Archive for the ‘China’ Category

chinainvadesamerica

Download & Forward PDF

David Chase Taylor
December 7, 2014
Truther.org

SWITZERLAND, Zurich — As originally depicted in the June 30, 2014, Truther.org report entitled “China Plans to Cyber-Hijack U.S. Drones for Attack on America”, the CIA (which is in command and control of all 206 counties) is plotting a surprise drone attack on the United States, most likely using American drones which were allegedly hijacked by the Chinese government.

Considering that December 7, 2014, is the 73rd anniversary of the Japanese Attack on the United States at Pearl Harbor, Hawaii, it’s the perfect time to execute the Chinese cyber-hijack of U.S. drones which the CIA has been desperately trying to execute this year.

In order to make the United States vulnerable just prior to the slated Chinese attack, U.S. President Obama fired Secretary of Defense Chuck Hagel a day prior on November 25, 2014, making a spectacle of it while doing so. The timely firing was designed to make America look weak, thus inviting a surprise attack by China.

Back on November 9, 2014, the Financial Times of London published a report entitled “Beijing Sees the U.S. President as a Weak Leader in the Autumn of His Presidency”. The firing of the Secretary of Defense with no replacement will predictably be touted as the straw which broke the camel’s back.

It is imperative to note that once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will likely become the norm. This futuristic drone war scenario essentially allows the CIA to attack whomever and whatever they want—whenever they want.

The notion that the CIA is actively trying to trigger World War III between the U.S. and China has been exposed ad nauseam by Truther.org. To date, at least 6 different of Chinese “surprise” attack plots have been identified and exposed, the cyber-hijack of drones being the latest.

In the wake of these “surprise” Chinese attack plots being exposed, roughly 60 Chinese officials suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots.

System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

reign-malware-1000x520

Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

Chinese Drone Attack

Chinese Naval Superiority
In what appears to be pre-Chinese attack propaganda, it was revealed on December 3, 2014, that a new reported has found that the Chinese Navy’s fleet will outnumber the U.S. by 2020. According to the timely report, China has plans to grow its navy to 351 ships by 2020 as the Chinese continue to develop their military’s ability to strike global targets. Interestingly, the report went on to state that the 2014 U.S.-China Economic and Security Review Commission recommended to Congress that the U.S. Navy respond by building more ships and increase its presence in the Pacific region – a strategy they U.S. military has already started. In other words, the Chinese are one step ahead of the U.S., making the likelihood of a Chinese attack all the more plausible.

U.S. Navy Security Breach
In order to covey the notion that the U.S. Navy is vulnerable to insider threats, making the notion of a drone hijacking all the more plausible, it was reported on December 5, 2014, that a U.S. Navy engineer tried to steal schematics of aircraft carrier. According to reports, Mostafa Ahmed Awwad was arrested Friday on two counts of attempted exportation of defense articles and technical data after he allegedly tried to steal schematics of an aircraft carrier under construction and have them sent to Egypt. Needless to say, the incident was fabricated in order to set the precedent for a far greater breach of U.S. technical data, most likely in respect to the U.S. Navy’s drone fleet.

Chines Attack Locations
Although this modern Pearl Harbor-like attack scenario has been exposed in the past, breaking news and events suggests that a redux attack is imminent. Although a drone-related attack by China could theoretically transpire in any U.S. city, the following are most likely due to their proximity to the Pacific Ocean.

Potential Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California

Chinese Cyber Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Revenge Drone Attack
In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

“Sting of the Drone”
The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

Asian “Surprise” Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

??????????????????

Vice Admiral Jan E. Tighe

In what appears to be pre-Chinese cyber-attack personal logistics by the U.S. Navy, it was revealed on April 3, 2014, that Vice Admiral Jan E. Tighe has been appointed head of the U.S. Fleet Cyber Command and the U.S. 10th Fleet, making her “the first female commander of a numbered fleet in U.S. Navy history”. The U.S. Fleet Cyber Command is an operating force of the United States Navy responsible for the Navy’s cyber warfare programs, while the United States Tenth Fleet executes the full spectrum of cyber, electronic warfare, information operations and signal intelligence capabilities across the cyber, electromagnetic and space domains. In the wake of a successful Chinese cyber-attack against the U.S. Navy, Vice Admiral Tighe, a woman, will be publically scapegoated for the unprecedented attack. The U.S. government and the media will predictably state that Tighe was over her head and not qualified for the position, making the issue about a woman serving in the military rather than the fact that the entire Chinese attack was a false-flag courtesy of the CIA.

I: DRONE CYBER-HIJHACK:

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2 China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

drone

1.3 Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

II: CALIFORNIA:

2.1 Chinese Attack on California
In order to make China’s drone attack on San Francisco be more explosive in nature, the CIA ordered three former U.S. Navy fleet oilers to be moved to Mare Island, just outside San Francisco Bay. Although the USS Hassayampa, the USS Kawishiwi, and the USS Ponchatoula were allegedly moved to the island for “cleaning”, it’s highly likely that they were actually filled with gasoline and/or explosives. That way, when they are struck with a drone missile, a massive explosion will erupt, creating a made-for-TV moment reminiscent of the December 7, 1941 Japanese attack on Pearl Harbor. California also has two nuclear reactors that may come under Chinese drone attack: The Diablo Canyon Power Plant located in San Luis Obispo County (just 231 miles from San Francisco), and the San Onofre Nuclear Generating Station in San Diego County. In the event that China is able to hijack U.S. drones, one or more of these nuclear reactors may be attacked, causing a Fukushima-like disaster in America. Interestingly, a similar nuclear reactor disaster if featured in the recent Hollywood propaganda film entitled “Godzilla” (2014), which also features an attack on San Francisco by an Asian-based monster.

Kaiju_Attack_SF_Aftermath_01

2.2 Golden Gate Bridge Attack
To make a Chinese attack on the U.S. even more psychologically terrorizing, a well-known landmark such as the Golden Gate Bridge in San Francisco must be destroyed in order to serve as life-long reminder of that horrific day (e.g., Twin Towers on 9/11). Back on February 23, 2012, it was reported that the Golden Gate Bridge will undergo a renovation project that will “take years to complete”. According to reports, the project involves the repainting of the two main suspension cables which are responsible for holding the bridge in place. Whether the lengthy “renovation” project has undermined the structural integrity of the bridge is not known, but the timely construction project may have provided the necessary cover for the installation of demolition explosives in and around the Golden Gate Bridge. Said explosives could be detonated at a later date via remote control in order to give the appearance of a successful Chinese attack on the bridge using drone missiles. In other words, the bridge would be demolished with shaped explosives while the government and media publicly blame China.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

chinainvadesamerica

Download & Forward PDF

David Chase Taylor
November 26, 2014
Truther.org

SWITZERLAND, Basel — As originally depicted in the June 30, 2014, Truther.org report entitled “China Plans to Cyber-Hijack U.S. Drones for Attack on America”, the CIA (which is in command and control of all 206 counties) is plotting a surprise drone attack on the U.S., most likely using American drones allegedly hijacked by the Chinese government.

In what appears to be a warning of a Chinese attack, Fox New published a report on November 26, 2014, entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat.

In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”

In order to make the United States vulnerable just prior to the slated Chinese attack, U.S. President Obama fired Secretary of Defense Chuck Hagel a day prior on November 25, 2014, making a spectacle of it while doing so. The timely firing was designed to make America look weak, thus inviting a surprise attack by China.

Back on November 9, 2014, the Financial Times of London published a report entitled “Beijing Sees the U.S. President as a Weak Leader in the Autumn of His Presidency”. The firing of the Secretary of Defense with no replacement will predictably be touted as the straw which broke the camel’s back.

That same day, November 25, 2014, Fox News published a report entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China.

The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”.

Two days prior on November 23, 2014, CNN published a report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus.

“Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks?

In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

Although this modern Pearl Harbor-like attack scenario has been exposed in the past, breaking news and events suggests that a redux attack is imminent. Although a drone-related attack by China could theoretically transpire in any U.S. city, the following are most likely due to their proximity to the Pacific Ocean.

Potential Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada.
4. Los Angeles, California
5. San Diego, California

It is imperative to note that once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will likely become the norm. This futuristic drone war scenario essentially allows the CIA to attack whomever and whatever they want—whenever they want.

The notion that the CIA is actively trying to trigger World War III between the U.S. and China has been exposed ad nauseam by Truther.org. To date, at least 6 different of Chinese “surprise” attack plots have been identified and exposed, the cyber-hijack of drones being the latest.

In the wake of these “surprise” Chinese attack plots being exposed, roughly 60 Chinese officials suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots.

Chinese Cyber Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Chinese Drone Attack

Revenge Drone Attack
In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

“Sting of the Drone”
The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

Asian “Surprise” Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

??????????????????

Vice Admiral Jan E. Tighe

In what appears to be pre-Chinese cyber-attack personal logistics by the U.S. Navy, it was revealed on April 3, 2014, that Vice Admiral Jan E. Tighe has been appointed head of the U.S. Fleet Cyber Command and the U.S. 10th Fleet, making her “the first female commander of a numbered fleet in U.S. Navy history”. The U.S. Fleet Cyber Command is an operating force of the United States Navy responsible for the Navy’s cyber warfare programs, while the United States Tenth Fleet executes the full spectrum of cyber, electronic warfare, information operations and signal intelligence capabilities across the cyber, electromagnetic and space domains. In the wake of a successful Chinese cyber-attack against the U.S. Navy, Vice Admiral Tighe, a woman, will be publically scapegoated for the unprecedented attack. The U.S. government and the media will predictably state that Tighe was over her head and not qualified for the position, making the issue about a woman serving in the military rather than the fact that the entire Chinese attack was a false-flag courtesy of the CIA.

I: DRONE CYBER-HIJHACK:

drone

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2 China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.3 Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

II: CALIFORNIA:

2.1 Chinese Attack on California
In order to make China’s drone attack on San Francisco be more explosive in nature, the CIA ordered three former U.S. Navy fleet oilers to be moved to Mare Island, just outside San Francisco Bay. Although the USS Hassayampa, the USS Kawishiwi, and the USS Ponchatoula were allegedly moved to the island for “cleaning”, it’s highly likely that they were actually filled with gasoline and/or explosives. That way, when they are struck with a drone missile, a massive explosion will erupt, creating a made-for-TV moment reminiscent of the December 7, 1941 Japanese attack on Pearl Harbor. California also has two nuclear reactors that may come under Chinese drone attack: The Diablo Canyon Power Plant located in San Luis Obispo County (just 231 miles from San Francisco), and the San Onofre Nuclear Generating Station in San Diego County. In the event that China is able to hijack U.S. drones, one or more of these nuclear reactors may be attacked, causing a Fukushima-like disaster in America. Interestingly, a similar nuclear reactor disaster if featured in the recent Hollywood propaganda film entitled “Godzilla” (2014), which also features an attack on San Francisco by an Asian-based monster.

Kaiju_Attack_SF_Aftermath_01

2.2 Golden Gate Bridge Attack
To make a Chinese attack on the U.S. even more psychologically terrorizing, a well-known landmark such as the Golden Gate Bridge in San Francisco must be destroyed in order to serve as life-long reminder of that horrific day (e.g., Twin Towers on 9/11). Back on February 23, 2012, it was reported that the Golden Gate Bridge will undergo a renovation project that will “take years to complete”. According to reports, the project involves the repainting of the two main suspension cables which are responsible for holding the bridge in place. Whether the lengthy “renovation” project has undermined the structural integrity of the bridge is not known, but the timely construction project may have provided the necessary cover for the installation of demolition explosives in and around the Golden Gate Bridge. Said explosives could be detonated at a later date via remote control in order to give the appearance of a successful Chinese attack on the bridge using drone missiles. In other words, the bridge would be demolished with shaped explosives while the government and media publicly blame China.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Basel, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

 

drone

Download & Forward PDF

David Chase Taylor
September 13, 2014
Truther.org

SWITZERLAND, Basel — As originally depicted in the June 30, 2014, Truther.org report entitled “China Plans to Cyber-Hijack U.S. Drones for Attack on America”, the CIA (which is in command and control of all 206 counties) is plotting a surprise drone attack on the U.S., most likely using American drones allegedly hijacked by the Chinese government.

Although this modern Pearl Harbor-like attack scenario has been exposed in the past, breaking news and events suggests that a redux attack is imminent. Although a drone-related attack by China could theoretically transpire in any U.S. city, the following are most likely due to their close proximity to the Pacific Ocean.

Potential Chinese Drone Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Los Angeles, California
4. San Diego, California

In order to bring global attention to China just prior to a surprise attack, Pope Francis stated that he wants dialogue with China on August 19, 2014. Considering the vast amount of Catholic cathedrals and dioceses in China, his statement was obviously politically motivated.

Roughly a month later on September 13, 2014, the Pope shockingly stated that World War III is now underway. His timely statement was evidently designed in order to foreshadow that the World War III scenario between the U.S. and China is about to commence, most likely via drone attack.

It is imperative to note that once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will likely become the norm. This futuristic drone war scenario essentially allows the CIA to attack whomever and whatever they want—whenever they want.

The notion that the CIA is actively trying to trigger World War III between the U.S. and China has been exposed ad nauseam by Truther.org. To date, at least 6 different of Chinese “surprise” attack plots have been identified and exposed, the cyber-hijack of drones being the latest.

In the wake of these “surprise” Chinese attack plots being exposed, roughly 60 Chinese officials suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots.

In order to bring unprecedented media attention to the Pacific just prior to a Chinese-related drone attack on the United States, it was reported on September 12, 2014, that Australia has inexplicably elevated its terrorism threat level. The report was evidently designed to infer that there is now a lurking danger in the Pacific.

A day later on September 13, 2014, it was reported that the U.S. Navy is now searching the Pacific Ocean for a U.S. Navy pilot after a deadly crash involving two American planes. The timely crash, which will likely be chalked up to a Chinese attack at a later date, highlighted the notion of aerial activity in the Pacific theater.

Lastly, on September 12, 2014, U.S. Supreme Court Justice Sonia Sotomayor stated that Americans should be alarmed by the spread of drones. Why Sotomayor is making asinine comments about drones is rather curious considering that the U.S. Supreme Court is not even ruling on the subject. Evidently, she was instructed by the CIA to make the statement in order to condition Americans for the impending drone attack.

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Drones Trending
Prior to a high-profile drone-related attack by China, the American public must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that, yes, it can happen. As evidenced drone-related terror is currently at an all-time high which suggests that a drone attack is imminent.

August-September 2014 Headlines:

1. August 7, 2014: Tourist crashes drone into Yellowstone hot spring
2. August 18, 2014: Navy conducts first series of drone and manned fighter jet operations
3. August 19, 2014: Greece: Drone drops mobile phones over prison walls
4. August 21, 2014: Drone flying near LAX sparks alarm from jet pilot
5. August 24, 2014: Israeli spy drone downed near Iran’s Natanz nuclear plant – Revolutionary Guards
6. August 24, 2014: Iran unveils new-generation drones and missiles
7. August 25, 2014: Now ISIS has drones?
8. August 25, 2014: Disney files patent applications to use drones at parks
9. August 25, 2014: Now ISIS has drones?
10. September 1, 2014: Pentagon to open second drone base in Niger as it expands operations in Africa
11. September 1, 2014: Drone gets peek at Apple’s new ‘spaceship’ campus
12. September 3, 2014: NASA is creating its own air traffic control system for drones
13. September 4, 2014: Man arrested for flying drone outside US Open
14. September 5, 2014: Drone pilot film at Venice meant to start debate, director says
15. September 11, 2014: Has this drone revealed the Star Wars film set?
16. September 11, 2014: Mystery drone lands in family’s backyard
17. September 12, 2014: Sotomayor: Americans Should be Alarmed by Spread of Drones
18. September 12, 2014: Pilot spots drone flying near Nashville airport runway
19. September 12, 2014: FAA Approves Runway For Unmanned Aircrafts in Texas

[Does not purport to be a complete list of drone-related headlines]

original

Revenge Drone Attack
In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

“Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

Asian “Surprise” Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

??????????????????

Vice Admiral Jan E. Tighe

In what appears to be pre-Chinese cyber-attack personal logistics by the U.S. Navy, it was revealed on April 3, 2014, that Vice Admiral Jan E. Tighe has been appointed head of the U.S. Fleet Cyber Command and the U.S. 10th Fleet, making her “the first female commander of a numbered fleet in U.S. Navy history”. The U.S. Fleet Cyber Command is an operating force of the United States Navy responsible for the Navy’s cyber warfare programs, while the United States Tenth Fleet executes the full spectrum of cyber, electronic warfare, information operations and signal intelligence capabilities across the cyber, electromagnetic and space domains. In the wake of a successful Chinese cyber-attack against the U.S. Navy, Vice Admiral Tighe, a woman, will be publically scapegoated for the unprecedented attack. The U.S. government and the media will predictably state that Tighe was over her head and not qualified for the position, making the issue about a woman serving in the military rather than the fact that the entire Chinese attack was a false-flag courtesy of the CIA.

I: DRONE CYBER-HIJHACK:

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2 China Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.3 Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

II: CALIFORNIA:

Kaiju_Attack_SF_Aftermath_01

2.1 Chinese Attack on California
In order to make China’s drone attack on San Francisco be more explosive in nature, the CIA ordered three former U.S. Navy fleet oilers to be moved to Mare Island, just outside San Francisco Bay. Although the USS Hassayampa, the USS Kawishiwi, and the USS Ponchatoula were allegedly moved to the island for “cleaning”, it’s highly likely that they were actually filled with gasoline and/or explosives. That way, when they are struck with a drone missile, a massive explosion will erupt, creating a made-for-TV moment reminiscent of the December 7, 1941 Japanese attack on Pearl Harbor. California also has two nuclear reactors that may come under Chinese drone attack: The Diablo Canyon Power Plant located in San Luis Obispo County (just 231 miles from San Francisco), and the San Onofre Nuclear Generating Station in San Diego County. In the event that China is able to hijack U.S. drones, one or more of these nuclear reactors may be attacked, causing a Fukushima-like disaster in America. Interestingly, a similar nuclear reactor disaster if featured in the recent Hollywood propaganda film entitled “Godzilla” (2014), which also features an attack on San Francisco by an Asian-based monster.

2.2 Golden Gate Bridge Attack
To make a Chinese attack on the U.S. even more psychologically terrorizing, a well-known landmark such as the Golden Gate Bridge in San Francisco must be destroyed in order to serve as life-long reminder of that horrific day (e.g., Twin Towers on 9/11). Back on February 23, 2012, it was reported that the Golden Gate Bridge will undergo a renovation project that will “take years to complete”. According to reports, the project involves the repainting of the two main suspension cables which are responsible for holding the bridge in place. Whether the lengthy “renovation” project has undermined the structural integrity of the bridge is not known, but the timely construction project may have provided the necessary cover for the installation of demolition explosives in and around the Golden Gate Bridge. Said explosives could be detonated at a later date via remote control in order to give the appearance of a successful Chinese attack on the bridge using drone missiles. In other words, the bridge would be demolished with shaped explosives while the government and media publicly blame China.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Basel, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a false-flag terror plot is exposed (e.g., 2011 Super Bowl Nuclear Terror Plot), it is immediately canceled or postponed (e.g., 2014 Super Bowl Nuclear Terror Plot). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

truther-rss

690x380-RIMPAC-2014

Download & Forward PDF

David Chase Taylor
July 22, 2014
Truther.org

SWITZERLAND, Basel — Unable to execute the World War III plot featuring the Chinese cyber-hijack of U.S. drones, it now appears that the CIA is plotting a Chinese attack on U.S. ships and/or Pearl Harbor during the 2014 RIMPAC Navel Exercise which is currently taking place off the coast of Hawaii until August 1, 2014.

It is during these elaborate war games consisting of 47 surface ships, 6 submarines, 200 aircraft, and 25,000 troops from 22 countries that the Chinese Navy are expected to execute a made-for-TV attack on the U.S., resulting in catastrophic casualties that will no doubt draw America into a war with China.

In what appears to be pre-U.S. vs. China war propaganda, “The Week” magazine published a report on July 7, 2014, entitled “China Thinks it can Defeat America in Battle”, inferring that the Chinese may attack the United States. Four days later on July 11, 2014, a Chinese man accused of hacking U.S. computers, further confirming that China is actively targeting the West.

In what appears to be post-Chinese attack preparation, it was reported on July 12, 2014, that U.S. Defense Secretary Chuck Hagel and Japanese Defense Minister Itsunori Onodera met at the Pentagon where they discussed rescue scenarios for U.S. ships under attack, a scenario which may present itself during the RIMPAC Naval Exercise.

In order to bring unprecedented media attention to the RIMPAC Navel Exercise just prior to a Chinese surprise attack, it was revealed on July 15, 2014, that a Canadian ship was sent home from Hawaii for misconduct. Although the incident reportedly occurred in San Diego prior to the start of RIMPAC, it wasn’t made public until 6 weeks later which suggests that it was only released now to draw attention to the drill prior to an attack.

Four days later on July 19, 2014, it was revealed that the USS Ronald Reagan had departed for the RIMPAC Naval Exercise. Although any U.S. ship could suffer a Chinese attack, the USS Ronald Reagan is the most likely due to its name and its role in pop culture video games such as Command & Conquer: Generals Zero Hour (2003) and “Prototype” (2009), as well as the blockbuster movie “Battleship (2012).

In what appears to be pre-Chinese surprise attack positioning, it was reported on July 21, 2014, that a Chinese spy ship has been surveying the RIMPAC drills off Hawaii. The report was evidently designed to infer that the Chinese are spying on America, making a surprise attack on a U.S. ship all the more believable.

The notion that the CIA (which is in command and control of all 206 nations) is actively attempting to trigger World War III between the U.S. and China has been exposed ad nauseam by Truther.org. To date, at least 6 different of Chinese “surprise” attack plots have been identified, the surprise attack at RIMPAC being the latest.

Coincidentally, in the wake of these Chinese surprise attack plots being exposed, roughly 60 Chinese government officials suddenly died due to unnatural causes. Although impossible to confirm, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned war plots which were foiled by Truther.org.

In what may be the war game for an upcoming Chinese attack on the U.S., the country of China reportedly held war games in the East China Sea on May 20-26, 2014. According to reports, Chinese and Russian naval vessels executed joint missions involving hijacked ships as well as joint air and joint sea assaults. In other words, it appears that China is perfecting her naval attack capabilities.

Air Force Lt. Gen. Lori J. Robinson
Similar to how Vice Admiral Jan E. Tighe (a woman) was appointed head of the U.S. Fleet Cyber Command just prior to the aforementioned Chinese cyber-hijack of U.S. drones, the Pentagon announced on July 17, 2014, that Air Force Lt. Gen. Lori J. Robinson has been nominated for promotion to four-star general and as commander of Pacific Air Forces, the Air Force component of U.S. Pacific Command. In short, the position is responsible for security in the Asia-Pacific region. In the wake of a successful Chinese attack against the U.S. Navy, Lt. Gen. Lori J. Robinson (a woman) will be publically scapegoated for the Pearl Harbor-like attack. The U.S. government and its media arms (e.g., CNN, FOX, MSNBC, etc.) will predictably state that Robinson was over her head and not qualified for the position, making the issue about a woman serving in the military rather than about the fact that the Chinese attack was a false-flag executed by the CIA.

Asian “Surprise” Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Basel, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a false-flag terror plot is exposed (e.g., 2011 Super Bowl Nuclear Terror Plot), it is immediately canceled or postponed (e.g., 2014 Super Bowl Nuclear Terror Plot). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

truther-rss

Chinese Drone Attack

Download & Forward PDF

David Chase Taylor
June 30, 2014
Truther.org

SWITZERLAND, Zurich — Sometime prior to on July 4, 2014, America’s 238th birthday, the CIA will likely attempt to trigger World War III between the U.S. and China with a wave of “surprise” attacks, starting from East to West. In the aftermath of the unprovoked attacks, a full-scale war between the U.S. and China will commence, possibly ending in all-out nuclear war.

The opening salvo by China will likely feature an aerial attack on Clark Air Base in the Philippines, a strategic U.S. military base in the Asia-Pacific Theater. Shortly thereafter, China will launch an attack on Pearl Harbor in Hawaii where the Chinese Navy is currently executing joint war games with the U.S. Navy. The third phase will feature the unprecedented Chinese cyber-hijack of multiple armed U.S. drones over California skies. Once the U.S. drones are under the command and control of China, the fourth and final phase will commence with deadly drone strikes across California, namely within the city of San Francisco.

In order to provide a timely motive for a surprise attack on America, China demanded that the U.S. stop spying after the latest Snowden leak. Since the U.S. openly refused to comply, China has no choice but to take matters into their own hands. Roughly two weeks later on take April 8, 2014, China warned that it could not be contained. The provocative statement was made during U.S. Secretary of Defense Chuck Hagel’s visit to China. Interestingly, on June 5, 2014, it was reported that China’s navy and air force are rapidly expanding their size and reach, a report which infers that China now has the ability to strike within the continental United States.

Chinese Attack Phases:

Phase I: Attack on the Philippines (Clark Air Base)
Phase II: Attack on Hawaii (Pearl Harbor)
Phase III: Cyber Hijack of U.S. Drones
Phase IV: Attack on California (San Francisco)

In order to bring unprecedented media attention to the act of cyber-hijacking prior to the cyber-hijacking of U.S. drones by China, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first cyber hijack. Shortly thereafter on May 5, 2014, the television series entitled “24: Live Another Day” (2014) debuted, featuring the cyber-hijacking of 6 U.S. drones over Europe. Said drones were subsequently used to attack London, killing hundreds of innocent people.

It is imperative to note that once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

In what appears to be Chinese “surprise” attack propaganda, Nike released a television commercial entitled “Ball Handles” on June 15, 2014, featuring an overweight Chinese basketball player wearing a t-shirt with the California state flag. In the commercial, the Chinese player brags about how good he is before repeatedly punching the other players in the groin in order to score. The state-of-the-art propaganda was evidently designed to foreshadow the notion that California is about to get sucker punched in the balls by China via the cyber-hijacking of U.S. drones.

The notion that the CIA is actively trying to trigger World War III between the U.S. and China has been exposed ad nauseam by Truther.org. To date, at least 5 different of Chinese “surprise” attack plots have been identified and exposed, the cyber-hijack of drones being the latest. In the wake of these Chinese attack plots being exposed, roughly 60 Chinese officials suddenly died due to unnatural causes. Although impossible to confirm, it appears that these Chinese officials were executed due to their first-hand knowledge of the foiled war plots.

HT_sting_of_the_Drone_mar_140507_16x9_608

“Sting of the Drone”
The notion that the U.S. and China are on a irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

I: ATTACK ON THE PHILLIPINES:

1.1 Chinese Attack on the Philippines
In order to provide a timely motive for a Chinese attack on the Philippines, namely Clark Air Base, President Barack Obama signed a 10-year agreement with the Philippines on April 28, 2014, which gives the U.S military access to Philippine military bases. “The Enhanced Defense Cooperation Agreement” essentially allows for U.S. forces to operate out of “Agreed Locations,” which are defined as: “facilities and areas that are provided by the Government of the Philippines through the Armed Forces of the Philippines (AFP) and that United States forces, United States contractors, and others as mutually agreed”. The Agreement hands over all operational controls of these “Agreed Locations” to the United States, and allows U.S. forces to preposition and store defense materiel, equipment, and supplies. In other words, the Philippines are about to become the main U.S. military base in Asia once a full-scale war with China commences. Roughly 3-weeks later on May 20, 2014, Philippine President Aquino stated that China is in violation of informal sea code, providing yet another timely motive for a Chinese attack on the Philippines. In order to raise the notion of an impending attack on the Philippines, it was reported on June 26, 2014, that the U.S. plans to downsize its “anti-terror” group in the Philippines. Three days later on June 29, 2014, the Philippines were officially put on alert for a terror attack, one that should come courtesy of China any day now. Since the U.S. and the Philippines are strategic allies, an attack on the Philippines is considered an attack on the U.S. Consequently, the U.S. can be drawn into a war in a matter of days.

II: ATTACK ON HAWAII:

2.1 Chinese Navy in Hawaii
In what appears to be the drill for an upcoming Chinese attack on the U.S., China reportedly held war games in the East China Sea on May 20-26, 2014. According to reports, Chinese and Russian naval vessels executed joint missions involving hijacked ships as well as joint air and joint sea assaults. In other words, the Chinese were perfecting both hijacks and attacks. Exactly 1 month later on June 26, 2014, China began participating in the world’s largest naval drills entitled “Rim of the Pacific Exercise” (RIMPAC), a biannual U.S.-led naval exercise off the coast of Hawaii. RIMPAC, which is scheduled to take place from June 26, 2014 until August 1, 2014, reportedly involves 47 surface ships, 6 submarines, over 200 aircraft, and 25,000 troops from 22 countries. It is during these elaborate war games that the Chinese are expected to attack U.S. ships and/or Pearl Harbor, resulting in catastrophic casualties in and around Hawaii, Obama’s alleged birth state.

drone

III: DRONE CYBER-HIJHACK:

3.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

3.2 China Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

3.3 Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

IV: DRONE ATTACK ON CALIFORNIA:

4.1 Chinese Attack on California
In order to make China’s drone attack on San Francisco be more explosive in nature, the CIA ordered three former U.S. Navy fleet oilersto be moved to Mare Island, just outside San Francisco Bay. Although the USS Hassayampa, the USS Kawishiwi, and the USS Ponchatoula were allegedly moved to the island for “cleaning”, it’s highly likely that they were actually filled with gasoline and/or explosives. That way, when they are struck with a drone missile, a massive explosion will erupt, creating a made-for-TV moment reminiscent of the December 7, 1941 Japanese attack on Pearl Harbor. California also has two nuclear reactors that may come under Chinese drone attack: The Diablo Canyon Power Plant located in San Luis Obispo County (just 231 miles from San Francisco), and the San Onofre Nuclear Generating Station in San Diego County. In the event that China is able to hijack U.S. drones, one or more of these nuclear reactors may be attacked, causing a Fukushima-like disaster in America. Interestingly, a similar nuclear reactor disaster if featured in the recent Hollywood propaganda film entitled “Godzilla” (2014), which also features an attack on San Francisco by an Asian-based monster.

Kaiju_Attack_SF_Aftermath_01

4.2 Golden Gate Bridge Attack
To make a Chinese attack on the U.S. even more psychologically terrorizing, a well-known landmark such as the Golden Gate Bridge in San Francisco must be destroyed in order to serve as life-long reminder of that horrific day (e.g., Twin Towers on 9/11). Back on February 23, 2012, it was reported that the Golden Gate Bridge will undergo a renovation project that will “take years to complete”. According to reports, the project involves the repainting of the two main suspension cables which are responsible for holding the bridge in place. Whether the lengthy “renovation” project has undermined the structural integrity of the bridge is not known, but the timely construction project may have provided the necessary cover for the installation of demolition explosives in and around the Golden Gate Bridge. Said explosives could be detonated at a later date via remote control in order to give the appearance of a successful Chinese attack on the bridge using drone missiles. In other words, the bridge would be demolished with shaped explosives while the government and media publicly blame China.

4.3 Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

4.4 Asian “Surprise” Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to July 4, 2014.

V. AFTERMATH:

??????????????????

5.1 Vice Admiral Jan E. Tighe
In what appears to be pre-Chinese cyber-attack personal logistics by the U.S. Navy, it was revealed on April 3, 2014, that Vice Admiral Jan E. Tighe has been appointed head of the U.S. Fleet Cyber Command and the U.S. 10th Fleet, making her “the first female commander of a numbered fleet in U.S. Navy history”. The U.S. Fleet Cyber Command is an operating force of the United States Navy responsible for the Navy’s cyber warfare programs, while the United States Tenth Fleet executes the full spectrum of cyber, electronic warfare, information operations and signal intelligence capabilities across the cyber, electromagnetic and space domains. In the wake of a successful Chinese cyber-attack against the U.S. Navy, Vice Admiral Tighe, a woman, will be publically scapegoated for the unprecedented attack. The U.S. government and the media will predictably state that Tighe was over her head and not qualified for the position, making the issue about a woman serving in the military rather than the fact that the entire Chinese attack was a false-flag courtesy of the CIA.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a false-flag terror plot is exposed (e.g., 2011 Super Bowl Nuclear Terror Plot), it is immediately canceled or postponed (e.g., 2014 Super Bowl Nuclear Terror Plot). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

truther-rss

Obama China

Download & Forward PDF

David Chase Taylor
March 19, 2014
Truther.org

SWITZERLAND, Zurich — On March 19, 2014, First Lady Michelle Obama will travel to China along with her daughters Malia and Sasha, as well as her mother Marian Robinson. They will reportedly make stops in the Chinese capital city of Beijing, the central city of Xian, and the southwestern city of Chengdu before returning to the U.S. on March 26, 2014.

It is during this trip to China that Michelle and/or her daughters may be kidnapped and held hostage for an extended period of time by so-called Chinese Islamic terrorists. The reasoning behind this type of state-sponsored terror plot is multi-faceted for it would be used to:  a) create an international hostage crisis to terrorize the world, b) introduce the world to Chinese-style Islamic terror, c) create a new “Cold War” between the U.S. and China, and d) increase Barack Obama’s popularity which is currently at an all-time low. Interestingly, on February 20, 2014, the Financial Times of London published a report entitled “US v China: Is this the New Cold War?” which suggests that a manufactured crisis between the United States and China may be imminent.

READ: Chinese EMP Attack and Nuclear Drone Strike on U.S.

As a sitting U.S. President, Barack Obama only visited China once back on November 15–18, 2009. Therefore, it is rather odd that Michele would travel to China along with her daughters and mother for a trip to reportedly boost U.S-based education which her husband has done his best to destroy. Michelle Obama stated on the White House blog that, “I’ll be visiting a university and two high schools in Beijing and Chengdu…I’ll be talking with students about their lives in China and telling them about America and the values and traditions we hold dear.” One of Michelle’s meetings will be with Peng Liyuan, the wife of Chinese President Xi Jinping. In the wake of an attack on Mrs. Obama and/or her daughters, the meeting with Mrs. Liyuan may be cited as motive.

READ: Red Dawn Scenario: Chinese Attack On America Imminent

In the weeks leading up to the Obama’s trip to China, there have been at least two high-profile hostage situations both involving women. For example, on March 9, 2014, it was reported that Saudi Arabian princesses claim that they are being held by a Saudi king against their will. A day later on March 10, 2014, it was reported that 13 nuns were freed by Syrian kidnappers after being held since November of 2013. Needless to say, these both events were likely staged to psychologically program the public for a high-profile kidnapping and hostage crisis involving women.

READ: China’s World War III Doomsday Plot Exposed

Hostage Terror Trending
Aside from the American television show entitled “Hostages” (see trailer) which premiered on CBS on September 23, 2013, Truther.org has exposed a number of state-sponsored hostage terror plots . For example, back on September 23, 2013, Truther.org identified a terror plot which featured the Iranian kidnapping of Natasha and Malia Obama in New York City. The terror plot was slated to be a redux of the infamous Iranian Hostage Crisis (1979-1981) in which Americans were held for 444 days. Three months later on December 28, 2013, Truther.org identified a second terror plot which involved a terror attack and hostage crisis at the CNN Center in Atlanta, Georgia. Roughly 2 months later on February 4, 2014, Truther.org identified a third terror plot in which members of the USA Hockey team were to be kidnapped while on their way to participate in the 2014 Winter Olympics in Sochi, Russia. Therefore, a fourth terror plot targeting Mrs. Obama and possibly her daughters is to be expected.

READ: Chinese “Live TV” Cyber-Hijack with “Live” Nuclear Detonation

Chinese Terror Trending
In the last 6 months, Islamic terror in China has been reaching a crescendo. For example, on October 30, 2013, Chinese police arrested 5 people over a terror attack in Tiananmen Square. Roughly 2 months later on December 16, 2013, it was reported that Chinese police shot and killed 14 suspected terrorists in the northwest Muslim region of China. Two weeks later on December 30, 2013, it was reported that Chinese police killed another 8 “terrorists” in Xinjiang province. A month later on January 25, 2014, it was reported that 12 people were killed after Chinese police attacked terrorists in Xinjiang province. A few weeks later on February 15, 2014, it was reported that China had killed 11 more “terrorists” in the Xinjiang region. A couple of weeks later on March 1, 2014, Xinjiang terrorists attacked a crowded train station with knives, killing  29 people and injuring 130 in what is now being called the “Chinese 9/11”. Roughly 2 weeks later on March 14, 2014, a knife fight in Chinese market left 5 dead in Xinjiang province. Since October of 2013, there have been a total of at least 214 victims of Chinese-related Islamic terrorism. Therefore, a scenario in which a group of terrorists kidnap Mrs. Obama and/or her daughters is theoretically plausible.

READ: Chinese “Kamikaze” Done Attack on Pearl Harbor Hawaii

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the man-made comet ISON hoax and the drone strike on “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a false-flag terror plot is exposed (e.g., 2011 Super Bowl Nuclear Terror Plot), it is immediately canceled or postponed (e.g., 2014 Super Bowl Nuclear Terror Plot). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

truther-rss

4_US_citizen_on_missing_Malaysia_Airline_1399150000_3337178_ver1.0_640_480

Download & Forward PDF

UPDATE: On March 10, 2014, it was reported that the 2 stolen passports were used with 2 tickets purchased by an Iranian man who: a) bought the tickets at the last-minute, b) paid cash, and c) only purchased one-way tickets. All three are signs of potential terrorism and therefore, although early, Truther.org is forecasting that the mysterious disappearance of Malaysian Airlines Flight MH370 will ultimately be scapegoated onto the country of Iran in a desperate bid to stoke global fears of Islamic terrorism.  The investigation into the cause of the crash will likely take weeks if not months and therefore the media will have plenty of time to fearmonger over the impending wave of Islamic terror under new Iranian President Hassan Rouhani. After all, Iran was to be scapegoated in the February 2, 2014, failed nuke attack on New York City during the Super Bowl, so the downing of a commercial airline would comparably insignificant.

David Chase Taylor
March 8, 2014
Truther.org

SWITZERLAND, Zurich — Literally minutes after the 2nd Crimean War Plot was exposed by Truther.org on March 8, 2014, Malaysia Airlines flight MH370 inexplicably disappeared from radar screens while flying over Vietnam airspace. The sudden and shocking disappearance of a commercial aircraft carrying 239 people in this day and age is highly suspicious, especially considering the ever growing number of radars and satellites.

Breaking news now suggests that the missing Malaysian Airlines Boeing 777  may be used by Asian-based Islamic terrorists as a weapon of mass destruction against civilian or military targets in Asia or the Unites States. According to a March 8, 2014 report, Austrian Foreign Ministry spokesman Matt Weiss told CNN that a man listed on the Malaysia Airlines flight MH370’s manifest is safe and was never aboard the missing aircraft. Weiss further stated that the Austrian national’s passport was allegedly stolen two years ago, an ominous sign that it may have been used by a terrorist to board the missing plane.

READ: U.S. Invasion by Islamic Terrorists and 9/11-Style Terror Attacks Imminent

Italian Foreign Ministry spokesman Aldo Amati also confirmed that no one from his country was on the missing plane, even though an Italian was listed on Malaysia Airlines flight MH370’s manifest. Like the Austrian passenger, reports suggest that the Italian passenger’s passport was previously stolen. In other words, there are at least 2 potential terrorists on Malaysia Airlines flight MH370 who may have hijacked the plane in an attempt to execute a 9/11-style terror attack.

READ: Chinese EMP Attack and Nuclear Drone Strike on U.S. Imminent

In the last 6 months alone, Truther.org has identified 3 separate 9/11-style state-sponsored terror plots emanating out of Africa and the Middle East (e.g., November 25, 2013—U.S. Airport Attack; February 9, 2014—Winter Olympic Attack; and February 22, 2014—Cuba Based Attack). Therefore, it now appears that international intelligence agencies have green-lit an Asian-based 9/11-style Islamic terror attack which may feature aerial attacks on Las Vegas, Nevada, Seattle, Washington, San Francisco, Los Angeles, or San Diego, California.

READ: 9/11-Style Terror Alert: Kamikaze Attacks Planned for U.S. and Sochi Olympics

The notion of air-related terror emanating from Asia was recently witnessed when Asiana Airlines Flight 214 from South Korea crashed at San Francisco International Airport on July 6, 2013. Although the Boeing 777-200ER aircraft reportedly crashed on its final approach into San Francisco, no video of the crash has ever been released which suggests that the entire crash was a hoax. Six months later on January 2, 2014, the Chinese Consulate in San Francisco was damaged in an arson attack, further foreshadowing Chinese terror in California.

xmh-kul-pek.jpg.pagespeed.ic.W-jEmzuXAB

Chinese Terror Trending
In the last few months, Islamic terror in China has been reaching a crescendo. For example, on October 30, 2013, Chinese police arrested 5 people over a terror attack in Tiananmen Square. Roughly 2 months later on December 16, 2013, it was reported that Chinese police shot and killed 14 suspected terrorists in the northwest Muslim region of China. Two weeks later on December 30, 2013, it was reported that Chinese police killed another 8 “terrorists” in Xinjiang province. A month later on January 25, 2014, it was reported that 12 people were killed after Chinese police attacked terrorists in Xinjiang province. A few weeks later on February 15, 2014, it was reported that China had killed 11 more “terrorists” in the Xinjiang region. Earlier this month on March 1, 2014, Xinjiang terrorists attacked a crowded train station with knives, killing  29 people and injuring 130 in what is now being called the “Chinese 9/11”. Needless to say, a Chinese-based 9/11-style terror attack on the U.S. would be the next step in the evolution of China-based terrorism.

READ: 9/11 Déjà Vu Terror Attacks on U.S. Airports Imminent

9/11 Programming
Media programming in respect to an impending 9/11-style terror attack has been escalating as of late. For example, on February 2, 2014, immediately after the failed nuke attack on New York City, a so-called 9/11 truther interrupted the Super Bowl MVP’s press conference by yelling that 9/11 was an inside job. Roughly a month later on March 6, 2014, it was reported that a video of the 9/11 attack which was captured from space will be shown for first time on network television in the coming weeks. A day later on March 7, 2014, STRATFOR intelligence operative Alex Jones did a sit-down interview with TV host Tucker Carlson on the demolition of Building #7 on September 11, 2001. Needless to say, these incidents, videos and interviews have been orchestrated just prior to a new 9/11-style attack.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the 2014 global bio-terror pandemic. To date, David Chase Taylor has blown the whistle on 50+ state-sponsored terror plots, including the man-made comet ISON hoax, the drone strike on “Fast and Furious” star Paul Walker, and he was the first to expose Alex Jones’ links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. State-sponsored terror alerts, warning, assertions and forecasts made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically occur based on the cited date. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl XLV Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

truther-rss