. governmental institutions are imminent. For example, on February 4, 2014, it was revealed that a U.S. Senate report found that federal agencies often fail to take basic preventive cyber-security measures. That same day, it was also reported that “password” is the password on many U.S. government computer accounts, furthering the notion that feds are an easy target for hackers. A day later on February 5, 2014, a U.S. government report found that 4 in 10 government security breaches go undetected, suggesting that cyber-attacks are much more prevalent than originally thought. Needless to say, these propaganda reports have been disseminated with the goal of making the American public believe that the U.S. government is highly vulnerable to a cyber-attack, possibly emanating from China.

2.2: Cyber Doomsday
Since June of 2012, numerous propaganda articles have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, “Threat Of ‘Spectacular’ Cyberattack Looms” and “U.S. Homeland Chief: Cyber 9/11 Could Happen “Imminently“, all indicate that an unprecedented act of state-sponsored cyber-terror upon the United States is imminent. Exactly how a cyber-Doomsday will manifest itself is unknown, but a Chinese-based EMP strike followed by twin nuclear attacks appears to be the working terror scenario.

2.3: China & Cyber Terror
As previously reported, the nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. China, more than any other nation, is sure to be scapegoated in the aftermath of a cataclysmic cyber-terror attack against the United States. On October 5, 2011, U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two U.S. satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyber espionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta recently stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to clamp down on aggressive Chinese cyber-attacks against American companies and the U.S. government.  On October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.

2.4: Chinese Cyber Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

2.5: Cyber-Related Nuclear Terror
Prior to a high-profile EMP attack followed by twin nuclear attacks, the public must be psychologically prepared to accept that this is in fact possible. Based purely on research conducted to date, the marriage between cyber-terror and nuclear terror was first made on February 19, 2013, when a CNN headline entitled “Former CIA Official: Cyber War ‘More Sinister Than Nuclear Age’” first paired the terms “cyber” and “nuclear” together in the same sentence. Roughly a month later on March 22, 2013, the propaganda film entitled “Olympus Has Fallen” (2013) was released (see trailer) in which Washington D.C., America’s capital is attacked by an ex-North Korean terrorist who wants to hack the White House computer network and detonate American nuclear warheads while in their respective missile silos. Exactly a month later on April 22, 2013, the Wall Street Journal ran a headline entitled “China: Cyberattacks Are Like Nuclear Bombs”, ultimately linking the words “China”, Cyberattacks” and “Nuclear Bombs” in the same sentence. Roughly two months later on June 28, 2013, another propaganda film entitled  “White House Down” (2013), was released (see trailer) in which Washington D.C., America’s capital, was attacked by hackers attempting to breach the U.S. Department of Defense’s computers to access the “Nuclear Football”, the briefcase used by the President of the United States to initiate nuclear war.

2.6: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

2.7: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

2.8: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

III: DRONE ATTACK:

3.1 Chinese Cyber-Hijack Possible
Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap. It is imperative to note that once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will likely become the norm. This futuristic drone war scenario essentially allows the CIA to attack whomever and whatever they want—whenever they want.

3.2 China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

3.3 Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

3.4: China’s Drone Attack

China is building one of the world’s largest drone fleets aimed at attacking the United States in the event of a war. According to the report, “The Chinese military envisions its drone swarms scouting out battlefields, guiding missile strikes and overwhelming opponents through sheer numbers. China’s military-industrial complex has developed homegrown drones to accomplish these goals, according to the report released on March 11, 2013, by the Project 2049 Institute. “The PLA now fields one of the world’s most expansive UAV [unmanned aerial vehicle] fleets,” said Ian Easton and L.C. Russell Hsiao, researchers at the Project 2049 Institute and authors of the new report. The Project 2049 Institute report warned that China could consider “plausibly deniable” drone attacks blamed upon mechanical failure or cyberhackers. The Chinese drones could act as decoys, use electronic warfare to jam communications and radar, guide missile strikes on carriers, fire missiles at U.S. Navy ships, drop nuclear bombs, or dive into U.S. ships like kamikaze robots.

3.5: China’s “Stealth” Drones
If and when Chinese drones execute nuclear strikes against American cities, the drones will have to be stealth drones in order to circumvent U.S. aerial defense systems (in the event that they are not disabled due to an EMP attack). Another possibility is that the Chinese may cyber-hijack (commandeer) U.S. drones and arm them with Chinese-made nuclear weapons in order to get them past U.S. defense systems. Based on the following reports, both drone scenarios are possible, at least theoretically speaking. On March 11, 2013, Easton and L.C. Russell Hsiao, researchers at the Project 2049 Institute, stated that “The PLA [China] now fields one of the world’s most expansive UAV [unmanned aerial vehicle] fleets” and that China could consider “plausibly deniable” drone attacks blamed upon mechanical failure or cyberhackers. The drones could act as decoys, use electronic warfare to jam communications and radar, guide missile strikes on carriers, fire missiles at U.S. Navy ships or dive into ships like kamikaze robots. Project 2049 went on to state that China is developing drones such as the rumored “Dark Sword” stealth drone that have low radar profiles to escape radar detection and that Chinese engineers have even begun working on drones that have the software brains to fly in formation, do aerial refueling and takeoff and land autonomously. The report cautions the U.S. military to prepare for the worst-case scenario by hardening its existing air bases in Asia. On March 13, 2013, it was reported that China is building one of the world’s largest drone fleets aimed at attacking the United States in the event of a war. As of November 22, 2013, it was reported that China’s first stealth combat drone has taken its maiden flight.

3.6: Revenge Drone Attack
In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

3.7: “Sting of the Drone”
The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

3.8: Chinese Drone Launch
Should Chinese drones nuke U.S. cities, they will most likely takeoff from Chinese ships in or near U.S. waters. According to a February 11, 2014, report published in respect to two Iranian warships off the coast of the U.S., the Pentagon stated that they may sail wherever they like, a reckless gesture at best. Four days later on February 15, 2014, a North Korean ship which had previously transported illegal weapons to Cuba returned to the island, unabated. A few weeks later on February 26, 2014, it was reported that a Russian spy ship was docked in Havana, Cuba, just 90 miles off the coast of America. These reports were published in order to: a) show that enemy war ships are sailing just off the coast of America, and b) that Chinese ships will be able to get close enough to U.S. shores in order to launch their nuclear drone strikes.

IV. NUCLEAR ATTACK:

fallout

4.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

4.2: The “Invisibility Cloak
In order for China to pull off a “stealth” nuke attack on America, they will have to, at least theoretically speaking, employ some sort of technology which renders America’s defenses useless. Coincidentally, on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat about the development of an invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when the Chinese attack America, they may do so with the aid of superior technology which in will in essence have allowed their military equipment to become invisible to American defense systems (e.g., radar, satellites, sonar, etc.).

V. SPACE ATTACK:

5.1: Space Attack

As depicted in the January 8, 2014, report entitled “Strategic Military Satellites Vulnerable to Attack by China in Future Space War”, U.S. satellites are no match for a space-based Chinese cyber-attack. The notion that U.S. computers could suddenly be rendered useless by an unseen and undetectable force such as an EMP strike was recently highlighted in a February 25, 2014, report which revealed that the first contagious airborne Wi-Fi computer virus has now been detected. Unbeknownst to most, digital backdoors, which allow for “Zero Day Attacks”, have been built into all military software to specifically allow for EMP and cyber-like attacks. In order to attack U.S. satellites and defense systems, the Chinese government had to first prove to the world that they are smart enough technologically-wise to do so. This was all but confirmed on December 14, 2013, when China allegedly became the third country to land on moon. Roughly 2 weeks later on December 29, 2013, a report entitled “NASA Beware China’s Red Space Storm Rising” sounded the alarm in respect to China’s offensive space program. A month later on January 29, 2014, defense experts warned that China has boosted its space warfare capabilities. Although not yet confirmed, it does appear that China’s “Jade Rabbit” moon rover is military cover for the EMP-attack program which will take out U.S.-based military satellites and defense systems.

VI. U.S. VERUS CHINA:

6.1: Red China Rising
Aside from the fact that China openly called for the world to be “de-Americanised” on October 13, 2013, it was revealed on December 12, 2013, that a group of U.S. defense analysts told a prominent House subcommittee that the U.S. military needs a more focused war plan specific to China, especially after China’s declaration of an air defense zone over the East China Sea. A week after this shocking revelation, Chinese hackers reportedly crashed Federal Election Commission website on December 19, 2013, a direct attack on the U.S. and its democratic form of government. As of February 19, 2014, China cut its U.S. Treasury holdings the most since 2011, an ominous sign that a Chinese attack is imminent. After all, China holds most of America’s debt and therefor a nuclear strike against America may be a sign to pay up.

6.2: U.S. Versus China  
Inflammatory war propaganda, rising diplomatic tensions between the U.S. and China along with unprecedented U.S. propaganda against China indicates that World War III scenario between the United States and China is on the horizon. On June 4th, 2012, it was reported that the Australian government’s Defense White Paper published in 2009 contained a “secret chapter” that assessed “Australia’s ability to fight an air-sea battle alongside the United States against China”. A few weeks later on June 27th, 2012, Chinese Maj. Gen. Peng Guangqian stated that a future conflict with the United States is coming as a result of U.S. “containment” policy. Guangqian was then quoted as saying, “The United States has been exhausting all its resources to establish a strategic containment system specifically targeting China” and that “The contradictions between China and the United States are structural, not to be changed by any individual, whether it is G.H.W. Bush, G.W. Bush or Barack Obama, it will not make a difference to these contradictions”. Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

6.3: U.S. Military Vulnerable to Attack
Prior to an unprovoked and unabated attack by China against the West Coast of America, the public must first be led to believe through propaganda and alleged whistleblowers that U.S. military equipment and weapons systems are vulnerable to Chinese cyber-related espionage. That way, in the aftermath of a Chinese invasion whereby U.S. defense systems such as missiles, planes and radars are suddenly rendered useless, the narrative of a Chinese cyber-attack can be floated to the American public and military as the reason for the deadly attack which will surely take America to war. If the following reports are to be believed, Chinese hackers have gained access to U.S. weapons secrets, stole blueprints from Australia’s intelligence agency, stole a number of the latest U.S. weapons, hacked the NSA chairman’s accounts, targeted U.S. missile systems, hacked the Obama campaign, and hacked the head of the Nuclear Security Agency. The notion that the Chinese military is “smarter” than the U.S. military and therefore vulnerable to an attack was basically confirmed on January 16, 2014, when it was reported that a U.S. admiral conceded that the U.S. is losing dominance to China.

Chinese Espionage Headlines:

1. March 29, 2013: Report: China Gained U.S. Weapons Secrets Using Cyberespionage
2. May 27, 2013: Chinese Hackers Steal Australian Security Intelligence Blueprints
3. May 28, 2013: Pentagon: The Chinese Stole Our Newest Weapons
4. May 28, 2013: Chinese Infiltrated Top U.S. Weapons Systems, Confidential Report Claims
5. May 28, 2013: Report Lists U.S. Weapons Compromised By Chinese Cyberspies
6. May 29, 2013: Pentagon Aircraft, Missile Defense Programs Target Of China Cyber Threat
7. May 29, 2013: China to Hold Digital War Games
8. May 31, 2013: Hagel Says Chinese Cyberthreats Pose ‘Stealthy’ Danger To US
9. June 5, 2013: China Claims ‘Mountains Of Data’ On Cyber Attacks By US
10. June 6, 2013: Chinese Hacked Obama, McCain Campaigns, Took Internal Documents

[Does not purport to be a complete list of events of headlines]

6.4: U.S. Weapon Systems Compromised by Chinese Hackers
Based on multiple reports, Chinese hackers have compromised numerous U.S. military weapons systems,  ultimately making U.S. military personal and equipment vulnerable to a Chinese attack. According to a May 28th, 2013, report by the Washington Post, the following is an “expanded partial list” of compromised DOD system designs and technologies:

U.S. System Designs
Terminal High Altitude Area Defense, Patriot Advanced Capability-3, Extended Area Protection and Survivability System (EAPS), F-35, V-22, C-17, Hawklink, Advanced Harpoon Weapon Control System, Tanker Conversions, Long-term Mine Reconnaissance System, Global Hawk, Navy antenna mechanisms, Global Freight Management System, Micro Air Vehicle, Brigade Combat Team Modernization, Aegis Ballistic Missile Defense System, USMC Tracked Combat Vehicles, Warfighter Information Network-Tactical (WIN-T), T700 Family of Engines, Full Authority Digital Engine Controller (FADEC), UH-60 Black Hawk, AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile), Affordable Weapons System, Littoral Combat Ship, Navy Standard Missile (SM-2,3,6), P-8A/Multi-Mission Aircraft, F/A and EA-18, RC-135 Detect./Collect, and the Mk54 Light Weight Torpedo.

U.S. Technologies
Directed Energy, UAV video system, Specific Emitter identification, Nanotechnology, Dual Use Avionics, Fuze/Munitions safety and development, Electronic Intelligence Processing, Tactical Data Links, Satellite Communications, Electronic Warfare, Advanced Signal Processing Technologies for Radars,  Nanostructured Metal Matrix Composite for Light Weight Ballistic Armor, Vision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV), Space Surveillance Telescope, Materials/processing technologies, IR Search and Track systems, Electronic Warfare systems, Electromagnetic Aircraft Launch, Rail Gun, Side Scan sonar, Mode 5 IFF, Export Control, ITAR, Distribution Statement B,C,D Technical Information, CAD drawings, 3D models, schematics, Software code, Critical technology, Vendor/supply chain data, Technical manuals, PII (email addresses, SSN, credit card numbers, passwords, etc.), and attendee lists for program reviews and meetings.

6.5: Chinese Naval Superiority
In what appears to be pre-Chinese attack propaganda, it was revealed on December 3, 2014, that a new reported has found that the Chinese Navy’s fleet will outnumber the U.S. by 2020. According to the timely report, China has plans to grow its navy to 351 ships by 2020 as the Chinese continue to develop their military’s ability to strike global targets. Interestingly, the report went on to state that the 2014 U.S.-China Economic and Security Review Commission recommended to Congress that the U.S. Navy respond by building more ships and increase its presence in the Pacific region – a strategy they U.S. military has already started. In other words, the Chinese are one step ahead of the U.S., making the likelihood of a Chinese attack all the more plausible.

6.6: Vice Admiral Jan E. Tighe
In what appears to be pre-Chinese cyber-attack personal logistics by the U.S. Navy, it was revealed on April 3, 2014, that Vice Admiral Jan E. Tighe has been appointed head of the U.S. Fleet Cyber Command and the U.S. 10th Fleet, making her “the first female commander of a numbered fleet in U.S. Navy history”. The U.S. Fleet Cyber Command is an operating force of the United States Navy responsible for the Navy’s cyber warfare programs, while the United States Tenth Fleet executes the full spectrum of cyber, electronic warfare, information operations and signal intelligence capabilities across the cyber, electromagnetic and space domains. In the wake of a successful Chinese cyber-attack against the U.S. Navy, Vice Admiral Tighe, a woman, will be publically scapegoated for the unprecedented attack. The U.S. government and the media will predictably state that Tighe was over her head and not qualified for the position, making the issue about a woman serving in the military rather than the fact that the entire Chinese attack was a false-flag courtesy of the CIA.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste
0001 SAFDCT

truther-rss

WEE-ConceptArt_WashingtonDC

Download & Forward PDF

David Chase Taylor
December 20, 2014
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA is about to execute a terror attack using the previously hijacked Malaysian Airlines Flight MH370 which was explicitly disappeared by CIA on March 8, 2014, in order to execute a surprise WMD attack on America.

Although the impeding nuclear terror attack by Islamic terrorists could theoretically transpire at any time, it may occur on December 20, 2014, when the Philadelphia Eagles play the Washington Redskins at FedExField in Landover, Maryland at 4:30 PM (EST).

Although FedExField or another target in Washington, D.C. could theoretically be attacked, the most likely target is the United States Capitol which has evidently been rigged for nuclear detonation. The NFL game will evidently be used as the venue by which the nuclear attack will be televised to the world.

Because Washington, D.C. is located adjacent to the Atlantic Ocean, Flight MH 370 could theoretically fly in off the water from an undisclosed location at full speed, attacking the game in question prior to a retaliatory military response from the U.S. Air Force.

In order to raise the specter of an ISIS-related nuclear terror attack just prior to it transpiring in reality, Obama stated that he will send US troops to fight ISIS if they get nukes on November 18, 2014. Needless to say, the publicity stunt was orchestrated by the CIA is order foreshadow a nuclear attack on America.

In what appears to pre-nuclear terror foreshadowing, it was revealed on December 10, 2014, that U.S. officials stated that the Khorasan Group’s bomb maker survived a drone strike. Therefore, in the wake of a successful nuclear terror attack, either Al Qaeda, ISIS, or the Khorasan Group will ultimately be scapegoated.

In order to sell the notion to the public that Flight MH 370 could avoid radar detection while flying en route from Pakistan to the United States, it was reported on November 2, 2014, that a German minister’s plane disappears from radar “for hours”.

In order to provide a timely motive for an ISIS-related terror attack on America, it was reported on December 11, 2014, that a U.S. Senate committee voted to authorize war against ISIS. The timely vote was designed to precede a WMD strike by ISIS on the United States.

A day later on December 12, 2014, an unprecedented so-called “computer failure” closed London airspace. In the wake of a successful attack by Flight MH 370, it will likely be said that the terrorists launched a cyber-attack in order to disable U.S. defense radar systems, allowing them to fly unabated from Pakistan to the United States.

_78621885_78621884

US Capitol Remodel
Back on June 14, 2012, it was reported that the U.S. Capitol dome will undergo its first major face-lift in more than 50 years, costing $19 million in repairs. Despite the repairs, the United States Capitol was slated for a second facelift on October 22, 2013, when it was reported that the Capitol Dome will undergo another $60 million facelift. As of November 18, 2014, work on the second facelift began, resulting scaffolding around the dome (see photo). Whether or not the timely “facelifts” have provided the necessary cover for the installation of a so-called nuclear bomb inside the U.S. Capitol Building is not known, but it’s highly likely. Said bomb could be detonated at the exact moment that Flight MH 370 crashed into the building 9/11-sytle, making the world believe that the plane had a nuclear bomb onboard. The unprecedented nuclear terror attack would end America as we know, bringing about the naked dictatorship of Obama.

Nuclear Terror Trending
In order to condition the masses for a New York City-based nuclear terror attack, a Hollywood television series entitled “Manhattan” (2014) premiered on July 27, 2014, about the Manhattan Project and the secret building of America’s first nuclear bomb. In order to provide plausible deniability for the U.S. and Israeli governments just prior to a historic nuclear terror attack in New York City, it was reported on November 10, 2014, that 5 nuclear scientists were assassinated in Syria. In the aftermath of a nuclear attack, it will likely be said that these scientists helped Islamic terrorists build a nuclear bomb. In order to bring unprecedented media publicity to nuclear weapons just prior to an attack, it was reported on November 13, 2014, that U.S. Secretary of Defense Chuck Hagel has ordered an overhaul of America’s nuclear force. Less than 24-hours later on November 14, 2014, it was also reported that the U.S. will increase its nuclear weapons spending. In order to raise the specter of an ISIS-related nuclear terror attack just prior to it transpiring in reality, Obama reportedly stated that he will send US troops to fight ISIS if they get nukes on November 18, 2014. Needless to say, the publicity stunt was orchestrated by the CIA is order foreshadow a nuclear attack, most likely in New York City. As of December 8, 2014, it was reported that ISIS claims to have smuggled a “radioactive device” into Europe. A day later on December 9, 2014, it was also reported that police in Moldova have detained seven people suspected of smuggling radioactive Uranium-238 on a train from Russia, a substance they said could be used to make a “dirty bomb”.

flight-mh-370-terror-attack

Flight MH 370 Attack by ISIS
In order to provide the alleged fuel for Flight MH370 which is now in Pakistan (see below), it was reported on October 8, 2014, that pirates hijacked an oil tanker off the coast of Singapore back on October 2, 2014. Less than 24-hours later, the missing oil tanker was found, minus 2,000 gallons of fuel. Therefore, unknown Islamic terrorists now have enough fuel to fly Flight MH 370 from Pakistan to the U.S. in order to launch their surprise attack. While airliners do not run on crude oil, the terrorists could theoretically trade the stolen fuel for jet fuel or distil it themselves. To further psychologically prepare the world for an ISIS-related aerial attack, it was reported on October 17, 2014, that ISIS militants are training to fly warplanes in Syria. Needless to say, the timely report was designed to foreshadow an ISIS-related attack using Flight MH370.

Pre-Flight MH370 Attack Programming

Prior to a high-profile 9/11-style attack my Flight MH370 in Miami, Florida, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. For example, on October 30, 2014, it was reported that an airplane crashed into an airport building in Wichita, Kansas, resulting in a fiery crash that killed 4 people. The 9/11-style “accident” was designed to invoke memories of 9/11 just prior to the impending Flight MH370 attack. Also on October 30, 2014, it was reported that the Boeing Everett plant received bomb threats, linking the manufacturer of Flight MH370 to bombs just prior to the planned aerial attack. In more plane crash-related programming, 1 person was killed and another injured when the SpaceShipTwo plane crashed on October 31, 2014. That same day, it was also reported that Malaysia Airlines is being sued by 2 boys over the disappearance of Flight 370, thrusting the plane back into the international spotlight just prior to its grand entrance into Miami, Florida.

9/11-Style Attack by ISIS

In order to set up ISIS for a 9/11-style attack, the CIA has repeatedly had their intelligence operatives state that this type of attack is now being planned. For example, on June 15, 2014, U.S. Senator Lindsay Graham stated that ISIS held territory in Iraq will be the next 9/11 “staging area”. Less than 24-hours later on June 16, 2014, CBS News published a report entitled “Will ISIS Plan a 9/11-Style Terror Plot Against the U.S.?”, further foreshadowing the notion if a 9/11-style attack by ISIS. Roughly a week later on June 23, 2014, former Vice President Dick Cheney stated that another 9/11 is coming, only “far deadlier”. Two days later on June 25, 2014, it was reported that ISIS is trying to grab its own air force, foreshadowing the notion that ISIS is planning an aerial-related terror attack. Lastly, on August 22, 2014, the White House stated that ISIS could “pivot” to a 9/11-style attack, ultimately confirming that a 9/11-style attack by ISIS is now in play. How U.S. politicians and the White House in Washington, D.C. know the secret plans of terrorists hiding in the deserts of Iraq is unknown unless of course both the U.S. government and ISIS are being controlled by the same entity—the CIA.

ISIS-nuclear-Iraq-620x435

ISIS Nuclear Attack
In order to create the necessary media narrative that ISIS is capable of executing a nuclear terror attack, a number of CIA-spawned propaganda reports have been published within the last 6-months. For example, on May 2, 2014, it was reported by Veterans Today that 1.05 tons of stolen Pakistani nuclear material is now headed to the United States, ultimately connecting Pakistan to a future nuclear terror strike on America. The notion of an ISIS nuclear terrorist attack was witnessed on June 23, 2014, when ISIS terrorists reportedly threatened a nuke attack on Israel, a laughable notion to be sure. A few weeks later on July 9, 2014, it was reported that ISIS seized 88 pounds of Uranium in Northern Iraq, ultimately providing them will enough uranium to make a nuclear bomb. This report was corroborated a day later on July 10, 2014, by Russia Today who reported that Sunni insurgents have taken over nuclear materials in northern Iraq. These preliminary reports were ultimately confirmed by Fox News on July 10, 2014, in a report entitled “ISIS Seizes Uranium from Lab; Experts Downplay ‘Dirty Bomb’ Threat”. Lastly, on August 28, 2014, it was reported that a black Dell laptop was found in an ISIS safe house in Syria which contained instructions on how to weaponize the bubonic plague as well as “missives on using WMDs (Weapons of Mass Destruction)”. Needless to say, the ISIS endgame is a biological and/or nuclear terror attack on America. Anything less would be unsatisfactory to the CIA which is in command and control of ISIS. In order to raise the specter of an ISIS-related nuclear terror attack just prior to it transpiring in reality, Obama reportedly stated that he will send US troops to fight ISIS if they get nukes on November 18, 2014. Needless to say, the publicity stunt was orchestrated by the CIA is order foreshadow a nuclear attack, most likely in New York City.

Pakistan
The country of Pakistan was the slated scapegoat for the nuclear terror attack at Super Bowl XLV on February 6, 2011. In fact, President Obama reportedly stated on November 25, 2009, that, “We need to make clear to people that the cancer is in Pakistan”. Since then, Osama bin Laden was allegedly assassinated in a compound in Abbottabad, Pakistan on May 2, 2011, at the direct request of President Obama. Never mind that bin Laden’s death comes roughly 10 years after Fox News reported that Osama bin Laden died back on December 26, 2001. Needless to say, the 2011 death of bin Laden was fabricated in order to tie Pakistan to Al Qaeda and international terrorism prior to a WMD attack in which Pakistan will be implicated. Allegations of a “support system” for bin Laden in Pakistan were conveniently revealed in a March 19, 2014, report by the New York Times entitled “What Pakistan Knew about Bin Laden”. In time, the state-sponsored terror group known as ISIS will also be linked to the Pakistani ISI. Since “ISIS” has also been called “IS”, it has always remained just one letter off from the “ISI” of Pakistan. This rudimentary logic will ultimately convince the panicked masses that ISIS is code word for the Pakistani ISI and that Pakistan was indeed behind the impending nuclear terror attack. In order to directly link Pakistan to the attack, it was reported on May 2, 2014 (exactly 2 years after the death of one Osama bin Laden), that nuclear material that was stolen in Pakistan is now headed toward the United States. In the aftermath of a nuclear terror attack on America, it’s highly likely that the Obama administration will bomb Pakistan, a nuclear country, who biggest ally is China. Needless to say, the dreaded Word War III scenario will likely commence. Lastly, in order to provide a timely motive for a Pakistani attack on the United States, it was reported on October 31, 2014, that a top commander in the Haqqani terror network was killed by a U.S. drone strike. In the wake of a successful nuclear attack on America, the drone strike will likely be cited as the key motivating factor.

paki-flight

Flight MH370 in Pakistan
The mysterious and unprecedented disappearance of Flight MH 370 on March 8, 2014, occurred just 35 days after the nuclear terror attack on New York City during Super Bowl XLVIII was foiled by Truther.org. Since then, numerous reports have linked its disappearance to the nuclear country of Pakistan which is the alleged home of the Taliban. The first report that Malaysian Airlines Flight MH 370 was hijacked by Pakistan was revealed in an ominous Tweet by Fox News owner Rupert Murdoch on March 14, 2014, just 6 days after the flight disappeared: “World seems transfixed by 777 disappearance. Maybe no crash but stolen, effectively hidden, perhaps in Northern Pakistan, like Bin Laden.” Murdoch, a Zionist operative, was evidently instructed to foreshadow the notion that Pakistan was responsible. Two days later on March 16, 2014, it was reported that Malaysian authorities were seeking diplomatic permission to investigate a theory that the Flight MH370 was flown to a Taliban stronghold in North West Pakistan near the Afghan border. Two days later on March 18, 2014, U.S. Lt. General Thomas McInerney stated that Flight MH370 could have landed in Pakistan and may be used for terrorism. McInerney stated that according to unverified reports, the plane could have been flying in the shadow of Singapore Airlines Flight 68 over India. He stated that a LIGNET cited Boeing sources who believe the plane is in Pakistan and would be used against America at a later date. “If the Pakistani government doesn’t talk soon they’re going to be complicit in this,” McInerney told Fox News. He went on to state that the plane could be used to carry weapons of mass destruction to hit an aircraft carrier or attack Israel. McInerney’s theory was reportedly based on the idea that Pakistan would have been consistent with the final ping from the plane to a satellite. Roughly a month later on April 13, 2014, a Russian newspaper claimed that Flight MH370 was hijacked by “unknown terrorists” and that “We know that the name of the terrorist who gave instructions to pilots is “Hitch”. The name “Hitch” is curious because it corroborates the theory posed by Lt. General McInerney who stated that Flight MH 370 “hitched” a ride along with Singapore Airlines Flight 68. The report went on to state that “The plane is in Afghanistan not far from Kandahar near the border with Pakistan” and that the crew and passengers are now being held hostage. Roughly 2-months later on June 22, 2014, it was revealed that Flight MH 370 captain Zaharie Shah was now the prime suspect in the hijacking of Flight MH 370 on March 8, 2014. In the aftermath of an attack using Flight MH370, it will predictably be stated that Shah was working for ISIS or Pakistan. Roughly 2 months later on August 18, 2014, it was reported that Malaysia officials are now searching for a Pakistani suspect in the hijacking of MH370 theft. According to reports, a Pakistani national is wanted over the alleged theft of money from bank accounts belonging to 4 victims aboard Flight MH370. This report was designed to show that money from Flight MH370 passengers is now being stolen from their bank accounts by Pakistani terrorists. This is only possible if the plane has not crashed and remains intact.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss