Archive for the ‘China’ Category

Obama China

Download & Forward PDF

David Chase Taylor
March 19, 2014
Truther.org

SWITZERLAND, Zurich — On March 19, 2014, First Lady Michelle Obama will travel to China along with her daughters Malia and Sasha, as well as her mother Marian Robinson. They will reportedly make stops in the Chinese capital city of Beijing, the central city of Xian, and the southwestern city of Chengdu before returning to the U.S. on March 26, 2014.

It is during this trip to China that Michelle and/or her daughters may be kidnapped and held hostage for an extended period of time by so-called Chinese Islamic terrorists. The reasoning behind this type of state-sponsored terror plot is multi-faceted for it would be used to:  a) create an international hostage crisis to terrorize the world, b) introduce the world to Chinese-style Islamic terror, c) create a new “Cold War” between the U.S. and China, and d) increase Barack Obama’s popularity which is currently at an all-time low. Interestingly, on February 20, 2014, the Financial Times of London published a report entitled “US v China: Is this the New Cold War?” which suggests that a manufactured crisis between the United States and China may be imminent.

READ: Chinese EMP Attack and Nuclear Drone Strike on U.S.

As a sitting U.S. President, Barack Obama only visited China once back on November 15–18, 2009. Therefore, it is rather odd that Michele would travel to China along with her daughters and mother for a trip to reportedly boost U.S-based education which her husband has done his best to destroy. Michelle Obama stated on the White House blog that, “I’ll be visiting a university and two high schools in Beijing and Chengdu…I’ll be talking with students about their lives in China and telling them about America and the values and traditions we hold dear.” One of Michelle’s meetings will be with Peng Liyuan, the wife of Chinese President Xi Jinping. In the wake of an attack on Mrs. Obama and/or her daughters, the meeting with Mrs. Liyuan may be cited as motive.

READ: Red Dawn Scenario: Chinese Attack On America Imminent

In the weeks leading up to the Obama’s trip to China, there have been at least two high-profile hostage situations both involving women. For example, on March 9, 2014, it was reported that Saudi Arabian princesses claim that they are being held by a Saudi king against their will. A day later on March 10, 2014, it was reported that 13 nuns were freed by Syrian kidnappers after being held since November of 2013. Needless to say, these both events were likely staged to psychologically program the public for a high-profile kidnapping and hostage crisis involving women.

READ: China’s World War III Doomsday Plot Exposed

Hostage Terror Trending
Aside from the American television show entitled “Hostages” (see trailer) which premiered on CBS on September 23, 2013, Truther.org has exposed a number of state-sponsored hostage terror plots . For example, back on September 23, 2013, Truther.org identified a terror plot which featured the Iranian kidnapping of Natasha and Malia Obama in New York City. The terror plot was slated to be a redux of the infamous Iranian Hostage Crisis (1979-1981) in which Americans were held for 444 days. Three months later on December 28, 2013, Truther.org identified a second terror plot which involved a terror attack and hostage crisis at the CNN Center in Atlanta, Georgia. Roughly 2 months later on February 4, 2014, Truther.org identified a third terror plot in which members of the USA Hockey team were to be kidnapped while on their way to participate in the 2014 Winter Olympics in Sochi, Russia. Therefore, a fourth terror plot targeting Mrs. Obama and possibly her daughters is to be expected.

READ: Chinese “Live TV” Cyber-Hijack with “Live” Nuclear Detonation

Chinese Terror Trending
In the last 6 months, Islamic terror in China has been reaching a crescendo. For example, on October 30, 2013, Chinese police arrested 5 people over a terror attack in Tiananmen Square. Roughly 2 months later on December 16, 2013, it was reported that Chinese police shot and killed 14 suspected terrorists in the northwest Muslim region of China. Two weeks later on December 30, 2013, it was reported that Chinese police killed another 8 “terrorists” in Xinjiang province. A month later on January 25, 2014, it was reported that 12 people were killed after Chinese police attacked terrorists in Xinjiang province. A few weeks later on February 15, 2014, it was reported that China had killed 11 more “terrorists” in the Xinjiang region. A couple of weeks later on March 1, 2014, Xinjiang terrorists attacked a crowded train station with knives, killing  29 people and injuring 130 in what is now being called the “Chinese 9/11”. Roughly 2 weeks later on March 14, 2014, a knife fight in Chinese market left 5 dead in Xinjiang province. Since October of 2013, there have been a total of at least 214 victims of Chinese-related Islamic terrorism. Therefore, a scenario in which a group of terrorists kidnap Mrs. Obama and/or her daughters is theoretically plausible.

READ: Chinese “Kamikaze” Done Attack on Pearl Harbor Hawaii

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the man-made comet ISON hoax and the drone strike on “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a false-flag terror plot is exposed (e.g., 2011 Super Bowl Nuclear Terror Plot), it is immediately canceled or postponed (e.g., 2014 Super Bowl Nuclear Terror Plot). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

truther-rss

4_US_citizen_on_missing_Malaysia_Airline_1399150000_3337178_ver1.0_640_480

Download & Forward PDF

UPDATE: On March 10, 2014, it was reported that the 2 stolen passports were used with 2 tickets purchased by an Iranian man who: a) bought the tickets at the last-minute, b) paid cash, and c) only purchased one-way tickets. All three are signs of potential terrorism and therefore, although early, Truther.org is forecasting that the mysterious disappearance of Malaysian Airlines Flight MH370 will ultimately be scapegoated onto the country of Iran in a desperate bid to stoke global fears of Islamic terrorism.  The investigation into the cause of the crash will likely take weeks if not months and therefore the media will have plenty of time to fearmonger over the impending wave of Islamic terror under new Iranian President Hassan Rouhani. After all, Iran was to be scapegoated in the February 2, 2014, failed nuke attack on New York City during the Super Bowl, so the downing of a commercial airline would comparably insignificant.

David Chase Taylor
March 8, 2014
Truther.org

SWITZERLAND, Zurich — Literally minutes after the 2nd Crimean War Plot was exposed by Truther.org on March 8, 2014, Malaysia Airlines flight MH370 inexplicably disappeared from radar screens while flying over Vietnam airspace. The sudden and shocking disappearance of a commercial aircraft carrying 239 people in this day and age is highly suspicious, especially considering the ever growing number of radars and satellites.

Breaking news now suggests that the missing Malaysian Airlines Boeing 777  may be used by Asian-based Islamic terrorists as a weapon of mass destruction against civilian or military targets in Asia or the Unites States. According to a March 8, 2014 report, Austrian Foreign Ministry spokesman Matt Weiss told CNN that a man listed on the Malaysia Airlines flight MH370’s manifest is safe and was never aboard the missing aircraft. Weiss further stated that the Austrian national’s passport was allegedly stolen two years ago, an ominous sign that it may have been used by a terrorist to board the missing plane.

READ: U.S. Invasion by Islamic Terrorists and 9/11-Style Terror Attacks Imminent

Italian Foreign Ministry spokesman Aldo Amati also confirmed that no one from his country was on the missing plane, even though an Italian was listed on Malaysia Airlines flight MH370’s manifest. Like the Austrian passenger, reports suggest that the Italian passenger’s passport was previously stolen. In other words, there are at least 2 potential terrorists on Malaysia Airlines flight MH370 who may have hijacked the plane in an attempt to execute a 9/11-style terror attack.

READ: Chinese EMP Attack and Nuclear Drone Strike on U.S. Imminent

In the last 6 months alone, Truther.org has identified 3 separate 9/11-style state-sponsored terror plots emanating out of Africa and the Middle East (e.g., November 25, 2013—U.S. Airport Attack; February 9, 2014—Winter Olympic Attack; and February 22, 2014—Cuba Based Attack). Therefore, it now appears that international intelligence agencies have green-lit an Asian-based 9/11-style Islamic terror attack which may feature aerial attacks on Las Vegas, Nevada, Seattle, Washington, San Francisco, Los Angeles, or San Diego, California.

READ: 9/11-Style Terror Alert: Kamikaze Attacks Planned for U.S. and Sochi Olympics

The notion of air-related terror emanating from Asia was recently witnessed when Asiana Airlines Flight 214 from South Korea crashed at San Francisco International Airport on July 6, 2013. Although the Boeing 777-200ER aircraft reportedly crashed on its final approach into San Francisco, no video of the crash has ever been released which suggests that the entire crash was a hoax. Six months later on January 2, 2014, the Chinese Consulate in San Francisco was damaged in an arson attack, further foreshadowing Chinese terror in California.

xmh-kul-pek.jpg.pagespeed.ic.W-jEmzuXAB

Chinese Terror Trending
In the last few months, Islamic terror in China has been reaching a crescendo. For example, on October 30, 2013, Chinese police arrested 5 people over a terror attack in Tiananmen Square. Roughly 2 months later on December 16, 2013, it was reported that Chinese police shot and killed 14 suspected terrorists in the northwest Muslim region of China. Two weeks later on December 30, 2013, it was reported that Chinese police killed another 8 “terrorists” in Xinjiang province. A month later on January 25, 2014, it was reported that 12 people were killed after Chinese police attacked terrorists in Xinjiang province. A few weeks later on February 15, 2014, it was reported that China had killed 11 more “terrorists” in the Xinjiang region. Earlier this month on March 1, 2014, Xinjiang terrorists attacked a crowded train station with knives, killing  29 people and injuring 130 in what is now being called the “Chinese 9/11”. Needless to say, a Chinese-based 9/11-style terror attack on the U.S. would be the next step in the evolution of China-based terrorism.

READ: 9/11 Déjà Vu Terror Attacks on U.S. Airports Imminent

9/11 Programming
Media programming in respect to an impending 9/11-style terror attack has been escalating as of late. For example, on February 2, 2014, immediately after the failed nuke attack on New York City, a so-called 9/11 truther interrupted the Super Bowl MVP’s press conference by yelling that 9/11 was an inside job. Roughly a month later on March 6, 2014, it was reported that a video of the 9/11 attack which was captured from space will be shown for first time on network television in the coming weeks. A day later on March 7, 2014, STRATFOR intelligence operative Alex Jones did a sit-down interview with TV host Tucker Carlson on the demolition of Building #7 on September 11, 2001. Needless to say, these incidents, videos and interviews have been orchestrated just prior to a new 9/11-style attack.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the 2014 global bio-terror pandemic. To date, David Chase Taylor has blown the whistle on 50+ state-sponsored terror plots, including the man-made comet ISON hoax, the drone strike on “Fast and Furious” star Paul Walker, and he was the first to expose Alex Jones’ links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. State-sponsored terror alerts, warning, assertions and forecasts made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically occur based on the cited date. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl XLV Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

truther-rss

Chinese EMP Nuke Drone Attack

Download & Forward PDF

David Chase Taylor
March 2, 2014
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that international intelligence agencies have once again green-lit a Chinese-based nuclear attack on the United States of America. With a recent poll finding that China is now America’s top enemy and revelations that a new U.S. versus China cold war is imminent, the pretext for a “Digital Pearl Harbor” has quietly been established.

The impending Pearl Harbor-like surprise attack will likely commence with an EMP (Electromagnetic Pulse) attack on U.S. satellites and defense systems in the Pacific theater, ultimately rendering U.S.-based radar and electronic warning systems useless. Shortly thereafter, autonomous drones armed with nuclear weapons will likely be launched from Chinese ships and nuclear subs in the Pacific Ocean. Although targets are always subject to change, twin nuclear drone strikes against the West Coast cities of San Diego and San Francisco, California are the most likely attack scenario.

READ: China’s World War III Doomsday Plot Exposed

Although reports in respect to China’s EMP program have been public since 2011 (see below), it was revealed on January 30, 2014, that China’s EMP weapons are an “ace” against U.S. defense systems and that the Chinese military is looking to use an EMP attack as part of a “one-two punch to knock out – literally within seconds – all defensive electronics”. The one-punch being the EMP attack followed by a two-punch nuclear attack. The notion that China plans to target the U.S. with an EMP strike was reiterated in the February 3, 2014, report entitled “U.S. Evaluates China’s EMP Threat”. Predictably, the Department of Defense (DOD) publically stated that they are “unaware of any increase in the threat of a deliberate destructive use of an EMP device”.

As depicted in the January 8, 2014, report entitled “Strategic Military Satellites Vulnerable to Attack by China in Future Space War”, U.S. satellites are no match for a space-based Chinese cyber-attack. The notion that U.S. computers could suddenly be rendered useless by an unseen and undetectable force such as an EMP strike was recently highlighted in a February 25, 2014, report which revealed that the first contagious airborne Wi-Fi computer virus has now been detected. Unbeknownst to most, digital backdoors, which allow for “Zero Day Attacks”, have been built into all military software to specifically allow for EMP and cyber-like attacks.

READ: Red Dawn Scenario: Chinese Attack On America Imminent

Back on November 19, 2013, it was reported that retired U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the Internet. In other words, Chinese computer viruses could theoretically attack U.S. military defense systems (even those not connected to the internet), ultimately rendering them useless.

Despite growing evidence that nuclear bombs likely do not even exist (see: February 4, 2014 Truther.org report) U.S. President Barack “O-Bomb-A”, (i.e., Barry Soetoro) is without a doubt the anointed nuclear doomsday president. Therefore, until Obama is ousted from public office, the world will be under the threat of state-sponsored nuclear terrorism. In the aftermath of a Chinese or Iranian nuclear attack, Obama will institute martial law and declare himself dictator. This was all but confirmed in the February 27, 2014, Fox News report which stated that Obama is about ready to make a “government unto himself“, a Hitler-like move if there ever was one.

fallout

Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

Chinese Space Attack
In order to attack U.S. satellites and defense systems, the Chinese government had to first prove to the world that they are smart enough technologically-wise to do so. This was all but confirmed on December 14, 2013, when China allegedly became the third country to land on moon. Roughly 2 weeks later on December 29, 2013, a report entitled “NASA Beware China’s Red Space Storm Rising” sounded the alarm in respect to China’s offensive space program. A month later on January 29, 2014, defense experts warned that China has boosted its space warfare capabilities. Although not yet confirmed, it does appear that China’s “Jade Rabbit” moon rover is military cover for the EMP-attack program which will take out U.S.-based military satellites and defense systems.

china-military-drone-stealth-russia.si

Chinese Drone Launch
Should Chinese drones nuke U.S. cities, they will most likely takeoff from Chinese ships in or near U.S. waters. According to a February 11, 2014, report published in respect to two Iranian warships off the coast of the U.S., the Pentagon stated that they may sail wherever they like, a reckless gesture at best. Four days later on February 15, 2014, a North Korean ship which had previously transported illegal weapons to Cuba returned to the island, unabated. A few weeks later on February 26, 2014, it was reported that a Russian spy ship was docked in Havana, Cuba, just 90 miles off the coast of America. These reports were published in order to: a) show that enemy war ships are sailing just off the coast of America, and b) that Chinese ships will be able to get close enough to U.S. shores in order to launch their nuclear drone strikes.

The “Invisibility Cloak
In order for China to pull off a “stealth” nuke attack on America, they will have to, at least theoretically speaking, employ some sort of technology which renders America’s defenses useless. Coincidentally, on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat about the development of an invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when the Chinese attack America, they may do so with the aid of superior technology which in will in essence have allowed their military equipment to become invisible to American defense systems (e.g., radar, satellites, sonar, etc.).

Asian Sneak “Attack” Propaganda
Prior to a high-profile Asian based West Coast attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. On July 12th, 2013, the film “Pacific Rim” (2013) (see trailer) was released which features a story line in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, their first 3 attacks target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico. If and when this Hollywood terror programming will manifest in reality is unknown, but the precedent for a surprise attack on the West Coast of America definitely has been set.

emp-blast-effects1

I: EMP ATTACK:

1.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

1.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

II. CYBER TERROR:

2.1: U.S. Vulnerable to Chinese Cyber Attack
Aside from the fact that Chinese hackers reportedly crashed Federal Election Commission website on December 19, 2013, recent reports in respect to cyber-security (or lack thereof) suggests that cyber-attacks against U.S. governmental institutions are imminent. For example, on February 4, 2014, it was revealed that a U.S. Senate report found that federal agencies often fail to take basic preventive cyber-security measures. That same day, it was also reported that “password” is the password on many U.S. government computer accounts, furthering the notion that feds are an easy target for hackers. A day later on February 5, 2014, a U.S. government report found that 4 in 10 government security breaches go undetected, suggesting that cyber-attacks are much more prevalent than originally thought. Needless to say, these propaganda reports have been disseminated with the goal of making the American public believe that the U.S. government is highly vulnerable to a cyber-attack, possibly emanating from China.

2.2: Cyber Doomsday
Since June of 2012, numerous propaganda articles have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, “Threat Of ‘Spectacular’ Cyberattack Looms” and “U.S. Homeland Chief: Cyber 9/11 Could Happen “Imminently“, all indicate that an unprecedented act of state-sponsored cyber-terror upon the United States is imminent. Exactly how a cyber-Doomsday will manifest itself is unknown, but a Chinese-based EMP strike followed by twin nuclear attacks appears to be the working terror scenario.

2.3: China & Cyber Terror
As previously reported, the nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. China, more than any other nation, is sure to be scapegoated in the aftermath of a cataclysmic cyber-terror attack against the United States. On October 5, 2011, U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two U.S. satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyber espionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta recently stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to clamp down on aggressive Chinese cyber-attacks against American companies and the U.S. government.  On October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.

READ: Chinese “Live TV” Cyber-Hijack With “Live” Nuclear Detonation

2.4: Cyber-Related Nuclear Terror
Prior to a high-profile EMP attack followed by twin nuclear attacks, the public must be psychologically prepared to accept that this is in fact possible. Based purely on research conducted to date, the marriage between cyber-terror and nuclear terror was first made on February 19, 2013, when a CNN headline entitled “Former CIA Official: Cyber War ‘More Sinister Than Nuclear Age’” first paired the terms “cyber” and “nuclear” together in the same sentence. Roughly a month later on March 22, 2013, the propaganda film entitled “Olympus Has Fallen” (2013) was released (see trailer) in which Washington D.C., America’s capital is attacked by an ex-North Korean terrorist who wants to hack the White House computer network and detonate American nuclear warheads while in their respective missile silos. Exactly a month later on April 22, 2013, the Wall Street Journal ran a headline entitled “China: Cyberattacks Are Like Nuclear Bombs”, ultimately linking the words “China”, Cyberattacks” and “Nuclear Bombs” in the same sentence. Roughly two months later on June 28, 2013, another propaganda film entitled  “White House Down” (2013), was released (see trailer) in which Washington D.C., America’s capital, was attacked by hackers attempting to breach the U.S. Department of Defense’s computers to access the “Nuclear Football”, the briefcase used by the President of the United States to initiate nuclear war.

original

III: DRONE ATTACK:

3.1: China’s Drone Attack
China is building one of the world’s largest drone fleets aimed at attacking the United States in the event of a war. According to the report, “The Chinese military envisions its drone swarms scouting out battlefields, guiding missile strikes and overwhelming opponents through sheer numbers. China’s military-industrial complex has developed homegrown drones to accomplish these goals, according to the report released on March 11, 2013, by the Project 2049 Institute. “The PLA now fields one of the world’s most expansive UAV [unmanned aerial vehicle] fleets,” said Ian Easton and L.C. Russell Hsiao, researchers at the Project 2049 Institute and authors of the new report. The Project 2049 Institute report warned that China could consider “plausibly deniable” drone attacks blamed upon mechanical failure or cyberhackers. The Chinese drones could act as decoys, use electronic warfare to jam communications and radar, guide missile strikes on carriers, fire missiles at U.S. Navy ships, drop nuclear bombs, or dive into U.S. ships like kamikaze robots.

READ: Chinese “Kamikaze” Done Attack On Pearl Harbor Hawaii Imminent

3.2: China’s “Stealth” Drones
If and when Chinese drones execute nuclear strikes against American cities, the drones will have to be stealth drones in order to circumvent U.S. aerial defense systems (in the event that they are not disabled due to an EMP attack). Another possibility is that the Chinese may cyber-hijack (commandeer) U.S. drones and arm them with Chinese-made nuclear weapons in order to get them past U.S. defense systems. Based on the following reports, both drone scenarios are possible, at least theoretically speaking. On March 11, 2013, Easton and L.C. Russell Hsiao, researchers at the Project 2049 Institute, stated that “The PLA [China] now fields one of the world’s most expansive UAV [unmanned aerial vehicle] fleets” and that China could consider “plausibly deniable” drone attacks blamed upon mechanical failure or cyberhackers. The drones could act as decoys, use electronic warfare to jam communications and radar, guide missile strikes on carriers, fire missiles at U.S. Navy ships or dive into ships like kamikaze robots. Project 2049 went on to state that China is developing drones such as the rumored “Dark Sword” stealth drone that have low radar profiles to escape radar detection and that Chinese engineers have even begun working on drones that have the software brains to fly in formation, do aerial refueling and takeoff and land autonomously. The report cautions the U.S. military to prepare for the worst-case scenario by hardening its existing air bases in Asia. On March 13, 2013, it was reported that China is building one of the world’s largest drone fleets aimed at attacking the United States in the event of a war. As of November 22, 2013, it was reported that China’s first stealth combat drone has taken its maiden flight.

IV. U.S. VERUS CHINA:

nuclear_explosion

4.1: Red China Rising
Aside from the fact that China openly called for the world to be “de-Americanised” on October 13, 2013, it was revealed on December 12, 2013, that a group of U.S. defense analysts told a prominent House subcommittee that the U.S. military needs a more focused war plan specific to China, especially after China’s declaration of an air defense zone over the East China Sea. A week after this shocking revelation, Chinese hackers reportedly crashed Federal Election Commission website on December 19, 2013, a direct attack on the U.S. and its democratic form of government. As of February 19, 2014, China cut its U.S. Treasury holdings the most since 2011, an ominous sign that a Chinese attack is imminent. After all, China holds most of America’s debt and therefor a nuclear strike against America may be a sign to pay up.

READ: China vs. Japan War Plot Exposed—Attack on Iwo Jima and Okinawa Imminent

4.2: U.S. Versus China  
Inflammatory war propaganda, rising diplomatic tensions between the U.S. and China along with unprecedented U.S. propaganda against China indicates that World War III scenario between the United States and China is on the horizon. On June 4th, 2012, it was reported that the Australian government’s Defense White Paper published in 2009 contained a “secret chapter” that assessed “Australia’s ability to fight an air-sea battle alongside the United States against China”. A few weeks later on June 27th, 2012, Chinese Maj. Gen. Peng Guangqian stated that a future conflict with the United States is coming as a result of U.S. “containment” policy. Guangqian was then quoted as saying, “The United States has been exhausting all its resources to establish a strategic containment system specifically targeting China” and that “The contradictions between China and the United States are structural, not to be changed by any individual, whether it is G.H.W. Bush, G.W. Bush or Barack Obama, it will not make a difference to these contradictions”.

4.3: U.S. Military Vulnerable to Attack
Prior to an unprovoked and unabated attack by China against the West Coast of America, the public must first be led to believe through propaganda and alleged whistleblowers that U.S. military equipment and weapons systems are vulnerable to Chinese cyber-related espionage. That way, in the aftermath of a Chinese invasion whereby U.S. defense systems such as missiles, planes and radars are suddenly rendered useless, the narrative of a Chinese cyber-attack can be floated to the American public and military as the reason for the deadly attack which will surely take America to war. If the following reports are to be believed, Chinese hackers have gained access to U.S. weapons secrets, stole blueprints from Australia’s intelligence agency, stole a number of the latest U.S. weapons, hacked the NSA chairman’s accounts, targeted U.S. missile systems, hacked the Obama campaign, and hacked the head of the Nuclear Security Agency. The notion that the Chinese military is “smarter” than the U.S. military and therefore vulnerable to an attack was basically confirmed on January 16, 2014, when it was reported that a U.S. admiral conceded that the U.S. is losing dominance to China.

Chinese Espionage Headlines:

1. March 29, 2013: Report: China Gained U.S. Weapons Secrets Using Cyberespionage
2. May 27, 2013: Chinese Hackers Steal Australian Security Intelligence Blueprints
3. May 28, 2013: Pentagon: The Chinese Stole Our Newest Weapons
4. May 28, 2013: Chinese Infiltrated Top U.S. Weapons Systems, Confidential Report Claims
5. May 28, 2013: Report Lists U.S. Weapons Compromised By Chinese Cyberspies
6. May 29, 2013: Pentagon Aircraft, Missile Defense Programs Target Of China Cyber Threat
7. May 29, 2013: China to Hold Digital War Games
8. May 31, 2013: Hagel Says Chinese Cyberthreats Pose ‘Stealthy’ Danger To US
9. June 5, 2013: China Claims ‘Mountains Of Data’ On Cyber Attacks By US
10. June 6, 2013: Chinese Hacked Obama, McCain Campaigns, Took Internal Documents

[Does not purport to be a complete list of events of headlines]

4.4: U.S. Weapon Systems Compromised by Chinese Hackers
Based on multiple reports, Chinese hackers have compromised numerous U.S. military weapons systems,  ultimately making U.S. military personal and equipment vulnerable to a Chinese attack. According to a May 28th, 2013, report by the Washington Post, the following is an “expanded partial list” of compromised DOD system designs and technologies:

I. U.S. System Designs
Terminal High Altitude Area Defense, Patriot Advanced Capability-3, Extended Area Protection and Survivability System (EAPS), F-35, V-22, C-17, Hawklink, Advanced Harpoon Weapon Control System, Tanker Conversions, Long-term Mine Reconnaissance System, Global Hawk, Navy antenna mechanisms, Global Freight Management System, Micro Air Vehicle, Brigade Combat Team Modernization, Aegis Ballistic Missile Defense System, USMC Tracked Combat Vehicles, Warfighter Information Network-Tactical (WIN-T), T700 Family of Engines, Full Authority Digital Engine Controller (FADEC), UH-60 Black Hawk, AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile), Affordable Weapons System, Littoral Combat Ship, Navy Standard Missile (SM-2,3,6), P-8A/Multi-Mission Aircraft, F/A and EA-18, RC-135 Detect./Collect, and the Mk54 Light Weight Torpedo.

II. U.S. Technologies
Directed Energy, UAV video system, Specific Emitter identification, Nanotechnology, Dual Use Avionics, Fuze/Munitions safety and development, Electronic Intelligence Processing, Tactical Data Links, Satellite Communications, Electronic Warfare, Advanced Signal Processing Technologies for Radars,  Nanostructured Metal Matrix Composite for Light Weight Ballistic Armor, Vision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV), Space Surveillance Telescope, Materials/processing technologies, IR Search and Track systems, Electronic Warfare systems, Electromagnetic Aircraft Launch, Rail Gun, Side Scan sonar, Mode 5 IFF, Export Control, ITAR, Distribution Statement B,C,D Technical Information, CAD drawings, 3D models, schematics, Software code, Critical technology, Vendor/supply chain data, Technical manuals, PII (email addresses, SSN, credit card numbers, passwords, etc.), and attendee lists for program reviews and meetings.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the 2014 global bio-terror pandemic. To date, David Chase Taylor has blown the whistle on 50+ state-sponsored terror plots, including the man-made comet ISON hoax, the drone strike on “Fast and Furious” star Paul Walker, and he was the first to expose Alex Jones’ links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. State-sponsored terror alerts, warning, assertions and forecasts made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically occur based on the cited date. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl XLV Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

truther-rss

War- Japan-China and USA watching_thumb[1]

Download & Forward PDF

David Chase Taylor
December 29, 2013
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that an unprovoked attack by China against Japan is now imminent. The impending attack appears to be a desperate attempt to bait America into a war with China once the U.S. comes to the defense of its ally Japan.

Download & Forward PDF

The China vs. Japan war plot was evidently issued by international intelligence agencies out of frustration over the fact that they have thus far been unable to execute a surprise Chinese attack against the U.S. This is largely due to unwanted media exposure regarding the following four U.S. vs. China war scenarios which have subsequently been exposed.

U.S. vs. China War Plots Exposed:

1. November 30, 2012: Red Dawn Scenario: Chinese Attack On America Imminent
2. March 31, 2013: Chinese “Kamikaze” Done Attack On Pearl Harbor Hawaii Imminent
3. July 30, 2013: Live TV Cyber-Hijack with “Live” Nuclear Detonation Now Trending
4. December 20, 2013: China’s World War III Doomsday Plot Exposed

Yasukuni Shrine Scandal
In a coordinated media campaign to rile up tension between Japan and China just prior to an unprovoked attack, Japanese Prime Minister Shinzo Abe visited the Yasukuni Shrine on December 26, 2013. Although the Yasukuni Shrine commemorates the individuals who died in service of the Empire of Japan, it has long been a symbol of Japan’s brutal and genocidal behavior towards China during World War II. Needless to say, Abe’s visit to the shrine predictably enraged China. A day later, a December 27, 2013, it was reported that Chinese state run media is now openly calling for retaliation against Japan for the Prime Minister’s visit.

Flag_Raising

Iwo Jima & Okinawa
The notion that war between China and Japan is imminent was documented in a December 7, 2013, report entitled “Impending Japan-China war has the makings of a Clancy classic”, as well as a December 28, 2013, report entitled, “Looming battle: China vs. Japan”. Although China could attack the Japanese mainland at any time or place, a future attack would likely target Okinawa, Japan, home to 32 U.S. military bases, and/or Iwo Jima, Japan, home to U.S. military bases which allegedly house nuclear weapons. In what appears to be an ominous sign of things to come, on November 28, 2013, it was reported that an ‘improvised launch device’ had been found near a U.S. Air Force base in Tokyo, Japan. In a media ploy designed to bring unprecedented attention to the island of Okinawa just prior to a Chinese attack, it was reported on December 26, 2013, that a Japanese governor approved the relocation of a U.S. military base on Okinawa.

China vs. Japan War
As it currently stands, the country of Japan is America’s closest ally in the Pacific and therefore an attack on Japan by China would instantly be seen as an attack on America. The U.S. has numerous military bases in Japan including two aforementioned locations of Okinawa, and Iwo Jima. In World War II, the Battle of Iwo Jima was made famous by a photo of U.S. soldiers hoisting an American flag atop the island. Therefore, the capture of this island by “Communist” China would undoubtedly serve as an American war cry for revenge. If China were to successfully capture these two islands along with Pearl Harbor, Hawaii, they would have almost conquered the entire Asian-Pacific region.

China vs. Japan Trending
As evidenced, the war rhetoric between Japan and China is at an all-time high. Whether or not these headlines will culminate in a Chinese attack on Japan and U.S. military bases located there is not known, but the entire China vs. Japan war narrative has been constructed nonetheless.

China-Japan War Headlines:

1. October 22, 2013:
China warns Japan over reported plan to shoot down drones
2. November 23, 2013: China creates air defence zone over Japan-controlled islands
3. November 28, 2013: U.S. military: ‘improvised launch device’ found near Air Force base in Japan
5. December 3, 2013: China Threatens Japan Ahead of Biden Trip
6. December 7, 2013: Impending Japan-China war has the makings of a Clancy classic
7. December 17, 2013: Japan’s hawks unveil sweeping defense upgrade
8. December 21, 2013: Chinese military lashes out at Japanese defense documents
9. December 26, 2013: Japanese governor approves relocation of US military base on Okinawa
10. December 27, 2013: US ‘disappointed’ by Japanese PM’s visit to war shrine
11. December 27, 2013: China must retaliate for Japan PM shrine visit: media
12. December 28, 2013: Looming battle: China vs. Japan

[Does not purport to be a complete list of events of headlines]

Japanese Military Drills
Prior to a full-scale war in the Pacific theater between China, Japan and possibly the U.S., the respective militaries of these countries must exercise and drill the various war scenarios that they will eventually be engaged in. As evidenced, there has been an unprecedented amount of drills in respect to the U.S. and Japan, something unprecedented for Japan who is not allowed to have an offensive military.

Japan-U.S. War Drills:


1. February 7, 2013: US, Japan, Australia Conduct Military Drills Over Pacific
2. April 5, 2013: Japan Will Join US Military Drill In California In June
3. June 9, 2013: Japan Sending Soldiers to US for First Time Amid Tensions with China
4. June 21, 2013: US, Japan Begin Naval Drills Near China
5. June 27, 2013: US-Japan War Games Off The California Coast Imitate Chinese Invasion
6. November 28, 2013: China’s presence looms amid massive U.S.-Japanese AnnualEx war games

[Does not purport to be a complete list of war drill and exercises]

Head of U.S. Military in Japan Suspended
In a move which paves the way for an unabated Chinese attack on U.S. troops stationed Japan, it was reported on June 7th, 2013, that U.S. Army Major General Michael Harrison, the man directly responsible for responding to an attack on Japan, was suspended for allegedly failing to properly investigate a sexual assault complaint. Harrison, who was stationed in Camp Zama, was in charge of U.S. Army-Japan and was suspended four days prior to his completion of his 32-month assignment. It’s no secret that sexual assault and the military are synonymous and therefor the timing of the suspension is highly suspicious to say the least. Harrison’s scheduled replacement is Major General James Boozer, the former deputy commanding general of the US Army in Europe. With Boozer at the helm, plausible deniability due to his greenness on the job and his name “Boozer”, meaning drinker or drunk, will be cited as the reasons he failed to properly respond to a Chinese sneak attack.

U.S. F-15 Squadron Grounded
Prior to a Chinese invasion in which U.S. military aircraft fail to work properly, there must be an incident whereby U.S. planes can be “updated” with a virus or mechanical tweak so they are rendered useless in battle. On May 28, 2013, it was reported that a U.S. pilot flying an F-15 over the Pacific Ocean identified an unspecified problem which forced him to eject in mid-flight. A day later on May 29, 2013, it was reported that the U.S. Air Force grounded its F-15 fighters on the southern Japan island of Okinawa for a safety review following a crash that forced the aforementioned pilot to eject over the Pacific Ocean. All F-15s attached to the 18th Wing on Okinawa’s Kadena Air Base were scheduled to undergo “inspections” during the reported stand down to ensure that they are “safe” to fly. Although it is not clear whether these planes are still grounded, the so called “inspections” may have allowed for the entire fleet of American F-15s to be digitally sabotaged.

131127152340-disputed-air-defense-map-story-top

The Air Defense Zone
In order to highlight the China-Japan rift just prior to an attack by China, it was revealed on November 26, 2013, that U.S. B-52 bombers snubbed China’s new air defense zone during a flyover of the disputed Japanese islands. Two days later on November 28, 2013, China reportedly patrolled the Air Zone over the disputed islands. Two days after that on November 30, 2013, U.S. airlines were publically advised to comply with China’s new defense zone. Although the airlines complied, on December 6, 2013, the U.S. officially refused to recognize new Chinese air defense zone, an obvious ploy to enrage China. Chiming in on December 3, 2013, was Vice President Joe Biden who stated that China’s air zone raises risk of accidents and miscalculations. Whether or not an “accident” or “miscalculation” will lead to world war is not yet known, but the entire Air Defense Zone is a military ploy which was specifically designed to spark an international conflict (i.e., Remember the Maine incident and the Gulf of Tonkin incident, etc.) between the U.S. and China.

Senkaku Islands Dispute
The Senkaku Islands dispute appears to be the powder keg which will eventually ignite the Chinese war machine to attack Japan and possibly even the U.S. On September 21, 2012, in a report entitled “PLA Admiral: China Should Prepare For Conflict With U.S. Over Disputed Islands” it quotes Zhang Zhaozhong, a rear admiral at China’s National Defense University, as stating that, “China has a stronger fighting capability than Japan in a war for the Diaoyu Islands, because China’s coastal areas are close to the islands and the radar and missiles there can cover all the islands.” Zhaozhong then makes it clear what will happen if the U.S. were to become embroiled in the conflict. “The intervention of the U.S. military will change the military strength contrast between China and Japan, so China should prepare for it”, Zhaozhong stated. According to Wikipedia, the Senkaku Islands dispute concerns a territorial dispute over a group of uninhabited islands known as the Senkaku Islands in Japan and as the Diaoyu (in China) or Tiaoyutai Islands (in Taiwan). Aside from a 1945 to 1972 period of administration by the United States, the archipelago has been controlled by Japan since 1895.The People’s Republic of China (PRC) disputed the proposed US handover of authority to Japan in 1971and has asserted its claims to the islands since that time. The Republic of China (Taiwan) also claims the islands. The territory is close to key shipping lanes, rich fishing grounds, and there may be oil reserves in the area. Although the United States does not have an official position on the merits of the competing sovereignty claims, the islands are included within the U.S. Japan Security Treaty meaning that a defense of the islands by Japan may compel support from the United States military. In September 2012, the Japanese government purchased the remaining three of the disputed islands that it did not already own from their private owner, prompting large-scale protests in China.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the 2013 global bio-terror pandemic. To date, Truther.org has identified and exposed over 50 Obama sanctioned terror plots, as well as the Alex Jones’ links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. State-Sponsored Terror Threat Assessments (SSTTA), assertions, and forecasts made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically occur based on the cited date. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl XLV Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past.
Blessed are the Peacemakers. Namaste

Truther RSS

Download & Forward PDF

UPDATE: Adding to growing skepticism over whether nuclear weapons even exist, it was reported on December 19, 2013, that the U.S. federal government spent $3.1 billion on an alleged highway tunnel underneath the city of Seattle using a 5-story high mechanical drill entitled “Bertha”. Coincidentally, “Bertha” tunneled almost exactly adjacent to the Space Needle before running into “the object” which has postponed the supposed tunnel project indefinitely. Seattle nuclear terror plot exposed and drilling stops? Evidently, the tunnel was bored to funnel tons of explosives into downtown Seattle where it would eventually send the flying saucer that is the Space Needle hundreds of miles away. This same type of scenario is was witnessed in the foiled Super Bowl XLV Terror Plot in Dallas, Texas on February 6, 2011 when a brand new stadium was built specifically for the Super Bowl. Like Seattle, Dallas has Reunion Tower whose Space Needle-like top would have been blown away by the supposed nuclear bomb.

David Chase Taylor
December 20, 2013
Truther.org

SWITZERLAND, Zurich — In the very near future, the Chinese military will launch an unprovoked wave of attacks—starting with the islands of Japan and Hawaii and ending with twin nuclear detonations in the U.S. cities of San Francisco, California and Seattle, Washington.

The Chinese will start their attacks in the East and make their way West with the use of a radar cloaking technology which will render their drones, planes, ships and submarines invisible to U.S. military defense systems. Once in the clear, Chinese subs will likely launch a pair of unmanned drones which will be outfitted to carry nuclear warheads to their respective targets.

Download & Forward PDF

The notion of a Chinese nuclear attack on the United States was openly flaunted on October 31, 2013, when the Chinese government released a nuclear blast map projection for the U.S. cities of Seattle and Los Angeles, after they were struck by Chinese nuclear warheads (see photo below). A few weeks later on December 17, 2013, a Chinese rover diorama showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent.

In a move which shows the duplicity of the U.S. government, on December 16, 2013, it was revealed that hundreds (possibly thousands) of armored tanks and trucks are being moved to the West Coast by train (see video). In the aftermath of nuclear attacks in Seattle and San Francisco, a martial law scenario would surly result and therefore U.S. military hardware needs to be on hand prior to the event transpiring in reality.  

In order for a nuclear attack to be the most psychologically terrifying, an iconic American landmark must be destroyed (i.e., the Twin Towers on 9/11) in the attack in order to serve as a life-long reminder of that horrific day. Therefore, the cities of Seattle and San Francisco have been chosen due to their storied landmarks (see below). In order to bring unprecedented attention to Hawaii and the Pacific theater just prior to a Chinese attack, President Obama left for a 17-day Hawaiian vacation on December 20, 2013.

Chines Targets (East to West):

1. Japan (Okinawa, Japan, and Iwo Jima, Japan)
2. Hawaii (
Joint Base Pearl Harbor-Hickman)
3. Seattle, Washington (
Space Needle)
4. San Francisco, California (
Golden Gate Bridge)

Aside from the fact that China openly called for the world to be “de-Americanised” on October 13, 2013, it was revealed a month later on December 12, 2013, that a group of U.S. defense analysts told a prominent House subcommittee that the U.S. military needs a more focused war plan specific to China, especially after China’s declaration of an air defense zone over the East China Sea. A week after this shocking revelation, Chinese hackers reportedly crashed Federal Election Commission website on December 19, 2013, a direct attack on the U.S. and its democratic form of government.

As revealed in previous Truther.org reports (e.g., Red Dawn Scenario: Chinese Attack On America Imminent” and “Chinese “Kamikaze” Done Attack On Pearl Harbor Hawaii Imminent”), international intelligence agencies have attempted  to spark a “doomsday” nuclear conflict between the U.S. and China on multiple occasions. Evidently, they won’t give up until World War III has commenced. This is the second Chinese nuclear terror attack plot which has been identified in 2013. Back on July 30, 2013, a Truther.org report entitled, “Live TV” Cyber-Hijack with “Live” Nuclear Detonation Now Trending”, exposed a nuclear terror plot in which China was slated to hijack the world’s television airwaves just prior to surprise nuclear attacks on the U.S. cities of San Francisco and Seattle. Although this particular nuclear terror plot was canceled due to unwanted media attention, it appears that a redux is now in order.

Live TV Nuke

The notion of an impending “doomsday” was recently highlighted on November 26, 2013, when it was revealed that U.S. spies are worried over the “doomsday” cache stashed by ex-NSA contractor Snowden. As evidenced herein (see below), Snowden is the slated to be scapegoated for the upcoming lapse in U.S. security that will allow for a Chinese attack on America. Roughly a month later on December 18, 2013, the so-called “Doomsday Minister” Harold Camping died at the age of 92. Mr. Camping, an obvious intelligence plant, predicted an American “doomsday” on May 21, 2011, roughly 90 days after the now foiled state-sponsored nuclear terror attack on Super Bowl XLV in Dallas, Texas on February 6, 2011.

In the aftermath of nuclear detonations in Seattle and San Francisco, the Yellowstone (Caldera) Volcano in Yellowstone National Park, Wyoming, will predictably erupt. Based on recent headlines (e.g., April 17, 2013: Yellowstone’s Volcano Bigger Than Thought; December 12, 2013: Beneath Yellowstone, a volcano that could wipe out U.S.; and December 18, 2013: Huge Magma Pocket Lurks Beneath Yellowstone Supervolcano), the volcano is quite massive and a major threat to America.

Once the Yellowstone Caldera erupts, the entire West Coast will likely become inundated with a heavy smog. The horrific smog which recently engulfed Singapore was apparently a beta-test for an upcoming nuclear detonation and subsequent fallout in America. A major beta-test was needed to see how people would respond to a massive smog-like change to their environment. Unfortunately, Singapore was the chosen city. 

Although the smog will be blamed on nuclear fallout and volcanic ash, the source of the deadly smog will most definitely come from heavy-duty chemtrails delivered by aerial drones 24/7. Coincidentally, on December 13, 2013, the long awaited film entitledThe Hobbit: The Desolation of Smaug” (2013) opened in theaters nationwide. Hollywood’s psychological programming never disappoints. Four days later on December 17, 2013, it was reported that a Chinese hospital opened a smog clinic, a potential preview of things to come.

I. THE SET-UP:

1.1: Chinese Military Drills
Prior to a full-scale war in the Pacific theater between Australia, China, Japan and the U.S., the respective militaries of these countries must exercise and drill the various war scenarios that they will eventually be engaged in. As evidenced, there has been an unprecedented amount of drills on all sides, especially in respect to China. Interestingly, China has executed drills in both Hawaii and California. In the aftermath of a surprise attack on the U.S. by China, these drills, sanctioned by Obama, will be cited as a primary cause for the invasion. It will likely be said that during these drills, the Chinese gathered the necessary information needed for an invasion.

Pacific Theater War Drills:


1. February 7, 2013:
US, Japan, Australia Conduct Military Drills Over Pacific
2. April 5, 2013:
Japan Will Join US Military Drill In California In June
3. June 9, 2013:
Japan Sending Soldiers to US for First Time Amid Tensions with China
4. June 21, 2013:
US, Japan Begin Naval Drills Near China
5. June 27, 2013:
US-Japan War Games Off The California Coast Imitate Chinese Invasion
6. July 2, 2013: China to join Russia for largest naval drills with foreign partner
7. September 6, 2013:
Chinese Military Ships Visit Hawaii for Joint Exercises with US

8. September 26, 2013:
Russia, China Hold Large-Scale War Games
9. November 6, 2013: U.S. commander says disaster relief drill with China improves relationship
10. November 14, 2013: Communist Chinese Troops on U.S. Soil for “Exchange” Mission
11. December 9, 2013: China holds war games near Korean border

[Does not purport to be a complete list of war drill and exercises]

1.2: The Air Defense Zone
In order to highlight the U.S.-China rift just prior to the start of World War III, it was revealed on November 26, 2013, that U.S. B-52 bombers snubbed China’s new air defense zone during a flyover of the disputed Japanese islands. Two days later on November 28, 2013, China reportedly patrolled the Air Zone over the disputed islands. Two days after that on November 30, 2013, U.S. airlines were publically advised to comply with China’s new defense zone. Although the airlines complied, on December 6, 2013, the U.S. officially refused to recognize new Chinese air defense zone, an obvious ploy to enrage China. Chiming in on December 3, 2013, was Vice President Joe Biden who stated that China’s air zone raises risk of accidents and miscalculations. Whether or not an “accident” or “miscalculation” will lead to world war is not yet known, but the entire Air Defense Zone is a military ploy which was specifically designed to spark an international conflict (i.e., Remember the Maine incident and the Gulf of Tonkin incident, etc.) between the U.S. and China.

1.3: The Ship Incidents
Aside from the aforementioned “Air Defense Zone”, it was reported on December 13, 2013, that a Chinese naval vessel tried to force a U.S. Warship to stop in international waters. Three day later on December 16, 2013, another incident occurred when China’s state media blamed the U.S. for a near collision of two warships. A Christian Science Monitor think-tank report dated December 18, 2013, entitled “Is China’s near miss with US ship the start of a new pattern?” highlights the notion that these type of incidents will only intensify. Predictably, on December 19, 2013, it was revealed that the U.S. has determined that China was ‘irresponsible’ in stand-off at sea. U.S. vs. China ship incidents in the Pacific will likely escalate in a tit-for-tat manner until they spark a nuclear war—exactly what they are designed to do.

1.4: Chinese Tech Advances
Prior to China doing the unthinkable—attacking the United States of America—the Chinese must appear technologically capable of pulling off a “stealth” attack. After all, the Chinese military has to travel roughly 5,396 miles without being seen. Recent reports in respect to China’s alleged scientific advancements indicates that Chinese may have the technical knowhow to attack America. For example, on December 14, 2013, it was reported that China became just the third country to land on moon. Five days later on December 19, 2013m it was reported that China built its fourth Antarctic research base, again showing that China is advancing on all fronts. Regardless of whether the aforementioned reports are actually true, they were disseminated in order to show Chinese is smart enough to execute a stealth attack on America.

1.5: The “Invisibility Cloak
In order for the Chinese to pull off a “stealth” attack on America, they will have to, at least theoretically speaking, employ some sort of technology which renders America’s defenses useless. Coincidentally, November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when the Chinese attack America, they will do so due to superior technology which in will in essence have allowed their military equipment to become invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Even worse, on November 19, 2013, it was reported that retired U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

1.6: Nuclear Submarine Attack?

Although a direct nuclear missile strike via a Chinese nuclear submarine is always possible, it’s far more likely that a nuclear strike will come from a drone launched from by a submarine. Coincidentally, on October 31, 2013, it was reported that Chinese nuclear submarines are capable of widespread attack on U.S., namely, the cities of Seattle and Los Angeles. Roughly a month later on December 2, 2013, it was reported that a World War II era Japanese mega-submarine was discovered off Hawaii, ultimately rehashing a surprise attack (possibly submarine) on the U.S. from an Asian country. Four days later on December 5, 2013, the U.S. Navy launched a drone from a submerged submarine, ultimately verifying that that a nuclear drone strike from a submerged submarine is at least theoretically possible.

china-military-drone-stealth-russia.si

1.7: China’s “Stealth” Drones
If and when Chinese drones execute nuclear strikes against American cities, the drones will have to be stealth drones in order to circumvent U.S. aerial defense systems. Another possibility is that the Chinese may cyber-hijack (commandeer) U.S. drones and arm them with Chinese-made nuclear weapons in order to get them past U.S. defense systems. Based on the following reports, both drone scenarios are possible, at least theoretically speaking. On March 11, 2013, Easton and L.C. Russell Hsiao, researchers at the
Project 2049 Institute, stated that “The PLA [China] now fields one of the world’s most expansive UAV [unmanned aerial vehicle] fleets” and that China could consider “plausibly deniable” drone attacks blamed upon mechanical failure or cyberhackers. The drones could act as decoys, use electronic warfare to jam communications and radar, guide missile strikes on carriers, fire missiles at U.S. Navy ships or dive into ships like kamikaze robots. Project 2049 went on to state that China is developing drones such as the rumored “Dark Sword” stealth drone that have low radar profiles to escape radar detection and that Chinese engineers have even begun working on drones that have the software brains to fly in formation, do aerial refueling and takeoff and land autonomously. The report cautions the U.S. military to prepare for the worst-case scenario by hardening its existing air bases in Asia. On March 13, 2013, it was reported that China is building one of the world’s largest drone fleets aimed at attacking the United States in the event of a war. As of November 22, 2013, it was reported that China’s first stealth combat drone has taken its maiden flight.

1.8: U.S. Navy Corrupt
Prior to an unprecedented attack by China against U.S. Navy installations in the Pacific, high-ranking members of the U.S. Navy must appear inept, incapable and downright corrupt. That way, in the aftermath of the attack, one or more of these Navy admirals or commanders can be publically scapegoated for the attacks. Case in point: On November 4, 2013, it was reported that a Navy commander accepted prostitutes and Lady Gaga tickets in bribes; On November 9, 2013, it was reported that U.S. Navy admirals under investigation in widening bribery scandal
; On November 28, 2013, it was reported that the Navy suspended business with defense contractor Inchcape Shipping Services over “questionable business integrity”; and on December 6, 2013, it was reported that a U.S. intelligence adviser resigns after work with Chinese firm revealed. Needless to say, these events (of which there are likely more) were orchestrated in order to show that U.S. Navy personal are bribable and corrupt and therefore are susceptible to selling secrets and/or shirking their military duties.

1.9: U.S. Military Vulnerable to Attack
Prior to an unabated attack by China against U.S. military bases in the Pacific (i.e.,
Okinawa, Japan, Iwo Jima, Japan, and Pearl Harbor, Hawaii), the public must first be led to believe through propaganda and alleged whistleblowers that U.S. military equipment and weapons systems are vulnerable to Chinese cyber-related espionage. That way, in the aftermath of a Chinese invasion whereby U.S. defense systems such as missiles, planes and radars are suddenly rendered useless, the narrative of a Chinese cyber-attack can be floated to the American public and military as the reason for the deadly attack which will surely take America to war. If the following reports are to be believed, Chinese hackers have gained access to U.S. weapons secrets, stole blueprints from Australia’s intelligence agency, stole a number of the latest U.S. weapons, hacked the NSA chairman’s accounts, targeted U.S. missile systems, hacked the Obama campaign, and hacked the head of the Nuclear Security Agency.

Chinese Espionage Headlines:

1. March 29, 2013:
Report: China Gained U.S. Weapons Secrets Using Cyberespionage (CNN)
2. May 27, 2013:
Chinese Hackers Steal Australian Security Intelligence Blueprints (News.com)
3. May 28, 2013:
Pentagon: The Chinese Stole Our Newest Weapons (RT)
4. May 28, 2013:
Chinese Infiltrated Top U.S. Weapons Systems, Confidential Report Claims (Fox News)
5. May 28, 2013:
Obama Intelligence Agency Chairman Hacked By “Guccifer” (Smoking Gun)
6. May 28, 2013:
Report Lists U.S. Weapons Compromised By Chinese Cyberspies (Washington Post)
7. May 29, 2013:
Pentagon Aircraft, Missile Defense Programs Target Of China Cyber Threat (Fox News)
8. May 29, 2013:
China to Hold Digital War Games (Guardian)
9. May 31, 2013:
Hagel Says Chinese Cyberthreats Pose ‘Stealthy’ Danger To US (Fox News)
10. June 5, 2013:
China Claims ‘Mountains Of Data’ On Cyber Attacks By US (FT)
11. June 6, 2013:
Chinese Hacked Obama, McCain Campaigns, Took Internal Documents (NBC)
12. June 12, 2013:
Head of U.S. Nuclear Security Agency Is Hacked By “Guccifer” (Smoking Gun)

[Does not purport to be a complete list of events of headlines]

1.10: U.S. Weapon Systems Compromised by Chinese Hackers
Based on multiple reports, Chinese hackers have compromised numerous U.S. military weapons systems,  ultimately making U.S. military personal and equipment vulnerable to a Chinese attack. According to a May 28th, 2013, report by the Washington Post, the following is an “expanded partial list” of compromised DOD system designs and technologies: 

I. U.S. System Designs: Terminal High Altitude Area Defense, Patriot Advanced Capability-3, Extended Area Protection and Survivability System (EAPS), F-35, V-22, C-17, Hawklink, Advanced Harpoon Weapon Control System, Tanker Conversions, Long-term Mine Reconnaissance System, Global Hawk, Navy antenna mechanisms, Global Freight Management System, Micro Air Vehicle, Brigade Combat Team Modernization, Aegis Ballistic Missile Defense System, USMC Tracked Combat Vehicles, Warfighter Information Network-Tactical (WIN-T), T700 Family of Engines, Full Authority Digital Engine Controller (FADEC), UH-60 Black Hawk, AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile), Affordable Weapons System, Littoral Combat Ship, Navy Standard Missile (SM-2,3,6), P-8A/Multi-Mission Aircraft, F/A and EA-18, RC-135 Detect./Collect, and the Mk54 Light Weight Torpedo.

II. U.S. Technologies: Directed Energy, UAV video system, Specific Emitter identification, Nanotechnology, Dual Use Avionics, Fuze/Munitions safety and development, Electronic Intelligence Processing, Tactical Data Links, Satellite Communications, Electronic Warfare, Advanced Signal Processing Technologies for RadarsNanostructured Metal Matrix Composite for Light Weight Ballistic Armor, Vision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV), Space Surveillance Telescope, Materials/processing technologies, IR Search and Track systems, Electronic Warfare systems, Electromagnetic Aircraft Launch, Rail Gun, Side Scan sonar, Mode 5 IFF, Export Control, ITAR, Distribution Statement B,C,D Technical Information, CAD drawings, 3D models, schematics, Software code, Critical technology, Vendor/supply chain data, Technical manuals, PII (email addresses, SSN, credit card numbers, passwords, etc.), and attendee lists for program reviews and meetings.

1.11: Whistleblower Edward Snowden
The case of former National Security Agency (NSA) whistleblower Edward Snowden is fascinating for many reasons but mainly because of his role in an upcoming Chinese attack. In the aftermath of an attack emanating from China, Snowden will be scapegoated as a traitor for giving information to the Chinese which ultimately enables them to circumvent U.S. military programs and weapons systems. This particular narrative first began to form on June 10th, 2013, when CIA officer Bob Baer stated on CNN that Obama officials are speculating that
Snowden’s whistleblowing could be considered “potential Chinese espionage”. Four days later on June 14th, 2013, it was reported that a popular Communist Party-backed newspaper was urging China’s leadership to get more information from Snowden rather than send him back to the U.S., because his revelations about secret U.S. surveillance programs were in China’s national interest. Another June 14th, 2013, report stated that Snowden could offer intelligence that would help China update its understanding of cyberspace and improve its position in negotiations with Washington, D.C. A week later, on June 21st, 2013, the Obama Administration reportedly charged NSA Whistleblower Snowden with espionage, theft and conversion of government property. These charges were leveled at Snowden in order to give the Obama administration the much needed plausible deniability in the aftermath of a Chinese attack on the U.S. Six day later on June 26th, 2013, it was reported that intelligence agencies in China and Russia had gained access to highly classified U.S. intelligence and military information contained on electronic media held by Snowden. According to the report, the exact compromise of the secret data held on Snowden’s laptop computers remains unknown but the biggest fear is that China gained access to new U.S. nuclear war plans. The Snowden case was most recently highlighted on December 15, 2013, in a report by 60 Minutes which showed how NSA security was compromised by Snowden. Two day later on December 17, 2013, a DOD official: stated that Snowden ‘stole everything — literally everything’ from the U.S. government. That same day, an Ex-CIA director stated that Snowden should be ‘hanged’ if convicted for treason, further implying that Snowden’s crimes are treasonous in nature and that U.S. security has been unduly compromised.

Asian Americans

1.12: High-Profile Asian Crimes
Prior to a nuclear attack emanating from Asia, Asian people must be demonized publicly in order to psychologically prep the public for the impending chaos and death. Starting in October of 2011, there have been 3 heinous crimes in which the alleged perpetrator was of Asian descent. The first incident occurred on October 11, 2013, when an
Asian-American male allegedly murdered the son of NFL star running back Adrian Peterson. Two days later on October 13, 2013, an Asian male allegedly shot 5  people at the Hmong festival in Tulsa, Oklahoma. Roughly 2 months later on December 17, 2013, a male of Asian descent allegedly committed a bomb hoax at Harvard University. In all three cases, the face of the alleged perpetrator was all over the news. This especially true in respect to the Harvard incident which ultimately burned the notion of Asians and bombs into the psyche of the American public just prior to a Asian-based nuclear attack upon America.

II. CHINESE TARGETS:

2.1: Attack on Japan
The Japanese people are some of the most independent people on earth and therefore have been the target of numerous earthquakes, tsunamis, wars and nuclear attacks (e.g.,
Hiroshima, Nagasaki, and Fukushima). The Zionist backed Chinese would love nothing more than to invade and destroy the Japanese culture and way of life as much as possible. Unfortunately, as it currently stands, the country of Japan is America’s closest ally in the Pacific and therefore an attack on Japan by China would instantly be seen as an attack on America. The U.S. has numerous military bases in Japan including two very strategic locations in Okinawa, Japan, and Iwo Jima, Japan. In World War II, the Battle of Iwo Jima was made famous by a photo of U.S. soldiers hoisting an American flag atop the island. Therefore, the capture of this island by “Communist” China would undoubtedly serve as an American war cry for revenge. If China were to successfully capture these two islands along with Pearl Harbor, Hawaii, they would have almost conquered the entire Asian-Pacific region.

China-Japan War Headlines:

1. February 7, 2013: US, Japan, Australia Conduct Military Drills Over Pacific
2. April 5, 2013:
Japan Will Join US Military Drill In California In June
3. June 9, 2013:
Japan Sending Soldiers to US for First Time Amid Tensions with China
4. June 21, 2013:
US, Japan Begin Naval Drills Near China
5. June 27, 2013:
US-Japan War Games Off The California Coast Imitate Chinese Invasion
6. October 22, 2013:
China warns Japan over reported plan to shoot down drones
7. November 23, 2013: China creates air defence zone over Japan-controlled islands

8. November 28, 2013:
U.S. military: ‘improvised launch device’ found near Air Force base in Japan
9. November 28, 2013: China’s presence looms amid massive U.S.-Japanese AnnualEx war games
10. December 3, 2013: China Threatens Japan Ahead of Biden Trip
11. December 7, 2013: Impending Japan-China war has the makings of a Clancy classic
12. December 17, 2013: Japan’s hawks unveil sweeping defense upgrade

[Does not purport to be a complete list of events of headlines]

2.2: Head of U.S. Military in Japan Suspended
In a move which paves the way for an unabated Chinese attack on U.S. troops stationed Japan, it was reported on June 7th, 2013, that U.S. Army Major General Michael Harrison, the man directly responsible for responding to an attack on Japan, was suspended for allegedly failing to properly investigate a sexual assault complaint. Harrison, who was stationed in Camp Zama, was in charge of U.S. Army-Japan and was suspended four days prior to his completion of his 32-month assignment. It’s no secret that sexual assault and the military are synonymous and therefor the timing of the suspension is highly suspicious to say the least. Harrison’s scheduled replacement is Major General James Boozer, the former deputy commanding general of the US Army in Europe. With Boozer at the helm, plausible deniability due to his greenness on the job and his name “Boozer”, meaning drinker or drunk, will be cited as the reasons he failed to properly respond to a Chinese sneak attack.

2.3: U.S. F-15 Squadron Grounded
Prior to a Chinese invasion in which U.S. military aircraft fail to work properly, there must be an incident whereby U.S. planes can be “updated” with a virus or mechanical tweak so they are rendered useless in battle. On May 28, 2013, it was reported that a U.S. pilot flying an F-15 over the Pacific Ocean identified an unspecified problem which forced him to eject in mid-flight. A day later on May 29, 2013, it was reported that the U.S. Air Force grounded its F-15 fighters on the southern Japan island of Okinawa for a safety review following a crash that forced the aforementioned pilot to eject over the Pacific Ocean. All F-15s attached to the 18th Wing on Okinawa’s Kadena Air Base were scheduled to undergo “inspections” during the reported stand down to ensure that they are “safe” to fly. Although it is not clear whether these planes are still grounded, the so called “inspections” may have allowed for the entire fleet of American F-15s to be digitally sabotaged.

2.4: Invasion of Hawaii
A preview of the Chinese invasion of Hawaii was first witnessed on September 6, 2013, when it was revealed that Chinese military ships visited Hawaii for joint exercises with U.S. military forces. Aside from being unprecedented, the military drills were meant to serve as a foreign policy blunder by Obama which would eventually lead to the Chinese invasion of Hawaii. Then on October 30, 2013, another suspicious incident was reported when China moved as spy ship near Hawaii. Predictably, the Obama administration, whose role is to look weak on foreign policy, said and did nothing in response to the Chinese aggression. Then on December 12, 2013, it was reported that the health director which approved Obama’s birth certificate died in plane crash in Hawaii. The assassination killed two birds with one stone in that the death highlighted Hawaii internationally as well as reignited the whole Obama birth certificate conspiracy. As previously mentioned, President Obama left for a 17-day Hawaiian vacation on December 20, 2013, bringing more than 2 weeks of unprecedented global attention to island of Hawaii and the Pacific theater in general.

2.5: Seattle Nuclear Attack
It’s no secret that Seattle, Washington, is one of the most liberal and progressive cities in the United States and therefore is a top state-sponsored terror target. From marijuana legalization, animal rights, gay rights and recycling, Seattle is not just a city but rather a large community.
“Red Dawn” (2012) is a film (see trailer) in which Washington state is the victim of a red-dawn surprise attack by military aircraft from Asia. At exactly 0:33 seconds into the trailer, a massive, explosion is heard at the same time that a snow globe with Seattle’s Space Needle is shown, potentially foreshadowing an upcoming attack on the city. Since there is a question as to whether nuclear weapons even exist, it’s possible that the Space Needle could be used as a staging ground for a major attack with the use of state of the art explosives. Curiously, on December 3, 2013, it was reported that a ferry theft in Seattle prompted a security review of the Puget Sound surrounding Seattle. Whether or not this “review” has provided the necessary cover for the insertion of explosives into the downtown Seattle area (i.e., the Space Needle) is not known, but it wouldn’t be surprising.  On December 3, 2013, it was revealed that noise from jumping and cheering Seahawks fans registers as earthquake. In the aftermath of a nuclear attack in Seattle, an earthquake of great magnitude would occur, just as they do in the wake of any large explosion.

2.6: San Francisco Nuclear Attack

In the event that San Francisco is targeted in a nuclear attack, ground zero will likely be Coit Tower. As previously mentioned, there is a
question as to whether nuclear weapons even exist. In the event that they do not, a large staging area for explosives would be needed. Coincidentally, on November 18, 2013, it was revealed that the iconic Coit Tower in San Francisco is closing for 5 months. This tower could be packed with tons of the most lethal explosives and detonated via remote control at a later date. In order to document the explosion in HD (high-definition), on November 21, 2013, it was revealed that the city of Oakland is moving forward with plans to build an Orwellian surveillance complex. That way, the world will be inundated with videos and images from the horrific explosion across the bay in San Francisco. Another suspicious incident occurred on December 16, 2013, when the San Jose airport terminal closed after water line allegedly ruptured. In the event of a Chinese attack, it’s possible that a target such as the San Jose airport may be targeted first in order to draw Americans to their television prior to the slated nuclear attacks.

2.7: San Francisco Bay Bridge
The
San Francisco–Oakland Bay Bridge (known locally as the Bay Bridge) is a pair of bridges spanning San Francisco Bay of California. Aside from being partially demolished in the 1989 Loma Prieta Earthquake, on January 7th, 2013, it was reported that an oil tanker had struck a tower in the middle of the San Francisco-Oakland Bay Bridge. According to the report, the 752-foot tanker rammed the bridge tower as it headed out to sea damaging a 30 to 40 foot fender of steel on base of the bridge. Whether or not the suspicious ship accident and subsequent “repair” job will ultimately undermine the structural integrity of the bridge is not known, but the timely construction project could have theoretically provided necessary cover for the installation of demolition explosives in and around the Bay Bridge. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a nuclear attack. Curiously, on July 27, 2013, it was reported that a suspicious device had resulted in another S.F. Bay Bridge closure. Whether of not this closer was used for cover to insert or arm explosives on the bridge is not known, but 3 weeks later on August 15, 2013, officials announced the opening date for San Francisco-Oakland Bay Bridge.

2.8: The Golden Gate Bridge
The Golden Gate Bridge is a suspension bridge spanning the Golden Gate, the opening of the San Francisco Bay into the Pacific Ocean. On February 23rd, 2012, it was reported that the
Golden Gate Bridge in San Francisco would undergo a renovation project that will “take years to complete”. According to the report, the project involves repainting the two main suspension cables which are responsible for holding the bridge in place. Whether or not the suspicious “renovation” project will ultimately undermine the structural integrity of the bridge is not known, but the timely construction could have theoretically provided necessary cover for the installation of demolition explosives in and around the Golden Gate Bridge. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a nuclear attack. Prior to a high-profile terror attack or “natural disaster” resulting in the demolition of the Golden Gate Bridge, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda and government propaganda is a slick way of showing that yes, it can happen. On June 2nd, 2009, the Onion ran a story which openly joked about a “horrific attack on San Francisco’s Golden Gate Bridge, which “left thousands missing and assumed dead”. Three years later, Hollywood released “Rise of the Planet of the Apes” (2012), a film (see trailer) in which a monkey literally destroys the Golden Gate Bridge.

III. ANALYZING THE TRENDS:

original

3.1: Drone Terror Trending

Prior to a high-profile nuclear drone strike, the American public must be psychologically prepared to accept that this is in fact possible. Starting in July of 2013, there has been an unprecedented amount of drone-related headlines which will likely culminate in an unprecedented nuclear drone strike within the United States.

Drone Headlines:


1. March 5, 2013:
Pilot reports mysterious drone that could have caused crash over JFK airport
2. May 8, 2013:
New Terrorist Magazine Targets Obama, Drones
3. May 28, 2013:
American drone crashes amid militant fighting in Somalia
4. July 20, 2013:
FAA warns shooting at drone could result in prosecution similar to shooting at airplane
5. August 29, 2013:
Predator drone now part of battle against Yosemite wildfire
6. September 15, 2013:
Man dies after explosion by fire pit in North Carolina yard
7. September 15, 2013:
China builds fast to trigger drone race with America
8. September 25, 2013:
Look, no pilot! F-16 takes its first flight WITHOUT a human
9. October 3, 2013:
US, Japan to deploy new radar, drones in next year
10. October 8, 2013:
Soon, Drones May Be Able to Make Lethal Decisions on Their Own
11. October 21, 2013: Iran Gives Russia Copy of Downed U.S. Drone
12. October 22, 2013: China warns Japan over reported plan to shoot down drones

13. November 3, 2013: Pakistan reviews US relationship over Taliban drone kill
14. November 5, 2013: Exclusive: The CIA, Not The Pentagon, Will Keep Running Obama’s Drone War
15. November 7, 2013: Invasion: 7,500 drones in U.S. airspace within 5 years, FAA warns
16. November 13, 2013: Russia to Deploy Long-Range Attack Drone by 2016
17. November 17, 2013: Malfunctioned drone hits Navy ship during training
18. November 18, 2013: Advanced system to guard Russia from hi-tech surveillance, drone attacks
19. November 19, 2013: RT special report: US drone strike rips Yemeni community apart
20. November 19, 2013: Drone attacks ‘create more enemies with every innocent person killed’
21. November 19, 2013: Europeans Form ‘Drone Club,’ Want to Compete
22. November 21, 2013: U.S. drone strike kills 5 in Pakistan
23. November 22, 2013: Congress rejects mandatory numbering of drone casualties
24. November 22, 2013: China’s first stealth combat drone takes maiden flight – reports
25. November 26, 2013: Pakistan deploys first home-made drones
26. November 27, 2013:
Drone drops contraband into Georgia prison yard
27. November 27, 2013:
US Army equipping soldiers with fleet of bird-like drones
28. December 2, 2013: Amazon testing delivery by drone, CEO Bezos says
29. December 2, 2013: Underground drone economy takes flight
30. December 2, 2013: Self-Driving Nissan Electric Car Takes to Highway
31. December 2, 2013. Why Drone Delivery Will Be A Nightmare For Law Enforcement
32. December 3, 2013: UN starts drone surveillance in DR Congo
33. December 4, 2013: Anti-drone protests halt US military convoys at Pakistan border
34. December 5, 2013: Navy Launches a Drone from a Submerged Submarine
35. December 6, 2013: US tests classified spy drone with ‘superior stealth, efficiency capabilities’
36. December 6, 2013: Unmasked: Area 51′s Biggest, Stealthiest Spy Drone Yet
37. December 6, 2013: EXCLUSIVE: Secret New UAS Drone Shows Stealth, Efficiency Advances
38. December 8, 2013: Air hogs: Drones secret weapon in hunt for feral pigs
39. December 12, 2013: U.S. seeks spy edge with stealth drone
40. December 12, 2013: Drone strike kills 15 ‘wedding party-goers’ in Yemen
41. December 13, 2013: Pentagon unveils laser capable of shooting down drones, mortars
42. December 13, 2013: Declassified FBI docs detail warrantless drone surveillance
43. December 14, 2013: Agriculture the most promising market for drones
44. December 16, 2013: Yemeni parliament votes to ban drone attacks
45. December 18, 2013: Autonomous drones are the not-too-distant future of war
46. December 18, 2013: Colorado judge rules in favor of holding drone-hunting vote after legal fight
47. December 18, 2013: Search for crashed, missing NY-based military drone suspended until spring

[Does not purport to a complete list of headlines or events]

Medium_and_Intercontinental_Range_Ballistic_Missiles

3.2: Missile Terror Trending
Prior to a high-profile Chinese nuclear missile strike, the American public must be psychologically prepared to accept that this is in fact possible. Starting in July of 2013, there has been an unprecedented amount of missile-related headlines which will likely culminate in an unprecedented nuclear missile strike within the United States.

Missile Headlines:

1. July 6, 2013: Missile designed to intercept nukes fails weapon test
2. July 26, 2013:
Don’t Be Alarmed by the Drone Blimps They’re Here to Stop Cruise Missiles
3. August 13, 2013:
US Air Force unit operating nuclear missiles fails safety and security inspection
4. August 25, 2013:
Military removes nuclear weapons unit commander; decision follows security failure
5. September 15, 2013:
India conducts 2nd test flight of its nuclear- capable ‘Agni-V’ long-range ballistic
6. September 23, 2013:
N. Korea tests long-range rocket engine: US think-tank
7. September 22, 2013:
US Air Force test-launches intercontinental missile from California coast
8. October 16, 2013:
Inside the Ring: Russia to test new missile
9. October 24, 2013: Missile doors left open while Air Force nuclear officer slept
10. November 7, 2013: China Deploys New Bomber with Long-Range Land Attack Missile
11. November 17, 2013:
Russia starts ambitious super-heavy space rocket project
12. November 26, 2013:Iran, North Korea Secretly Developing Long-Range Rocket Booster for ICBMs
13. November 27, 2013:
Iran Announces Development of Ballistic Missile Technology
14. December 17, 2013: Russia plans new ICBM to replace Cold War ‘Satan’ missile
15. December 17, 2013: Iran Reveals New Details of Shoulder-Fired Missiles
16. December 17, 2013: Minuteman 3 test missile launches from central California coast
17. December 18, 2013: Russia Plans Rail-Mounted Missiles to Counter US Global Strike Program
18. December 18, 2013: Bombshell find: Couple discovers military rocket in new apartment

[Does not purport to a complete list of headlines or events]

nuclear_explosion

3.3: Nuclear Terror Trending
Prior to a high-profile nuclear attack, the American public must be psychologically prepared to accept that this is in fact possible. In 2013, there has been an unprecedented amount of nuclear and radiological-related headlines which will likely culminate in an unprecedented nuclear attack within the United States. Although most of the headlines are in respect to Fukushima, Iran and nuclear reactors in general, they invoke the fear of nuclear terror nonetheless.

2013 Nuclear Headlines:

1. January 5, 2013: Nuclear Security Helicopters Testing Radiation Levels Above DC Area
2. January 23, 2013: Weather Service: Nuclear Power Plant Causes Freak Snowstorm
3. January 29, 2013: Watch 5 nuclear power station towers collapse in slow motion
4. February 3, 2013: Security breach at nuke plant a wake-up call
5. February 4, 2013: Wyoming Teen, Builds Nuclear Fusion Reactor in Garage
6. February 7, 2013: San Onofre nuke plant operator disputes safety claim
7. February 9, 2013: Outage Shuts Down Plymouth’s Pilgrim Nuclear Power Plant
8. February 17, 2013: ‘No immediate risk’: Nuclear waste tank leaking in Washington
9. February 21, 2013: Mission to transport 23,000 liters of bomb-grade uranium from Canada to US
10. February 23, 2013: Governor: 6 tanks leaking radioactive waste at Washington nuclear site
11. February 23, 2013: Oregon senator to ask for GAO probe of Hanford nuclear site
12. February 25, 2013: Radiation Panic Grips Mumbai
13. February 26, 2013: Nuclear waste leak in Wash. “scandalous,” expert says
14. March 13, 2013: Iran’s Bushehr nuclear power plant taken off line over generator malfunction
15. March 15, 2013: Dirty bomb material secured in Philadelphia, thousands of sites remain in U.S.
16. March 15, 2013: Feds Swarm Metra Train After Detecting Nuclear Risk
17. March 18, 2013: Power outage at crippled Japanese nuclear plant
18. March 29, 2013: Safety: Jaczko Calls for Phaseout in US, Says Plants Aren’t Safe
19. April 1, 2013: Accident at Arkansas nuclear site kills man
20. April 2, 2013: Nuclear board warns of Washington tank explosion risk
21. April 6, 2013: Japan’s Fukushima nuclear plant leaks contaminated water
22. April 9, 2013: All US nuclear reactors should be replaced, ‘Band-Aids’ won’t help
23. April 10, 2013: Gulf States Fear Nuclear Radiation Leak after Iran Earthquake
24. April 12, 2013: Nuclear waste barrels remain strewn across floor of English Channel – report
25. April 13, 2013: DOE finalizing plans to dump man-made uranium in Nevada
26. April 14, 2013: Small Leak Is Discovered at Plant in Fukushima
27. April 15, 2013: Pilgrim Nuclear Plant forced to shut down
28. April 15, 2013: Emergency declared after fire at U.S. nuclear plant — Lasted almost 30 minutes
29. April 16, 2013: Two US nuke plants tighten security after blasts
30. April 18, 2013: After petition, atomic bomb re-enactment dropped from Ohio air show
31. April 18, 2013: Emergency declared at U.S. nuclear plant after lightning strike
32. April 19, 2013: ‘First terror drill at US nuclear plant a success’
33. April 21, 2013: Shots fired at TVA Watts Bar Nuclear Plant
34. May 6, 2013: Kewaunee to start powering down early Tuesday ahead of permanent closure
35. May 9, 2013: 83-year-old nun convicted of sabotage for breach of US atomic complex
36. May 11, 2013: Utility investigating vibrations that caused shutdown of nuclear reactor
37. May 13, 2013: Indian Point To Become First Nuclear Plant To Operate With Expired License
38. May 16, 2013: North Carolina nuclear plant shut down after crack discovered
39. May 17, 2013: Radioactive leak found at Palisades Nuclear Power Plant
40. May 23, 2013: Twin blasts in Niger hit uranium plant, barracks
41. May 25, 2013: Japanese research lab reports radiation leak
42. May 28, 2013: SKorea halts 2 nuclear plants for using control cables with fabricated test results
43. May 28, 2013: Seaweed causes shut down of multiple nuclear reactors
44. June 4, 2013: Cracks in Iran’s nuclear reactor facility following quakes – diplomats
45. June 7, 2013: U.S. orders new safety upgrades at nuclear plants
46. June 7, 2013: California utility says it will retire nuclear plant
47. June 10, 2013: Bushehr nuclear plant suffered electric generator malfunction
48. June 12, 2013: Obama Appointee Who Heads U.S. Nuclear Security Agency Is Hacked
49. June 23, 2013: U.S. engineers to inspect possible leak at Hanford nuclear site
50. July 15, 2013: Greenpeace activists break into French nuclear plant
51. July 24, 2013: Indian Point supervisor charged with lying to Nuclear Regulatory Commission
52. August 14, 2013: North Dakota terror drill deals with radiation devices stolen by terrorists
53. August 15, 2013:
Report: U.S. nuclear plants remain vulnerable to terrorists
54. August 15, 2013: Are U.S. Nuclear Reactors Protected Against Credible Terrorist Attacks?
55. August 15, 2013: Indian Point nuclear plant is vulnerable to terror attack: report
56. August 17, 2013:  Fukushima apocalypse: Duct tape fixes’ could result in ‘millions of deaths’
57. August 21, 2013: Tank at crippled Fukushima nuclear plant leaks highly radioactive water
58. August 22, 2013: Flier Busted For Iranian Uranium Export Scheme
59. August 28, 2013: Pa. nuclear plant security failings revealed in terror drill
60. September 20, 2013: Report: Nuke that fell on N.C. in 1961 almost exploded  
61. September 28, 2013:
No. 2 U.S. nuke commander suspended amid probe
62. October 1, 2013: Large Swedish nuclear reactor forced to shut after jellyfish clog water pipes
63. October 22, 2013: US nuclear missile launch officers repeatedly compromised bunker safety
64. October 22, 2013: A look at violations by officers in nuclear force
65. October 23, 2013: Air Force officials in charge of nukes left open blast door
66. October 24, 2013: Missile doors left open while Air Force nuclear officer slept
67. October 19, 2013: INTERPOL Exercise Boosts Radiological And Nuclear Terrorism Response
68. November 2, 2013: How a war game brought the world to the brink of nuclear disaster
69. November 12, 2013: US-Israeli computer super-worm hit Russian nuclear plant – Kaspersky
70. November 20, 2013:
Nuke troubles run deep; key officers “burned out”
71. November 20, 2013: Nuclear regulators crack firewalls to access porn
72. November 21, 2013: What’s the nuclear option?
73. December 17, 2013: Chinese rover diorama shows Europe being nuked
74. December 20, 2013: Report: Fired Nuke General Misbehaved in Russia

[Does not purport to a complete list of headlines or events]


About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the 2013 global bio-terror pandemic. To date, Truther.org has identified and exposed over 50 Obama sanctioned terror plots, as well as the Alex Jones’ links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. State-Sponsored Terror Threat Assessments (SSTTA), assertions, and forecasts made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically occur based on the cited date. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl XLV Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

Truther RSS

 

Live TV Nuke

Download & Forward PDF

BREAKING NEWS UPDATE: On July 2, 2013, it was reported that China will hold their “largest-ever naval drills” beginning on July 5 through July 12, 2013. Although it has yet to be confirmed, it appears that the sudden inclusion of Russia in the drills is an intelligence PSYOP meant to muddy the waters in respect to the now exposed plot by China to attack the United States around the 4th of July. The article was clear to point out that China and Russia will also participate in another drill on July 27 through August 15, 2013, providing even more cover for the now foiled Chinese attack plot.

David Chase Taylor
June 30, 2013
Truther.org

SWITZERLAND, Zürich As nuclear terror whistleblower David Chase Taylor’s case against the Obama administration for premeditated nuclear terrorism works its way up the court system of Switzerland, a new nuclear terror plot to hijack TV stations worldwide a detonate a nuclear bomb on “Live TV” has been identified.

Due in part to the escalating exposure of Taylor’s case as well as the unprecedented awakening of humanity worldwide, the rabid Zionist establishment, who was caught red-handed attempting to conduct a nuclear holocaust at Super Bowl XLV in Dallas, Texas, on February 6th, 2011, are apparently pulling out all the stops and going for broke in a desperate move to distract the world from their wicked acts of terrorism and usury.

Download & Forward PDF

Based on breaking news and events depicted herein, it now appears that the Zionists have authorized the Chinese government to execute a controlled “surprise” attack against the United States and Japan starting in July of 2013. This unprovoked attack will likely kick-off with a series of escalating Chinese terror attacks against western U.S. cities (i.e., Seattle, Washington, Portland, Oregon, and San Francisco, California) followed by a full-scale invasion of key U.S. military bases in the Pacific theater (i.e., Okinawa, Japan, Iwo Jima, Japan, and Pearl Harbor, Hawaii).

Once America and the world are collectively glued to their respective television sets, TV channels worldwide will be simultaneously held hostage in an unprecedented act of cyber-hijacking as the Chinese attack culminates with “Live TV” nuclear detonation in an American city with a recognizable skyline (i.e., Seattle—Space Needle, San Francisco—Golden Gate Bridge or St. Louis, MissouriGateway Arch).

Depending on how the world reacts to the first ever “Live” nuclear attack, a second nuclear detonation will likely target another city in the United States or Europe, quite possibly Paris, France. In order for a nuclear attack to be the most psychologically terrorizing, a well-known landmark (e.g., the Twin Towers on 9/11) must be destroyed in the attack to serve as a life-long reminder of that horrific day.

The Chinese surprise-attack depicted herein is slated to be eerily reminiscent of the December 7, 1941, Japanese attack on Pearl Harbor, and will undoubtedly spark a nuclear war between the United States and China which recent Truther.org reports such as, “Chinese “Kamikaze” Done Attack On Pearl Harbor Hawaii Imminent” and “Red Dawn Scenario: Chinese Attack On America Imminent” have attempted to thwart.

Make no mistake about it—China is fully under Zionist control and do ONLY do as they are told. Remember, American factories and military technology did not just “accidentally” make its way to China; the transfer of power from the U.S. to China has been a long standing program headed by the likes of Henry Kissinger. By starting World War III, the U.S. government can reinstated the military draft, open FEMA concentration camps nationwide, invoke martial law and initiate the global bio-terror pandemic planned for 2013. Ultimately, it’s a win, win, win, for the Zionists for they get to kill off their political opposition (U.S. military, patriots, gun owners, conservatives, etc.), get rich off war contracts, and their crimes against humanity will once again be hidden in the wake of terrifying nuclear attacks.

July 4th Attack

Although a Chinese attack on America could come at any time, a “Live TV” cyber-hijack and nuclear detonation will most likely occur on
July 4th, 2013, America’s 237th birthday. Prior to a high-profile nuclear detonation on the 4th of July, the American public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. On March 22nd, 2013, a propaganda film entitled “Olympus Has Fallen” (2013) was released (see trailer) in which Washington D.C., America’s capital, was brutally attacked by an ex-North Korean terrorist on the day after the 4th of July. The movie was clear to depict classic Independence Day symbology such as red, white and blue banners, balloons and ribbons. Coincidentally, on May 2nd, 2013, it was reported that the alleged Boston Bombers had initially planned a July 4th attack, giving further credence to the notion that this date has been chosen for terror by the intelligence community. A couple months later on June 28th, 2013, ABC News ran a headline which stated “Feds Worry About July 4 Fireworks Bombs”, the key words being “July 4” and “Bombs”.  According to the report, the FBI has vocalized paramount concern for July 4th, 2013, because masses of revelers are expected to pack city centers and other locations which could be an “an opportunity to perpetuate a mass casualty attack”. Coincidentally, Zionist operative Adam Kokesh, who allegedly works for Obama’s “Revolution Czar”, will be holding an armed protest in Washington D.C. on July 4th, 2013. Should a nuke be detonated on “Live TV”, a bloody riot in America’s capital will likely ensue and spread like a pandemic throughout the United States. 

Hollywood Foreshadowing
As witnessed prior to the 9/11 Attacks, 2011 Super Bowl Nuke Plot (4:12 in video) and the recent Boston Bombings, Hollywood foreshadowing aka predictive programming has become standard operating procedure; the “Live TV” cyber-hijack and nuclear attack is no different. On November 25th, 2012, the hit terror series entitled “Homeland”, aired an episode entitled “Two Hats” (S2E21), which just happened to feature a storyline in which terrorist leader “Abu Nazir” was plotting a terror attack on the U.S.  and planned to film the terror attack on “Live TV” and broadcast it globally. Roughly 7 months later on June 27th, 2013, the hit television show starring Charlie Sheen entitled “Anger Management“, aired an episode entitled “Charlie And The Hot Nerd” (S2E36), in which Charlie’s TV is hijacked by his girlfriend’s x-boyfriend who was an alleged “hacker for the CIA. In short, the x-boyfriend hacks Charlie’s computer, appliances and television and is shown talking to Charlie from inside Charlie’s own TV, eerily similar to the photo depicted right. Watch Anger Management episode here.

Asian/Pacific Surprise “Attack” Propaganda
Prior to a high-profile Asian based Pacific coast attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., America’s capital, is ambushed in a surprise attack by an ex-North Korean terrorist with military aircraft, suicide bombers and cyber-warfare. On July 12th, 2013, the film “Pacific Rim” (2013) (see trailer) will be released which features a story line in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to trailer, their first three attacks target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico. If and when this Hollywood terror programming will manifest in reality is unknown, but it is definitely in the cards.

“Live TV” Nuclear Detonation
Due to the 30-60 second nature of a nuclear explosion, venues such as the NFL Super Bowl, FIFA World Cup, NBA Finals, MLB World Series and the Olympic Games are optimal targets for nuclear terror mainly due to the potentially hundreds of millions watching on “Live TV”. However, since the nuclear attack on Super Bowl XLV was ultimately foiled, a new plot to terrorize humanity with “Live TV” nuclear attack had to be orchestrated. For those who think a Chinese nuclear attack on the U.S. is laughable, consider this: On September 30th, 2012, it was reported that the White House was attacked by hackers allegedly linked to China’s government. The unprecedented cyber-terror attack targeted the U.S. government’s most sensitive computer networks, ultimately breaching a system used by the White House Military Office for nuclear commands. Interestingly, only 9 months later on June 27th, 2013, the U.S. and Japan held war games off the coast of California imitating a Chinese Invasion.

Cyber-Related Nuclear Terror
Prior to a high-profile “Live TV” cyber-hijack and subsequent nuclear detonation, the public must be psychologically prepared to accept that this is in fact possible. Zionist media and Hollywood movie propaganda is a slick way of showing that yes, it can happen. Based purely on research conducted to date, the marriage between cyber-terror and nuclear terror was first made on February 19th, 2013, when a CNN headline entitled “Former CIA Official: Cyber War ‘More Sinister Than Nuclear Age’” first paired the terms “cyber” and “nuclear” together in the same sentence. Roughly a month later on March 22nd, 2013, the propaganda film entitled “Olympus Has Fallen” (2013) was released (see trailer) in which Washington D.C., America’s capital is attacked by an ex-North Korean terrorist who wants to hack the White House computer network and detonate American nuclear warheads while in their respective missile silos. Exactly a month later on April 22nd, 2013, the Wall Street Journal ran a headline entitled “China: Cyberattacks Are Like Nuclear Bombs”, ultimately linking the words “China”, Cyberattacks” and “Nuclear Bombs” in the same sentence. Roughly two months later on June 28th, 2013, another propaganda film entitled  “White House Down” (2013), was released (see trailer) in which Washington D.C., America’s capital, was attacked by hackers attempting to breach the U.S. Department of Defense’s computers to access the “Nuclear Football”, the briefcase used by the President of the United States to initiate nuclear war.

Emergency “Nuclear Terror” Meetings
Just 6 days prior to the planned nuclear attack at Super Bowl XLV, then U.S. Secretary of State Hillary Clinton called an historic first of its kind ambassadors meeting in Washington D.C., which lasted from January 31, 2011, until February 4, 2011. The meeting was so important to matters of state that ambassadors from all 260 U.S. embassies and consulates in more than 180 countries were ordered present. Fast forward roughly 27 months to May 24th, 2013, when 85 nations and four official observers met for the Global Initiative to Combat Nuclear Terrorism (GICNT) in Mexico City, Mexico, to discuss “nuclear terrorism”. Exactly a month later on June 24th, 2013, it was reported that the International Atomic Energy Agency (IAEA) is scheduled to hold an emergency meeting on July 1st through July 5th, 2013, in Vienna, Austria, with members from 112 countries and 20 organizations to again discuss “nuclear terrorism”. Aside from giving government officials plausible deniability in the aftermath of a nuclear attack, these nuclear “prep” meetings are used by the Zionist establishment to instruct their minions on the policies and procedures they will need to adhere to as the world officially enters the terrifying age of nuclear terrorism.

President “O-Bomb-a”
Despite the growing evidence that
nuclear bombs are not exactly what they are cracked up to be, U.S. President Barack “O-bomb-a”, real name Barry Soetoro, is the anointed nuclear president. Therefore, until Obama is ousted from public office, the world will be under the threat of state-sponsored nuclear terrorism. As with any legal matter, a full, independent and open investigation must be conducted prior to filing any legal charges. However, after reviewing the documented evidence in respect to the following nuclear terror cases, it is abundantly clear that the Obama administration is in fact guilty of premeditated nuclear terrorism.

Foiled Obama Nuclear Terror Plots:

1. February 6, 2011: Super Bowl XLV Nuclear Terror Plot (Dallas, Texas)
2. December 31, 2011:
New Year’s Eve Times Square Dirty Bomb Plot (New York City, New York)
3. April 18, 2013:
U.N. Dirty Bomb And U.S. Nuclear Reactor Attack Plot (New York City & Pennsylvania)
4. July ? 2013: “Live TV” Cyber-Hijack And Nuke Attack Plot (Unknown)

Nuclear Scapegoats
A “Live TV”
cyber-hijack may be the moment when the world finds out that the government funded cyber-hacking terror group known as “Anonymous” is in fact the cover for a Chinese military hacking operation. After all, Guy Fawkes masks which are worn by members of Anonymous do appear to have unmistakably Asian features. Other potential nuclear terror scapegoats include Al Qaeda, Pakistan, Chechen terrorists or rough Chinese terrorists who allegedly plotted to bomb the 2008 Beijing Olympics. However, based on the evidence depicted herein, it is most likely a “Live TV” cyber-hijack and subsequent nuclear detonation will be blamed directly on the Chinese government so that World War III between the United States and China can commence.

NASA’s Nuclear Photos
In order to get the most “bang for their buck”, no pun intended, a nuclear detonation must be photographed and videotaped from all different angles in order to be more vividly terrorizing. As seen just prior to the foiled Super Bowl XLV nuclear terror plot on February 6th, 2011, NASA’s “Discovery” shuttle took off on its last mission on February 3rd, 2011, to “document the event”. Just like in 2011, this upcoming “Live TV” cyber-hijack and subsequent nuclear detonation will also be photographed and videotaped from space as NASA just launched a satellite entitled “Interface Imaging Spectrograph” (IRIS) on June 27th, 2013, to study how material heats up and gathers energy as it travels through space. IRIS will also study this energy’s impact on our planet’s climate. In other words, in the after-math of a nuclear attack, the energy released from the nuclear weapons will be used as justification for “Global Warming” legislation and the new taxes that it will bring, irregardless of the cloud-seeding, chemtrails, geo-engineering which is openly admitted and executed on a daily basis.

Singapore Smog Beta-Test?
The horrific smog currently engulfing Singapore and Indonesia is apparently a beta-test for the upcoming nuclear detonation and its subsequent fallout. A major beta-test is needed to see how people respond to a massive change in their environment. Although unprecedented smog is being blamed on “fires”, there doesn’t appear to be any ash falling. Therefore, the deadly smog is most likely the result of heavy-duty chemtrails delivered by aerial drones. After a nuclear detonation in Seattle, for example, expect to see Singapore-type smog all over the Pacific west coast due to “nuclear fallout”.

Texas Revolution?
As witnessed just prior to the Super Bowl XLV nuclear terror plot on February 6th, 2011, both alleged STRATFOR intelligence operative Alex Jones and Texas Governor Rick Perry were caught acting quite suspicious in preparation for the “big event” and the bloody revolution that was  slated to follow. Jones  was routinely beta-testing his listeners and “oiling his guns” in the days prior, Perry actually left Texas for California despite it hosting its first ever Super Bowl. As the world embarks on a new nuclear 9/11, both Jones and Perry are again preparing for the “big event” in their own way. On the June 28th, 2013, episode of the Alex Jones Show, Jones was overshadowed on the air by group of men talking in the background which was clearly heard on-air. Jones quipped,  “We are just doing some “training” in there”. What exactly Jones is training for is unknown, but Perry, who is also located in Austin, Texas, is holding a “Special Session” of the Texas Legislature which will begin at 2 p.m. Monday, July 1st, 2013. Perry stated that, “I am calling the Legislature back into session because too much important work remains undone for the people of Texas.”

UPDATE: In the wake of this Truther.org terror warning, the opening day of the “hotly anticipated” special legislative session lasted only 30 minutes as the Texas Senate inexplicably voted to recess until July 9th, 2013. Curiously, Alex Jones was also a no-show on his radio program of July 1st, 2013.   

Recent Nuclear Terror  Headlines:

1. November 29, 2012:
Nuclear Christmas, False Flag In America To Blame On Iran (Press TV)
2. January 22, 2013:
Indian Police Warn Kashmir Residents Of Possible Nuclear Attack (Fox News)
3. February 19, 2013:
Fmr. CIA Official: Cyber War ‘More Sinister Than Nuclear Age’ (CNN)
4. February 25, 2013:
Radiation Panic Grips Mumbai (WSJ)
5. March 15, 2013:
Dirty Bomb Material Secured In Philadelphia (Fox News)
6. March 15, 2013:
Feds Swarm Metro Train After Detecting Nuclear Risk (CBS News)
7. April 9, 2013:
Russia Conducts Topol Nuclear ICBM Drills (RIAN)
8. April 13, 2013:
DOE Finalizing Plans To Dump Uranium Out West (Fox News
9. April 16, 2013:Era Of Atomic Bombs Over: President Ahmadinejad (Press TV)
10. April 17, 2013:
Zionists Warm Up To Wage Nuclear Wars Across Mideast (Press TV)
11. April 18, 2013:
After Petition, Atomic Bomb Re-Enactment Dropped From Ohio Air Show (Fox News)
12. April 18, 2013:
‘Like A Nuclear Bomb’: Deadly Fertilizer Plant Blast Devastates Texas Town (CNN)
13. April 22, 2013:
China: Cyberattacks Are Like Nuclear Bombs (WSJ)
14. June 3, 2013:
China, India, Pakistan Boost Nuclear Arsenals (France 24)
15. June 24, 2013.
World Worried About Nuclear Terrorism, But Little Action At Talks (Reuters)
16. June 25, 2013:
From Benghazi To Nuclear Terrorism (WND)
17. June 29, 2013:
Survivors Of World War II Atomic Bombings To Be Tested (Fox News)

[Does not purport to be a complete list of headlines]

1. MEDIA CYBER-HIJACKS:

1.1: Media Hacks Trending
Prior to a major “Live TV” cyber-hijack and subsequent nuke detonation, the public must be psychologically programed that this is in fact possible. Starting in February of 2013, there have been at least 3 major instances whereby media and government affiliated network computers were hacked and their security breached. Taken collectively, these events show an unmistakable trend which indicates that a major media cyber-hijack “event” is imminent. 

Media Hack Timeline:

1. February 12, 2013: Zombie Apocalypse Alert Hits Montana’s Emergency Warning System (Montana)
2. April 14, 2013:
‘Belarusian MTV’ Possibly Hijacked, Ran Porn Videos In Daytime (Minsk, Belarus)
3. June 14, 2013:
CBS News Anchorwoman Sharyl Attkisson’s Computer Hacked (New York, New York)

[Does not purport to be a complete list of events]


1.2: TV Cut-Offs Trending
Prior to a numerous TV channels going offline or blank due to an alleged cyber-hijack, the public must be psychologically programed that this is in fact possible. Starting in May of 2013, there have been at least 3 major instances whereby TV stations and providers have cut certain TV broadcasts and channels or the TV station was shut down altogether. Taken collectively, these events show an unmistakable trend which indicates that a future TV shutdown/blackout due to a cyber-hijack “event” is imminent. 

TV Cut Off Timeline:

1. May 19, 2013:  Vietnam Cable TV Drops CNN, BBC Over Translation Decree (Hanoi, Vietnam)
2. May 27, 2013:
Iran Pro-Reform Candidate Says State TV Cuts Off His Broadcast (Tehran, Iran)
3. June 14, 2013:
EU Broadcast Chief: Turn Greek State TV Channel Back On (Geneva, Switzerland)
4. June 18, 2013:
Greek TV Screens Still Blank As Political Dispute Continue (Athens, Greece)

[Does not purport to be a complete list of events]

1.3: Media Terror Trending

Prior to a major terror related attack on a media complex, television studio or TV channel, the public must first be psychologically programed that this is in fact possible. Starting in January of 2012, there has been an unprecedented wave of media related terror attacks, hoaxes and threats which have occurred at in and around various media related entities worldwide. Taken collectively, these events show an unmistakable trend which indicates that a major media related terror “event” is imminent. 

Media Terror Timeline:

1. March 25, 1997:Radio Station Gets Bomb Threat (Miami, Florida)
2. July 12, 2004:
Bomb Threat on TBC Radio station (London, England)
3. September 28, 2004:
Man Makes Radio Station Bomb Threat (Dallas, Texas)
4. December 8, 2007:
Radio Station Gets Bomb Threat (North Cotabato, Philippines)
5. May 30, 2011:
Man Threatens To Bomb TV Station (New York, New York)
6. January 26, 2012:
Radio Station Receives Bomb Threat (Jakarta, Indonesia)
7. September 22, 2012:
Riot Outside MTV Event In Madrid (Madrid, Spain)
8. September 25, 2012:
Radio Stations Evacuated Over Beeping Package (Los Angeles, California)
9. September 30, 2012:
Shots Fired In Parking Lot Of BET Awards (Atlanta, Georgia)
10. October 8, 2012:
FBI Investigating Suspicious Package At CBS TV Studio (Los Angeles, California)
11. October 17, 2012:
NatGeo Bombarded With Terror Threats (Washington D.C.)
12. November 2, 2012:
Chemical Bomb Threat At CNN Center (Atlanta, Georgia)
13. November 30, 2012:
CBS Radio Building Hit By Gunfire (Dallas, Texas)
14. February 12, 2013:
Radio Station Bomb Threat Reported (Melbourne, Australia)
15. March 29, 2013:
Man Arrested For Threat To Blow Up TV Station (Niigata, Japan)
16. March 30, 2013:
Eiffel Tower Radio Tower Receives Bomb Threat (Paris, France)
17. April 14, 2013: ‘Belarusian MTV’ Possibly Hijacked, Ran Porn Videos In Daytime (Minsk, Belarus)
18. May 4, 2013:
CNN Anchor Robbed On Piedmont Avenue (Atlanta, Georgia)
19. May 19, 2013:Man Threatens To Blow Up Studio With Grenade In Live TV Interview (Canes, France)
20. May 27, 2013: Ten NASCAR Fans Injured By Fallen TV Cable (Charlotte, North Carolina)
21. May 27, 2013:
TV Correspondent Killed On TV While Covering War Near Lebanon (Dabaa, Syria)
22. June 5, 2013:
TV Crew Attacked While Reporting On Shooting Story (Providence, Rhode Island)
23. June 11, 2013:Employees Seize Greek State TV And Radio HQ (Athens, Greece)
24. June 14, 2013:
CBS News Anchor Sharyl Attkisson’s Computer Hacked (New York, New York)
25. June 14, 2013: Grenade Hurled At Libyan TV Station In Benghazi (Benghazi., Libya)
26. June 17, 2013:
Government Terror Exercise Broadcast Live On TV (Bangalore, India)
27. June 25, 2013:
Honduran TV Journalist Kidnapped By Armed Men (San Pedro SulaHonduras)
28. June 29, 2013:
Heli TV News Helicopter Crashes, 4 Killed (Bellinzona, Switzerland)

[Does not purport to be a complete list of events]

1.4: Live TV Beta-Tests
In order to properly gage and predict public response in the wake of an unprecedented action such as a “Live TV” hijack and subsequent nuclear detonation, various beta-tests must be conducted prior to the “event” occurring in reality. These beta-tests set the precedent for a copy-cat attack as well as allow the real terrorists to work out any unforeseen problems that may arise. To date, at least three “live TV” beta-tests have been identified:

I. Live TV & EAS Hijack
In what appears to be the first beta-test for a “Live TV” cyber-hijack to gage public reaction to the activation of the EAS, on February 12th, 2013, it was reported that a Montana TV network and the Emergency Alert System (EAS) had been hacked. The fake EAS warning was transmitted on KRTV during the Steve Wilkos Show in several Montana counties. According to the report, the TV station quickly pulled the alert off air and apologized both on air and online, but not before the following statement was read on-air: The bodies of the dead are rising from their graves and attacking the living…Do not attempt to approach or apprehend these bodies as they are considered extremely dangerous…Follow the messages on screen that will be updated as information becomes available.”

II. TV Channel Hijack
In what appears to be the second beta-test for a “Live TV” cyber-hijack to gage social media reaction, on April 14th, 2013, it was reported that a Belarusian music TV channel had been hijacked and pornography had been broadcast. According to the report, on Saturday, April 13th, 2013, at about 3:45pm local time, “BelMuzTV”, which is reportedly seen in public places like shopping malls and restaurants, began airing explicit pornographic images featuring full nudity and sexual intercourse which lasted for approximately 10 to 20 minutes. Reportedly thousands of people throughout the Belarusian capital of Minsk watched the broadcast and began to share their experience on various social networking sites. A rumor then was circulated that a “subversive operation” was executed by the channel’s studio engineer, who entered the control room, loaded the inappropriate content into rotation and then disappeared. In the aftermath of a global “Live TV” cyber-hijack, social networking sites worldwide will be buzzing about having no TV. Eventually, the TV will come back on and billions of people worldwide will collectively witness the nuke attack on “Live TV”. 

III. Live TV Terror Drill
In what appears to be the third beta-test for a “Live TV” cyber-hijack to gage public reaction to “Live” terrorism, on June 17th, 2013, it was reported that an state-sponsored terror drill was broadcast “Live TV” without the police, TV station or its viewers ever being informed that it was fake. According to the report, the televised terror drill caused “scaremongering across the city” when four “terrorists” began hovering around their target, the Taj Vivanta Hotel. The terrorists sparked off a major alert which then tipped off TV reporters and by 11.25pm, multiple TV channels had begun flashing images of four terrorists on the loose in the city.

1.5: Newsrooms Vulnerable to Cyber-Hijack
In an ominous warning sign that news related organizations may be hacked by cyber-terrorists in the near future, on April 23rd, 2013, it was reported that news organizations may have to revisit policies on retweeting breaking news and shore up the security of their social-media accounts due to the fallout from the hacking of the Associated Press’ Twitter account which stated that there had been an explosion at the White House. Stephen Ward, director of the Center for Journalism Ethics at the University of Wisconsin-Madison, stated that, “In light of this, news organizations have to certainly increase security procedures so that they can’t be hacked so easily…(If it was phishing that led to this)…then that is not proper security. They’ve got to review security procedures.” According to Dominic Lasorsa, a journalism professor at the University of Texas, “This is the kind of stuff the media has to deal with today,” he says. “It’s difficult to stay ahead of the hacking community. But our reputation is all we’ve got going for us. News media organizations need to be more savvy about the [security] problem.”

1.6: CBS News Hacked
In a case meant to set the precedent for cyber-hacks against TV stations, on June 14th, 2013, it was reported that CBS News correspondent Sharyl Attkisson’s computer, including her CBS News work computer, was hacked by “an unauthorized, external, unknown party on multiple occasions”, prompting CBS News to hire a firm to look into the hacking. According to the report, CBS News spokeswoman Sonya McNair said that a cyber-security firm hired by CBS News “has determined through forensic analysis” that “evidence suggests this party performed all access remotely using Attkisson’s accounts. While no malicious code was found, forensic analysis revealed an intruder had executed commands that appeared to involve search and exfiltration of data.

1.7: New Israeli 24-Hour TV Channel
Just as the international TV airwaves are about to suffer an unprecedented cyber-hijack, a June 21st, 2013, report states that a new Israel-based 24-hour TV news channel broadcasting in English, French and Arabic will go “Live” on air starting on July 1st, 2013. According to the report, a new TV station based in Tel Aviv named “i24 News” has 150 journalists will be broadcasting Zionist propaganda around the clock in English and French as well as five hours a day in Arabic. With the likes of BBC, CNN, and Fox News likely down due to the TV cyber-hijack, the new Israeli channel will likely be the only television station on the air, due of course to their ability to circumvent the cyber-hijack because of their new state-of-the-art security features. This scenario will allow “i24 News” to have an unabated worldwide audience as well as a timely opportunity to spin the nuclear attacks and the wars which will surly follow to their liking. Naturally, their timing couldn’t be more impeccable.

1.8: New Anchorman Movie Trailer
Anchorman: The Legend of Ron Burgundy” (2004) is a film (see trailer) which was released in 2004 about an eccentric news anchor from San Diego, California. Roughly nine years later, the film is suddenly getting a long overdue sequel entitled, “Anchorman 2: The Legend Continues”. Curiously, the movie trailer was officially released on June 18th, 2013, despite the fact that the film will not be released until December 19th, 2013. Exactly why a movie trailer for a low-budget SNL comedy is being released 6 months too early in the middle of summer is rather suspicious and begs the question: why now? Although it’s impossible to know for certain, it does appear that the Anchorman 2 trailer was released with the sole purpose of bringing as much as attention to television anchors as possible just prior to an unprecedented “Live TV” cyber-hijack.  

2. CYBER WAR:

2.1: United States v. China  
Inflammatory
war propaganda, rising diplomatic tensions between the U.S. and China along with unprecedented U.S. propaganda against China indicates that World War III scenario between the United States and China is on the horizon. On June 4th, 2012, it was reported that the Australian government’s Defense White Paper published in 2009 contained a “secret chapter” that assessed “Australia’s ability to fight an air-sea battle alongside the United States against China”. A few weeks later on June 27th, 2012, Chinese Maj. Gen. Peng Guangqian stated that a future conflict with the United States is coming as a result of U.S. “containment” policy. Guangqian was then quoted as saying, “The United States has been exhausting all its resources to establish a strategic containment system specifically targeting China” and that “The contradictions between China and the United States are structural, not to be changed by any individual, whether it is G.H.W. Bush, G.W. Bush or Barack Obama, it will not make a difference to these contradictions”.

2.2: Cyber Doomsday
Since June of 2012,
numerous propaganda articles have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, “Threat Of ‘Spectacular’ Cyberattack Looms” and “U.S. Homeland Chief: Cyber 9/11 Could Happen “Imminently“, all indicate that an unprecedented act of state-sponsored cyber-terror upon the United States is imminent. Exactly how a cyber-Doomsday will manifest itself is unknown, but a “Live-TV” cyber-hijack and subsequent nuke detonation appears to be the working plan at this given time.

2.3: China & Cyber Terror
As previously, reported, the nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. Based on recent news and events, China, more than any other nation, is sure to be scapegoated in the aftermath of a cataclysmic cyber-terror attack against the United States. On October 5, 2011, U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two U.S. satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyber espionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta recently stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to clamp down on aggressive Chinese cyber-attacks against American companies and the U.S. government.  On October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.

2.4: Obama Cyber Attacks
A Chinese attack highlighted by a massive cyber-attack will allegedly be in response to U.S. hacking and cyber-espionage by the Obama administration. As evidenced, these attacks will be used as the “motive” or justification for an unprovoked attack by China against the United States. According to June 1st, 2013, report by the New York Times,
Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons. Six days later on June 7, 2013, it was reported that Obama has ordered his senior national security and intelligence officials to draw up a list of potential overseas targets for US cyber-attacks, a list which China is surly on. The 18-page Presidential Policy Directive 20, issued in October of 2012 states that Offensive Cyber Effects Operations (OCEO) “can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging”. Three days later, a Foreign Policy report from the Council on Foreign Relations stated that “Deep within the National Security Agency, an elite, rarely discussed team of hackers and spies is targeting America’s enemies abroad”, again highlighting Obama’s offensive cyber-warfare just prior to a retaliatory attack from China.

2.5: Cyber Terror Blinking Red
Cyber-terror related attacks, which are occurring at an unprecedented rate with over 40 high-profile
cyber-attacks in 2013 alone
, are getting more and more diverse with each passing day. As evidenced, the notion that one can attack a jet, bank, stock market, water system, medical device or car via a computer has been floated by the media and brought to the attention of the public over the last few months.

Cyber-Hacking Headlines:

1. April 11, 2013: Crashing Passenger Jet With Android Phone? (RT)
2. April 23, 2013:
 
Stocks Gyrate Wildly After Fake Terror Tweet (USA Today)
3. May 9, 2013:
In Hours, Thieves Took $45 Million In A.T.M. Scheme (NYT)
4. May 9, 2013:
Cyber-Attacks Behind Possibly Record-Breaking Bank Heist (CBS)
5. May 11, 2013:
World Grapples With Rise In Cyber Crime (Fox News)
6. May 25, 2013:
Hackers Tried To Access Haifa’s Water System In Failed Cyberattack (Fox News)
7. June 13, 2013:
US Warns Of Cyber Attacks On Medical Devices (France 24)
8. June 25, 2013:
Bush Advisor: Hastings Crash ‘Consistent With A Car Cyberattack’ (RT)

[Does not purport to be a complete list of headlines]


3. U.S. MILITARY COMPROMISED:

3.1: U.S. Military Vulnerable to Attack
Prior to an unabated attack by China against U.S. military bases in the Pacific (i.e., Okinawa, Japan, Iwo Jima, Japan, and Pearl Harbor, Hawaii), the public must first be led to believe through propaganda and alleged whistleblowers that U.S. military equipment and weapons systems are vulnerable to Chinese cyber-related espionage. That way, in the aftermath of a Chinese invasion whereby U.S. defense systems such as missiles, planes and radars are suddenly rendered useless, the narrative of a Chinese cyber-attack can be floated to the American public and military as the reason for the deadly attack which will surely take America to war. If the following reports are to be believed, Chinese hackers have gained access to U.S. weapons secrets, stole blueprints from Australia’s intelligence agency, stole the latest U.S. weapons, hacked the NSA chairman’s accounts, targeted U.S. missile systems, hacked the Obama campaign, and hacked the head of the Nuclear Security Agency.

Chinese Cyber Espionage Headlines:

1. March 29, 2013:
Report: China Gained U.S. Weapons Secrets Using Cyberespionage (CNN)
2. May 27, 2013:
Chinese Hackers Steal Australian Security Intelligence Blueprints (News.com)
3. May 28, 2013:
Pentagon: The Chinese Stole Our Newest Weapons (RT)
4. May 28, 2013:
Chinese Infiltrated Top U.S. Weapons Systems, Confidential Report Claims (Fox News)
5. May 28, 2013:
Obama Intelligence Agency Chairman Hacked By “Guccifer” (Smoking Gun)
6. May 28, 2013:
Report Lists U.S. Weapons Compromised By Chinese Cyberspies (Washington Post)
7. May 29, 2013:
Pentagon Aircraft, Missile Defense Programs Target Of China Cyber Threat (Fox News)
8. May 29, 2013:
China To Hold Digital War Games (Guardian)
9. May 31, 2013:
Hagel Says Chinese Cyberthreats Pose ‘Stealthy’ Danger To US (Fox News)
10. June 5, 2013:
China Claims ‘Mountains Of Data’ On Cyber Attacks By US (FT)
11. June 6, 2013:
Chinese Hacked Obama, McCain Campaigns, Took Internal Documents (NBC)
12. June 12, 2013:
Head Of U.S. Nuclear Security Agency Is Hacked By “Guccifer” (Smoking Gun)

[Does not purport to be a complete list of headlines]

3.2: U.S. Weapons Compromised by Chinese Hackers
Based on the multiple reports, Chinese hackers have compromised numerous U.S. military weapons system ultimately making U.S. military personal and equipment vulnerable to Chinese attack. According to a May 28th, 2013, report by the Washington Post, the following is an “expanded partial list” of compromised DOD system designs and technologies: 

I. U.S. System Designs
Terminal High Altitude Area Defense, Patriot Advanced Capability-3, Extended Area Protection and Survivability System (EAPS), F-35, V-22, C-17, Hawklink, Advanced Harpoon Weapon Control System, Tanker Conversions, Long-term Mine Reconnaissance System, Global Hawk, Navy antenna mechanisms, Global Freight Management System, Micro Air Vehicle, Brigade Combat Team Modernization, Aegis Ballistic Missile Defense System, USMC Tracked Combat Vehicles, Warfighter Information Network-Tactical (WIN-T), T700 Family of Engines, Full Authority Digital Engine Controller (FADEC), UH-60 Black Hawk, AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile), Affordable Weapons System, Littoral Combat Ship, Navy Standard Missile (SM-2,3,6), P-8A/Multi-Mission Aircraft, F/A and EA-18, RC-135 Detect./Collect, and the Mk54 Light Weight Torpedo.

II. U.S. Technologies
Directed Energy, UAV video system, Specific Emitter identification, Nanotechnology, Dual Use Avionics, Fuze/Munitions safety and development, Electronic Intelligence Processing, Tactical Data Links, Satellite Communications, Electronic Warfare, Advanced Signal Processing Technologies for RadarsNanostructured Metal Matrix Composite for Light Weight Ballistic Armor, Vision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV), Space Surveillance Telescope, Materials/processing technologies, IR Search and Track systems, Electronic Warfare systems, Electromagnetic Aircraft Launch, Rail Gun, Side Scan sonar, Mode 5 IFF, Export Control, ITAR, Distribution Statement B,C,D Technical Information, CAD drawings, 3D models, schematics, Software code, Critical technology, Vendor/supply chain data, Technical manuals, PII (email addresses, SSN, credit card numbers, passwords, etc.), and attendee lists for program reviews and meetings.

3.3: Whistleblower Edward Snowden

The case of
former National Security Agency (NSA) whistleblower Edward Snowden is fascinating for many reasons but mainly because of his role in an upcoming Chinese cyber-related attack. In the aftermath of a Chinese attack, Snowden will be scapegoated as a traitor for giving information to the Chinese which ultimately enables them to circumvent U.S. military programs and weapons systems. This particular narrative first began to form on June 10th, 2013, when CIA officer Bob Baer stated on CNN that Obama officials are speculating that Snowden’s whistleblowing could be considered “potential Chinese espionage”. Four days later on June 14th, 2013, it was reported that a popular Communist Party-backed newspaper was urging China’s leadership to get more information from Snowden rather than send him back to the U.S., because his revelations about secret U.S. surveillance programs were in China’s national interest. Another June 14th, 2013, report stated that Snowden could offer intelligence that would help China update its understanding of cyberspace and improve its position in negotiations with Washington D.C. A week later, on June 21st, 2013, the Obama Administration reportedly charged NSA Whistleblower Snowden with espionage, theft and conversion of government property. These charges were leveled at Snowden in order to give the Obama administration the much needed plausible deniability in the aftermath of a Chinese attack on the U.S. Six day later on June 26th, 2013, it was reported that intelligence agencies in China and Russia had gained access to highly classified U.S. intelligence and military information contained on electronic media held by Snowden. According to the report, the exact compromise of the secret data held on Snowden’s laptop computers remains unknown but the biggest fear is that China gained access to new U.S. nuclear war plans.

3.4: Whistleblower James “Hoss” Cartwright
In the wake of the Edward Snowden case, the Obama administration has presented yet another intelligence patsy who can be scapegoated in the aftermath of a Chinese attack based on U.S. cyber-intelligence failures. On June 28th, 2013, it was reported that retired Marine Gen. James ‘Hoss’ Cartwright, a four-star general, is under a DOJ investigation over leaking details of a classified cyber-terror operation to the press. According to the report, Cartwright, who was deputy chairman of the Joint Chiefs of Staff between 2007 and 2011, was responsible for the ‘Olympic Games’, a massive attack on Iranian uranium enrichment facilities. He allegedly broke details of the top secret operation to the media, including collaboration with Israeli hackers in development of the Stuxnet computer worm. If indicted, Cartwright would join Bradley Manning, Edward Snowden and six others charged under the 1917 Espionage Act by the Obama administration.

4. JAPAN:

4.1: Attack on Japan
The Japanese people are some of the most independent people on earth and therefore have been the focus of numerous wars, nuclear attacks (i.e., Hiroshima, Nagasaki, and Fukushima) tsunamis and earthquakes. The Zionist backed Chinese would love nothing more than to invade and destroy their culture and way of life as much as possible. Unfortunately, as it currently stands, the country of Japan is America’s closest ally in the Pacific and therefore an attack on Japan by China would instantly be seen as an attack on America. The U.S. has numerous military bases in Japan including two very strategic locations in Okinawa, Japan, and Iwo Jima, Japan. In World War II, the Battle of Iwo Jima was made famous by a photo of U.S. soldiers hoisting an American flag atop the island, and therefore, the capture of this island by “Communist” China would undoubtedly serve as an American war cry for revenge. If China were to successfully capture these two islands along with Pearl Harbor, Hawaii, they would have almost conquered most of the Asian-Pacific region.

U.S.-Japan War Headlines:

1. June 21, 2013:
US, Japan Begin Naval Drills Near China (FT)
2. February 7, 2013:
US, Japan, Australia Conduct Military Drills Over Pacific (Fox News)
3. April 5, 2013:
Japan Will Join US Military Drill In California In June (Press TV)
4. June 9, 2013:
Japan Sending Soldiers To US For First Time Amid Tensions With China (Fox News)
5. June 27, 2013:
US-Japan War Games Off The California Coast Imitate Chinese Invasion (RT)
6. June 8, 2013:
‘US Army Chief In Japan Suspended’ (Press TV)

[Does not purport to be a complete list of headlines]

4.2: Head of U.S. Military in Japan Suspended
In a move which clears the way for an unabated Chinese attack on U.S. troops stationed Japan, it was reported on June 7th, 2013, that U.S. Army Major General Michael Harrison, the man directly responsible for responding to an attack on Japan, was suspended for allegedly failing to properly report or investigate a sexual assault complaint. Harrison, who was stationed in Camp Zama, was in charge of U.S. Army-Japan and was suspended four days prior to his completion of his 32-month assignment. It’s no secret that sexual assault and the military are synonymous and therefor the timing of the suspension is highly suspicious to say the least. Harrison’s scheduled replacement is Major General James Boozer, the former deputy commanding general of the US Army in Europe. With Boozer at the helm, plausible deniability due to his greenness on the job and his name “Boozer”, meaning drinker or drunk, will be cited as the reasons he failed to properly respond to a Chinese sneak attack.

4.3: U.S. F-15 Squadron Grounded
Prior to a Chinese invasion in which U.S. military aircraft fail to work properly, there must be an incident whereby U.S. planes can be “updated” with a virus or mechanical tweak so they are rendered useless. On May 28th, 2013, it was reported that U.S. pilot flying an F-15 over the Pacific Ocean identified  an unspecified problem which forced him to eject in mid-flight. A day later on May 29th, 2013, it was reported that the U.S. Air Force had grounded its F-15 fighters on the southern Japan island of Okinawa for a safety review following a crash that forced the aforementioned pilot to eject over the Pacific Ocean. All F-15s attached to the 18th Wing on Okinawa’s Kadena Air Base were scheduled to undergo “inspections” during the reported stand down to ensure that they are “safe” to fly. Although it is not clear whether these planes are still grounded, the so called “inspections” may have allowed for the entire fleet of American planes to be sabotaged.

5. SEATTLE:


5.1: Nuclear Attack on Seattle
It’s no secret that Seattle, Washington, is one of the most liberal and progressive cities in the United States and therefore could  be a target of Zionist terrorism. From marijuana legalization, animal rights, gay rights and recycling, Seattle is not just a city but rather a large community. Curiously, Seattle has experienced an
unprecedented wave of terror and death which has been prepping the city for its impending nuclear destruction. Coincidentally, “Red Dawn” (2012) is a film (see trailer) in which the Washington state is the victim of a red-dawn surprise attack by military aircraft from Asia. At exactly 0:33 seconds into the trailer, a massive, explosion is heard at the same time a snow globe with Seattle’s Space Needle is shown, potentially foreshadowing an upcoming attack on the city.

Seattle Terror Headlines:

1. March 20, 2013:
Seattle Airport Disrupted By Security Breach (Seattle, Washington)
2. March 25, 2013:
Man Gets 18 Years In Seattle Terror Plot (Seattle, Washington)
3. April 1, 2013:
3 Killed After Seattle-Area Tavern Brawl Turns Into Gun Fight (Seattle, Washington)
4. April 8, 2013:
Man In Seattle Terror Case Gets 17-Years For Terror Plot (Seattle, Washington)
5. April 12, 2013:
Authorities Probe Death Of Man On Seattle Escalator (Seattle, Washington)
6. April 14, 2013:
One Dead After Avalanches East Of Seattle (Snoqualmie Pass, Washington)
7. April 22, 2013:
Domestic Dispute Starts Shootout That Kills 5 Near Seattle (Seattle, Washington)
8. June 25, 2013:
FBI’s “Faces Of Global Terror” Ads Pulled Off Buses In Seattle (Seattle, Washington)

[Does not purport to be a complete list of headlines]

6. SAN FRANCISCO:

6.1: San Francisco Bay Bridge
The San Francisco–Oakland Bay Bridge (known locally as the Bay Bridge) is a pair of bridges spanning San Francisco Bay of California, in the United States. Aside from being partially demolished in the 1989 Loma Prieta Earthquake, the Bay Bridge recently underwent an emergency “repair”. On January 7th, 2013, it was reported that an oil tanker had struck a tower in the middle of the San Francisco-Oakland Bay Bridge. According to the report, the 752-foot tanker rammed the bridge tower as it headed out to sea damaging a 30 to 40 foot fender of steel on base of the bridge. Whether or not the suspicious ship accident and subsequent “repair” job will ultimately undermine the structural integrity of the bridge is not known, but the timely construction project could have theoretically provided cover for the installation of demolition explosives in and around the Bay Bridge. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated nuclear terrorist attack.

6.2: The Golden Gate Bridge
In order for a nuclear attack to be even more psychologically terrorizing, a well-known landmark such as the Golden Gate Bridge must be destroyed in the attack to serve as life-long reminder of that horrific day. The Golden Gate Bridge is a suspension bridge spanning the Golden Gate, the opening of the San Francisco Bay into the Pacific Ocean. On February 23rd, 2012, it was reported that the Golden Gate Bridge in San Francisco, California, would undergo a renovation project that will “take years to complete”. According to the report, the project involves repainting the two main suspension cables which are responsible for holding the bridge in place. Whether or not the suspicious “renovation” project will ultimately undermine the structural integrity of the bridge is not known, but the timely construction could have theoretically provided cover for the installation of demolition explosives in and around the Golden Gate Bridge. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated nuclear terrorist attack. Prior to a high-profile terror attack or “natural disaster” resulting in the demolition of the Golden Gate Bridge, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda and government propaganda is a slick way of showing that yes, it can happen. On June 2nd, 2009, the Onion ran a story which openly joked about a “horrific attack on San Francisco’s Golden Gate Bridge, which “left thousands missing and assumed dead”. Three years later, Hollywood released “Rise of the Planet of the Apes” (2012), a film (see trailer) in which a monkey literally destroys the Golden Gate Bridge.

7. PARIS, FRANCE:

7.1: Attack on Paris, France
Paris, France, is one of the most anti-government places in the world. They have absolutely no respect for authority or the political process, and are not shy to voice their anti-government sentiment. Therefore, should the U.S. be hit with a Chinese nuclear attack, depending on how Europe reacts, it’s possible that Paris could be subsequently targeted. In order for a nuclear attack to be even more psychologically terrorizing, a well-known landmark such as the
Eiffel Tower must be destroyed in the attack to serve as life-long reminder of that horrific day. Coincidentally, some very suspicious events have occurred at the Eiffel Tower over the last few months. Whether or not any of these events provided cover for the installation of a nuclear weapon in or around the tower is not known, but the opportunity to do so was available.

Latest Eiffel Tower Headlines:

1. March 30, 2013:Eiffel Tower Evacuated Due To Bomb Threat (Paris, France)
2. June 18, 2013:
Eiffel Tower Evacuated After Suicide Threat (Paris, France)
3. June 25, 2013:
Armed Soldiers Guard Eiffel Tower After 6 Terrorists Arrested In Paris (Paris, France)
4. June 27, 2013:
Eiffel Tower Reopens To Tourists After Rare 2-Day Strike
5. June 28, 2013:
Eiffel Tower Fiasco A Lift For Thieves (Paris, France)

[Does not purport to be a complete list of headlines]

8. WALL STREET:

8.1: Wall Street Terror
A cyber-attack by China against Wall Street would be seen as an act of war and would be a convenient way to both publically bankrupt America and take her to war at the same time. Wall Street is the financial district of New York City and the heart of America’s economy. 93 years ago, the Wall Street bombing occurred at 12:01 pm on September 16th, 1920, in the Financial District of New York City. The terrorist attack killed 38 and seriously injured 14. With the rise of the Occupy Wall Street movement and the ever increasing hatred of banks and their practice of  usury, it is highly likely that Wall Street will once again be targeted for terror. On November 18th, 2008, it was reported that terror suspect Aafia Siddiqui was taken into custody following her capture in Afghanistan on charges of attempted murder following revelations of a “Mass Casualty Attack” that listed various landmarks in New York, including Wall Street. Prior to a high-profile terror attack against Wall Street, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “The Dark Knight Rises” (2012) is a film (see trailer) which depicts a major terror attack and cyber-terror attack against Wall Street in which criminals bilk the NYSE for billions of dollars.

8.2: Wall Street Preparing for Major Cyber Attack
Prior to a major cyber-terror attack by China on the New York Stock Exchange (NYSE), one would expect there to be some stock-market related terror drills to prepare Wall Street insiders for the attack. Case in point: On June 13th, 2013, it was reported that Wall Street executed “Quantum Dawn 2”, a cyber-terror war-game apparently meant to give insiders an opportunity to make financial moves before the market crashes, for good. According to the report, Cyber Strategies oversaw a terror exercise which included Citigroup, Bank of America, the Department of Homeland Security, the Treasury Department, the Federal Reserve, the Securities and Exchange Commission, as well as 40 other firms. The drill, which featured a hacker, possibly from China, operating from a fake trading platform, prompted a response in which the participants facilitated a conference call to “figure out what was going on”. In other words, the drill simulated a real-life scenario in which insider firms received the “heads up” about an impending cyber-attack and shared this information accordingly so that their bank accounts and those of their clients would not be affected. The same sort of thing occurred just prior to 9/11 when “put options” or bets were taken out on United Airlines and American Airlines, the two airline companies involved in the attacks. According to the “9/11 Commission Report”, “some unusual trading did in fact occur”, however, it claimed that, “each such trade proved to have an innocuous explanation”.

Conclusion  
It’s imperative to remember that starting fights between different races, classes and religions is taken word for word from the 3rd Protocol of the Protocols of Zion. The main goal of the Zionist establishment is to get America to destroy herself the same way that Russia was destroyed under Stalin. This is done by dividing and then collapse society upon itself by baiting the gun-owning American public into a violent revolution against their own police and military while the real terrorists sit off-shore and pull the strings.

About the Author
David Chase Taylor, the editor-in-chief of Truther.org, is an American journalist living in Zürich, Switzerland where he has applied for political asylum since the release of The Nuclear Bible, a book credited with subverting a false-flag/state-sponsored nuclear terror attack upon America in Dallas, Texas on February 6, 2011. Taylor has since released The Bio-Terror Bible, a website exposing the coming global bio-terror pandemic likely planned for 2013. Taylor has also exposed numerous terror plots including the 2012 DNC Terror Plot, the “Twilight” Premier Terror Plot, as well as Alex Jones’ links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. Terror related assertions, forecasts and predictions made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically happen based on the cumulative terror related data. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Namaste.

Landmark Terror

Please Download & Forward PDF

David Chase Taylor
April 14, 2013
Truther.org

As Emma Bull once stated, “Coincidence is the word we use when we can’t see the levers and pulleys”. This statement couldn’t be more true when looking at America’s historic landmarks and national treasures, almost all of which have either undergone recent “construction” projects, “facelifts”, “renovations”, “restorations” and/or have been specifically targeted with terrorism.

Is it just mere coincidence that the San Francisco–Oakland Bay Bridge, the Brooklyn Bridge, Cowboys Stadium, the Federal Reserve Bank, the “Freedom Tower”, also known as “One World Trade Center (1 WTC)”, the Gateway Arch, the Georgia Dome, the Golden Gate Bridge, the Hoover Dam, Independence Hall, the Liberty Bell, Mall of America, the Mount Rushmore National Memorial, the National Mall in Washington D.C., the 104 nuclear reactors within the United States, The Pentagon, the Sears Tower (Willis Tower), the Space Needle, the Statue of Liberty, Times Square, the United States Capitol building, the U.S. Supreme Court Building, the USS Arizona Memorial in Pearl Harbor, Hawaii, the Washington Monument, the Washington Square Arch, and the White House all just happen to be simultaneously “blinking red” for controlled demolition and/or terrorism?

Download & Forward PDF

American history shows that the World Trade Center received a timely “elevator renovation” just prior to 9/11, and that The Pentagon also underwent a renovation project in the exact location where it was later attacked on 9/11. Whether or not these unprecedented “construction” jobs have ultimately undermined the structural integrity of these iconic and historic American landmarks is yet to be known, but the timely nature of these projects could have theoretically provided cover for the installation of demolition explosives in and around the aforementioned landmarks. These explosives could then be detonated via remote-control at a later date such as July 4th in a calculated attempt to give the appearance of coordinated terrorist attacks or a foreign invasion.

A glimpse of how the American landmark terror scenario might play out in reality occurred on October 24, 2012, when the government sponsored terror group known as “Anonymous” stated that they had planted a bomb in an undisclosed U.S. government building that would eventually be detonated on November 5, 2012, the day before the U.S. Presidential election. If and when a series of coordinated high-profile false-flag/state-sponsored terror attacks against American landmarks comes to fruition, the United States and her people will likely be held hostage as “terrorists” begin to systematically blow up American landmarks. As this process plays itself out, the American publically will be humiliated on the global stage as the symbols of Americana might and prosperity are ultimately turned into ash and rubble.

The goal of these landmark terror attacks is to destroy America physically, financially and of course psychologically. These attackswill most likely consist of 9/11 style aerial attacks and/or suicide bombings against the landmarks identified herein. With each passing terror attack, U.S. President Barack Obama will seize more and more power until he is ultimately declared dictator and martial law is enacted. These attacks will then be scapegoated onto alleged Islamic “terrorists” such as Al Qaeda, Al Shabaab or Iran, the nation of China, or white American militia members such as the U.S. government funded Hutaree terror group.

The goal of America’s Zionist controllers, who are ultimately responsiblefor setting-up the American Landmark Terror Plot, is to get America to destroy herself the same way that Russia was destroyed under Stalin. This is done by dividing and then collapse society upon itself by baiting the gun-owning American public into a violent revolution against their own police and military while the real terrorists sit off-shore and pull the strings. In the aftermath of a bloody wave of state-sponsored terror attacks against American landmarks, Zionist operative such as Alex Jones, Michael Savage, Sean Hannity, Bill O’Reilly, and Rush Limbaugh will attempt bait gun-owning Americans into taking up arms against the U.S. government.

1. U.S. Landmarks Slated for Demolition:

1.1: Bay Bridge (San Francisco, California)
The San Francisco–Oakland Bay Bridge (known locally as the Bay Bridge) is a pair of bridges spanning San Francisco Bay of California, in the United States. Aside from being partially demolished in the 1989 Loma Prieta Earthquake, the Bay Bridge recently underwent an emergency “repair”. On January 7, 2013, it was reported that an oil tanker had struck a tower in the middle of the San Francisco-Oakland Bay Bridge. According to the report, the 752-foot tanker rammed the bridge tower as it headed out to sea damaging a 30 to 40 foot fender of steel on base of the bridge. Whether or not the suspicious ship accident and subsequent “repair” job will ultimately undermine the structural integrity of the bridge is not known, but the timely construction project could have theoretically provided cover for the installation of demolition explosives in and around the Bay Bridge.These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated terrorist attack.

1.2: Brooklyn Bridge (New York, New York)
The Brooklyn Bridge is a bridge in New York City and is one of the oldest suspension bridges in the United States. According to reports, the Brooklyn Bridge is currently undergoing a four-year, $500 million safety and aesthetic improvement program that will be completed in 2014. Aside from being under construction, on April 27, 2011, it was reported that a long-standing plot by al-Qaida to take down the Brooklyn Bridge had been revealed in classified documents obtained by the New York Times. In 2012 alone, there were at least 5 suspicious closings of the Brooklyn Bridge which may potentially indicate that the bridge has already been set-up and rigged for demolition. Whether or not these suspicious “closures” will ultimately undermine the structural integrity of the bridge is not known, but the timely closures could have theoretically provided cover for the installation of demolition explosives in and around the Brooklyn Bridge. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated terrorist attack. Prior to a high-profile terror attack on the Brooklyn Bridge, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “The Dark Knight Rises” (2012) is a film (see trailer) which depicts the Brooklyn Bridge as the target of a major terror attack.

1.3: Cowboys Stadium (Dallas, Texas)
Cowboys Stadium is a stadium in Arlington, Texas, which serves as the home of the NFL’s Dallas Cowboys. The stadium has had numerous terror related threats and was the chosen location of the 2011 Super Bowl Nuclear Terror Plot. According to reports, Cowboys Stadium is currently in the running for the Super Bowl L. If selected, there is a very high probability that the stadium will again be targeted with state-sponsored nuclear terrorism by the Obama administration in 2016.

1.4: Federal Reserve Bank (12 U.S. Locations)
The 12 Federal Reserve Banks form a major part of the Federal Reserve System, the central banking system of the United States. Long before alleged terrorist Quazi Mohammad Rezwanul Ahsan Nafis reportedly attempted to detonate a 1,000-pound bomb in front of the Federal Reserve building in New York City in October of 2012, the U.S. government conducted numerous terror drills on the Federal Reserve in August of 2012. According to the report, the Federal Reserve terror exercises were executed by U.S. Special Operations Command. The elite unit trained for two weeks on the Federal Reserve terror drills which were held between 7 p.m. and midnight and reportedly involved three Black Hawk helicopters hovering over the Federal Reserve’s parking lot with four smaller helicopters landing on the bank’s roof. Should Federal Reserve terror strike America, it will happen at one or more of the Federal Reserve’s 12 locations (Boston, New York, Philadelphia, Cleveland, Richmond, Atlanta, Chicago, St. Louis, Minneapolis, Kansas City, Dallas and San Francisco). Coincidentally, in September of 2012, Alex Jones of Infowars released a new magazine whose maiden cover featured the Federal Reserve building on fire, further indicating that the alleged STRATFOR intelligence operation known as Infowars has inside information that false-flag Federal Reserve terror is currently being planned.

1.5: Freedom Tower (New York, New York)
The “Freedom Tower”, also known as “One World Trade Center (1 WTC)”, is the main building of the new World Trade Center complex in New York City. The World Trade Center in New York was previously attacked in 1993 and 2001, and therefore a third attack on the new “Freedom Tower” by alleged “Islamic Terrorists” who hate freedom is highly likely and would surely be used as the rallying cry for the invasion of another Middle Eastern country by the U.S. According to Wikipedia, Larry Silverstein of Silverstein Properties is the leaseholder and developer of the Freedom Tower complex and remains “actively involved in most aspects of the site’s redevelopment process”. Silverstein is the same Zionist operative who first bought, insured and then profited off the demolition of the Twin Towers in the 9/11 terror attacks to a tune of $4.6 Billion. According to a June 29, 2005, report, the Freedom Tower is “bomb proof” and is “draped in a reinforced mixture of stainless steel and titanium, providing a reflective security shield capable of withstanding a major blast.” Properly translated, this statement likely means that the Freedom Tower has been constructed with built-in demolition capabilities hidden within the very structure itself. Make no mistake; the Freedom Tower is a ticking false-flag terror time bomb. 

1.6: Gateway Arch (St. Louis, Missouri)
The
Gateway Arch is an arch that is the centerpiece of the Jefferson National Expansion Memorial in St. Louis, Missouri. It was built as a monument to the westward expansion of the United States. On December 15, 2011, it was reported that the Gateway Arch in St. Louis, Missouri, would undergo a facelift renovation with the aid of $20 million grant from the federal government with the goal of finishing improvements to the landmark by 2015, the 50th anniversary of when the Gateway Arch was completed. Whether or not the “renovation” job will ultimately undermine the structural integrity of the historic American landmark is not known, but the timely construction project could have theoretically provided cover for the installation of demolition explosives in and around the Gateway Arch. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated terrorist attack. Coincidentally, the St. Louis landmark has a rich history of terror related legislation and events. According to Wikipedia, the 1995 Oklahoma City bombing propelled a counterterrorism program and $1 million grant was instituted which trained park officials to note the activity of tourists and funded the installation of inconspicuous electronic detection devices. After the 9/11 attacks of 2001, the park checkpoint was moved to the entrance of the visitor center where visitors are screened by magnetometers and x-ray equipment. The arch then became one of several U.S. monuments placed under restricted airspace during 2002 Fourth of July celebration, and in 2003, a number of 10-feet long, 32-inch high, 4100-lbmovable Jersey barrierswere installed to impede terrorist attacks on the arch. Then in 2006, arch officials suspiciously hired private “physical security specialist(s)” to replace public law enforcement officers. The alleged responsibilities of the specialist include “risk assessment, testing the park’s security system, increasing security awareness of other employees, and working with other government agencies to improve the arch’s security procedures”. Privatization of arch security more easily allows for a terrorist attack as well as the cover-up of any subsequent investigation.

1.7: Georgia Dome (Atlanta, Georgia)
The Georgia Dome is a domed stadium located in Atlanta, Georgia, United States. On March 7, 2013, it was reported that Atlanta mayor Kasim Reed and the Atlanta Falcons had reached an agreement on key aspects of a deal regarding the construction of a new stadium in Atlanta, Georgia. According to the report, the terms of the new stadium deal had not been announced as several key “aspects” of the agreement still needed to be approved by the Atlanta city council after a memorandum of understanding was reached with the Georgia World Congress Center Authority board and the owners of the Georgia Dome. According to Wikipedia, “If a [stadium] deal is reached, the Georgia Dome would then be demolished”. The “memorandum of understanding” was likely based upon the execution of a bio-terror anthrax attack on the Georgia Dome slated for April 8, 2013, which was ultimately exposed and foiled, subsequently putting the new stadium deal in jeopardy. The racially motivated bio-terror attack on the 2013 NCAA Final Four at the Georgia Dome was slated to be scapegoated onto white American militia members who attacked in response to the African-based terror attacks exposed in the report entitled “Operation Northwoods 2.0 Authorized By Obama: Guantanamo Bay Prison Break And Miami, Florida Terror Attacks Imminent”. In the aftermath of this unprecedented bio-terror attack, America was scheduled to suffer even further by the hand of Zionist Hollywood cinematic terror propaganda with “Under The Dome” (2013), a 13 week television mini-series scheduled to premiere on June 24, 2013, exactly 11 weeks after the would-be NCAA bio-terror attack of April 8, 2013. The new television show (see trailer) is based on the 2009 Steven King book by the same name which depicts the chaotic and deadly life experienced by Americans who are suddenly forced to live under a dome with no way out. Had the NCAA Final Four bio-terror plot been executed as planned, it is likely that anthrax would have been used in the attack. This would have ultimately “forced” the CDC to quarantine the entire Georgia Dome, subsequently trapping the entire record crowd of 74,000 inside the dome with no way out. In the aftermath of the bio-terror attack, the Georgia Dome would have been eventually deemed a biohazard and a demolition of the premises would have been in order.

1.8: Golden Gate Bridge
(San Francisco, California)
The
Golden Gate Bridge is a suspension bridge spanning the Golden Gate, the opening of the San Francisco Bay into the Pacific Ocean. On February 23, 2012, it was reported that the Golden Gate Bridge in San Francisco, California, would undergo a renovation project that will “take years to complete”. According to the report, the project involves repainting the two main suspension cables which are responsible for holding the bridge in place. Whether or not the suspicious “renovation” project will ultimately undermine the structural integrity of the bridge is not known, but the timely construction could have theoretically provided cover for the installation of demolition explosives in and around the Golden Gate Bridge. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated terrorist attack. Prior to a high-profile terror attack or “natural disaster” resulting in the demolition of the Golden Gate Bridge, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda and government propaganda is a slick way of showing that yes, it can happen. On June 2, 2009, the Onion ran a story which openly joked about a “horrific attack on San Francisco’s Golden Gate Bridge, which “left thousands missing and assumed dead”. A year later on June 17, 2010, the NBA basketball team entitled the Golden State Warriors inexplicably changed their logo to include the image of the Golden Gate Bridge. Two years later, Hollywood released “Rise of the Planet of the Apes” (2012), a film (see trailer) in which a monkey literally destroys the Golden Gate Bridge.  The following year, a new television series (see trailer) entitled “Red Widow” (2013) prominently features the image of red iconic Golden Gate Bridge.

1.9: Hoover Dam (Boulder City, Nevada)
The Hoover Dam is a concrete arch-gravity dam in the Black Canyon of the Colorado River, on the border between the U.S. states of Arizona and Nevada. On January 15, 2013, it was reported that the federal Occupational Safety and Health Administration (OSHA) had found 58 violations at Nevada’s Hoover Dam, the hydroelectric power plant east of Las Vegas. According to the report, OSHA found numerous superficial violations but stated that “none of the violations jeopardized the safety of the public or threatened the structural integrity of the dam or its operations”. A month later on February 12, 2013, a 5.2 Magnitude Earthquake struck Tonopah Junction, Nevada, just 215 miles north of Las Vegas. If a man-made “natural disaster” strikes anywhere near the 77 year old Hoover Dam, it will likely “crack” (with a little help from demolition explosives) resulting in a massive local tidal wave and an electrical power blackout blanketing California, Arizona and Nevada. With no power, no airport, no gambling, no air conditioning, no sewage system and no way out of the desert, tourists and locals alike would begin looting as riots and mayhem would breakout almost instantaneously. Needless to say, without power, Las Vegas would turn into an unprecedented biological cesspool almost overnight.

Dead Men Tell No Tales
The notion that the Hoover Dam could be targeted with a man-made “natural disaster” or terror attack was first exposed in a March 31, 2013, report entitled “Apocalyptic “Doomsday Asteroid” Hoax Planned For 2013”. A week later on April 7, 2013, William McCune, Nevada’s chief insurance examiner, was found dead wrapped in a blanket and bound with duct tape in a river in Carson City, Nevada. In the aftermath of a “natural disaster” or terrorist attack against the Hoover Dam, McCune, head of the division’s corporate and financial affairs section, would most likely be responsible for the massive insurance payouts to private utility companies in Nevada, Arizona, and California that would inevitably sustain catastrophic losses as a result of the Hoover Dam’s electrical power being cut-off for a lengthy period of time. According to the report, authorities suspected foul play after finding evidence of a bloody and violent struggle in McCune’s apartment in Carson City. As expected in any government related assassination, the report was clear to lead its readers astray by pointing out that “investigators continue to believe McCune’s death concerned “personal” matters and was not work-related”. It was likely that McCune was privy to insider information about the Hoover Dam terror plot and was terminated in the wake of the plots exposure.

1.10: Liberty Bell Center (Philadelphia, Pennsylvania)
Located in Philadelphia, Pennsylvania, the Liberty Bell Center includes Independence Hall, where the Declaration of Independence was signed, and the Liberty Bell, two of America’s most treasured national monuments. On February 15, 2012, it was reported that after 18 months of rehabilitation, the iconic clock tower at Independence Hall was completed. Whether or not the “rehabilitation” job will ultimately undermine the structural integrity of the historic American landmark is not known, but the timely construction project could have theoretically provided cover for the installation of demolition explosives in and around the Liberty Bell Center. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated terrorist attack. Coincidentally, on January 26, 2013, Philadelphia police arrested a man for “threatening to blow up Philadelphia’s iconic Liberty Bell”. According to the report, the unidentified man left two black backpacks and a bomb squad was called in to secure the scene. Although the bags did not contain explosives, the case serves as a psychological splinter in the minds of the public for future reference in the aftermath of terror related attacks against American landmarks.

1.11: Mall of America (Minneapolis, Minnesota)
The Mall of America (MoA) is a shopping mall located in Bloomington, Minnesota (a suburb of the Twin Cities), across the interstate from the Minneapolis–St. Paul International Airport. Although a terror attack could theoretically occur in any mall or retail outlet in America, it will most likely happen in “Mall of America”. Mall of America has allegedly been the target of numerous terror plots since 9/11, and according to Maureen Bausch, vice president of Mall of America, “Mall of America, is attractive to people that want to hurt America”. The entity responsible for terror security at Mall of America is the Israeli security firm entitled Rozin Security Consulting, LLC, who has been drilling various terror scenarios in Mall of America since 2005. Rozi’s infamous “lockdown drills” are executed monthly and are designed to trap the terrorists and the shoppers together inside the mall, ultimately allowing for a greater number of victims as well as the eventual escape of the real Israeli Mossad terrorists. The “lockdown” drills also allow for the elimination of potential witnesses and enable the terrorists to kill indiscriminately with no interference from citizens or law enforcement personal outside the building. On October 21, 2012, it was reported that Jordanian authorities had foiled an Al Qaeda plot to attack shopping malls and Western diplomatic missions using suicide bombers, booby-trapped cars and rockets. According to the reports, the attacks would come on a date terrorists dub “9/11 the second.”

1.12: Mt. Rushmore (Black Hills, South Dakota)
The Mount Rushmore National Memorial is a sculpture carved into the granite face of Mount Rushmore near Keystone, South Dakota, which features the heads of four United States presidents: George Washington, Thomas Jefferson, Theodore Roosevelt and Abraham Lincoln. On September 18, 2012, it was reported that Mt. Rushmore was a potential terror target and that the U.S. government had released a security related terror assessment of the Mount Rushmore National Monument. According to the report, the government conducted a study in 2008 on the psychosocial impacts of a terrorist attack on a national monument such as Mr. Rushmore. Curiously, some of the findings in the study have been blacked out. On July 3, 2005, it was reported that Mt. Rushmore has been targeted for terror on multiple occasions:

Mt. Rushmore Terror Timeline:

1. Between 1970 and 1973, members of the American Indian Movement made several attempts to occupy and deface the monument.
2.In 1975, a bomb went off in front of the visitor center prior to visitors’ morning arrival.
3.In 1987, the environmental group Greenpeace climbed the mountain with plans to unfurl a 160-by-50-foot protest banner reading “We the people say no to acid rain” over the presidents’ faces.
4. In 1991, the Park Service received threats to assassinate then-President George H.W. Bush during a celebration marking the monument’s 50th anniversary of completion.
5.In 1999, a Colorado man was arrested for threatening to blow up the mountain.

1.13: National Mall (Washington D.C.)
The
National Mall is an open-area national park in downtown Washington, D.C. The term National Mall commonly includes areas that are officially part of West Potomac Park and Constitution Gardens to the west, and often is taken to refer to the entire area between the Lincoln Memorial and the U.S. Capitol, with the Washington Monument providing a division slightly west of the center. On September 1, 2012, it was reported that construction workers had finally taken down the construction fence which had marred the view of the Lincoln Memorial Reflecting Pool for nearly two years. According to the report, the renovation costing $34 million gave the pool a new steel reinforced foundation as well as a new filtration system that pumps water from the Potomac Tidal Basin. Whether or not the “renovation” job will ultimately undermine the structural integrity of the historic Washington D.C. landmarks is not known, but the timely construction project could have theoretically provided cover for the installation of demolition explosives in and around the National Mall. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated terrorist attack. Is an apparent ominous sign of things to come, on April 11, 2013, it was reported that a body a man was pulled from the Potomac River near the Roosevelt Memorial. According to the report, this was the second time within a week a body has been discovered in National Mall area. These random deaths serve as a psychological splinter in the minds of the public for future reference in the aftermath of terror related attacks against American landmarks.

1.14: Nuclear Reactors (104 U.S. Locations)
There are currently 104 nuclear reactors within the United States, one of which was featured in the  November 3, 2013, report entitled “San Diego False-Flag Terror Blinking Red On Every Level”. As stated in the report, ever since the Fukushima Daiichi Nuclear Disaster of 2011, there have been approximately 50 nuclear reactor “emergencies”, “closures”, “leaks” and other major incidents clearly setting the stage for upcoming nuclear reactor terror on an unimaginable scale. Complementing the unprecedented nuclear reactor emergencies are multiple cases of “terrorists” attempting to breach nuclear reactors, repeated lapses in nuclear reactor security, as well as countless propaganda articles indicating that a Fukushima-level event inside the U.S. is a foregone conclusion. Prior to a high-profile nuclear reactor event, whether by a man-made “natural disaster” or terrorist attack, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Chernobyl Diaries” (2012) is a film (see trailer) in which a group of young adults go for an “extreme tour” of the abandoned town of Pripyat which sits in the shadow of the disastrous Chernobyl Nuclear Power Plant. A recent Nuclear Regulatory Commission (NRC) panel recommended that the U.S. government customize emergency plans for each of America’s nuclear power plants, a change would “expand” the standard 10-mile evacuation zone surrounding nuclear reactors.

1.15: Pentagon (Washington D.C.)
The Pentagon is the headquarters of the United States Department of Defense, located in Arlington County, Virginia. As a symbol of the U.S. military, “the Pentagon” is often used metonymically to refer to the U.S. Department of Defense rather than the building itself. Just prior to the 9/11 terror attacks, the Pentagon suspiciously underwent a renovation project in the exact location where it was later attacked. The most recent renovation is openly called “The Pentagon Renovation Project” and was allegedly initiated in the 1990’s, but was only concluded in June of 2011. Whether or not the “renovation” job will ultimately undermine the structural integrity of the Pentagon is not known, but the timely construction project could have theoretically provided cover for the installation of demolition explosives in and around The Pentagon. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated terrorist attack. On September 28, 2011, it was reported that a Massachusetts man with a degree in physics was arrested for plotting to blow up the Pentagon with homemade drones. According to the report, Rezwan Ferdaus planned to fill two remote-controlled model airplanes with C-4 explosives and hand grenades and direct them into the iconic Washington buildings.

1.16: Sears Tower/Willis Tower (Chicago, Illinois)
The Willis Tower, formerly named, and still commonly referred to as, Sears Tower, is a 108-story, 1,451-foot (442 m) skyscraper in Chicago, Illinois. Aside from the fact that the Mayor of Chicago, Rahm Emanuel, is the son of a Israeli Zionist terrorist, the Sears Tower (Willis Tower) was the main target of a 2006 terror plot and was also depicted by Zionist shill David Dees as being a future terror target. In the 2006 Sears Tower Terror Plot, the Mayor of Chicago, Richard M. Daley, the Governor of Illinois Rod Blagojevich, and the DHS director Michael Chertoff, colluded in heading up terror exercises that were rehearsing the demolition of Sears Tower in Chicago. Thankfully, an alert whistleblower sounded the alarm and a few weeks later the patsies, a group of African-Americans from Florida, were indicted for the terror plot to blow up the Sears Tower. A few years later, Blagojevich was indicted on federal charges and has since been sentenced to 14 years in federal prison in an apparent attempt to silence him from speaking out about the failed terror plot. Lastly, the Sears Tower is allegedly owned by Larry Silverstein, the same Zionist operative who first bought, insured and then profited off the demolition of the Twin Towers in the 9/11 terror attacks to a tune of $4.6 Billion.

1.17: Space Needle
(Seattle, Washington)

The
Space Needle is a tower in Seattle, Washington and a major landmark of the Pacific Northwest region of the United States. On February 21, 2001, it was reported that former CIA officials has stated that Seattle’s Space Needle was a target of a foiled 1999 millennium bombing attack financed by alleged terrorist Osama bin Laden. Eleven years later in April of 2012, it was reported that the Space Needle got a new paint job that will return it to its original color of retro “Galaxy Orange”. Whether or not the “paint job” will ultimately undermine the structural integrity of iconic Space Needle is not known, but the timely paint project could have theoretically provided cover for the installation of demolition explosives in and around the Space Needle. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated terrorist attack.

1.18: Statue of Liberty (New York, New York)
The
Statue of Liberty is a colossal neoclassical sculpture on Liberty Island in New York Harbor and quite possibly the United States’ most famous landmark. On October 26, 2012, it was reported that the Statue of Liberty will reopen on the 126th anniversary of its dedication after a year-long renovation project. According to the report, the $30 million renovation allegedly improved fire alarms, sprinkler systems and exit routes to bring Lady Liberty in line with New York City safety codes. Five months later on March 19, 2013, it was reported that the Statue of Liberty has now been rescheduled to reopen by Independence Day, July 4, 2013, about eight months after it was inexplicably closed because of Superstorm Sandy. Whether or not the “renovation/repair” job will ultimately undermine the structural integrity of iconic statue is not known, but the timely construction project could have theoretically provided cover for the installation of demolition explosives in and around the Statue of Liberty. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated terrorist attack. On November 18, 2008, it was reported that terror suspect Aafia Siddiqui was taken into custody following her capture in Afghanistan on charges of attempted murder following revelations of a “Mass Casualty Attack” that listed various landmarks in New York, including the Statue of Liberty.

1.19: Times Square (New York, New York)
Times Square is a major commercial intersection in Midtown Manhattan, New York City, and is often iconified as “The Crossroads of the World” or “The Center of the Universe”. As detailed in an October 5, 2012, report entitled “Obama’s “Dirty Bomb” Terror Plot Exposed”, Times Square in New York City was unmistakably targeted with a dirty bomb. According to the report, the Obama administration was caught red-handed attempting to execute the logistics of a terror plot which planned to detonate a “dirty bomb” in Times Square during its famous New Year’s Eve celebration which is televised worldwide. Although the terror plot was ultimately exposed and subverted, it is likely that Times Square will again be targeted with terror in the near future.

1.20: U.S. Capitol Building (Washington D.C.)
The
United States Capitol is the meeting place of the United States Congress, the legislature of the federal government of the United States, and is located atop Capitol Hill in Washington, D.C. On June 14, 2012, it was reported that the U.S. Capitol dome will undergo its first major face-lift in more than 50 years, costing $19 million in repairs to the lower portion of the dome. According to the American Institute of Architects, American Society of Civil Engineers and other groups, “The U.S. Capitol is not merely Congress’ work space; it is also an attraction for millions of visitors from around the world…and a potential target for those who wish to do us harm“. Whether or not the “facelift” job will ultimately undermine the structural integrity of iconic dome is not known, but the timely construction project could have theoretically provided cover for the installation of demolition explosives in and around the United States Capitol. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated terrorist attack. On September 28, 2011, it was reported that a Massachusetts man with a degree in physics was arrested for plotting to blow up the US Capitol with homemade drones. According to the report, Rezwan Ferdaus planned to fill two remote-controlled model airplanes with C-4 explosives and hand grenades and direct them into the iconic Washington buildings. Three months later on December 5, 2011, it was reported that the Israeli Knesset and Jerusalem anti-terror police conducted a terror exercise in which a plane crashes into the Knesset, Israel’s congressional building. According to the report, the drill simulated a crashed plane containing “dangerous materials” so it was necessary for Israeli security officers to wear “protective clothing for radiation and biological contamination”. This drill is significance because the U.S. Capitol was first targeted for terror by an Israeli suicide bomber in 1998. Roughly 8 months later on August 20, 2012, it was reported that the U.S. Air Force and Coast Guard will fly “intercept and identification” exercises entitled “Falcon Virgo” over Washington D.C. as part of efforts to prevent suicide aircraft attacks or other threats to the U.S. capital. Six months later on February 17, 2013, it was reported that authorities had arrested and charged a Virginia man on his way to what he thought would be a suicide attack on the U.S. Capitol. According to the report, Amine El Khalifi allegedly expressed interest in conducting a suicide attack and was subsequently charged in U.S. District Court with attempting to use a weapon of mass destruction. Roughly two months later on April 8, 2013, it was reported that a Florida man is under arrest after police say he brought unregistered guns and ammunition onto the grounds of the U.S. Capitol Building.

1.21: U.S. Supreme Court
(Washington D.C.)
The
Supreme Court Building is the seat of the Supreme Court of the United States and is situated in Washington, D.C. On May 22, 2012, it was reported that the U.S. Supreme Court is getting a “facelift” and that workers have now started a two-year Supreme Court renovation project on the building’s marble facade. According to the report, the decision for the 2012 renovation was due to a November 2005 incident, in which 80 pounds of marble fell from the Authority figure of Robert Aitken’s sculpture of “Liberty Enthroned. Why the U.S. government waited 7 years to allegedly repair one of its most precious landmarks is highly suspicious. Whether or not the “facelift” job will ultimately undermine the structural integrity of iconic structure not known, but the timely construction project could have theoretically provided cover for the installation of demolition explosives in and around the Supreme Court Building. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated terrorist attack.

1.22: USS Arizona Memorial (Pearl Harbor, Hawaii)
The USS Arizona Memorial, located at Pearl Harbor in Honolulu, Hawaii, marks the resting place of 1,102 of the 1,177 sailors and Marines killed on the USS Arizona during the attack on Pearl Harbor on 7 December 1941 by Japanese imperial forces and commemorates the events of that day. On May 30, 2012, it was reported that the USS Arizona Memorial in Pearl Harbor, Hawaii, was in dire need of funds to finish its restoration project which was started back in 2007. Whether or not the “restoration” job will ultimately undermine the structural integrity of the historic American landmark is not known, but the timely construction project could have theoretically provided cover for the installation of demolition explosives in and around the USS Arizona Memorial. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated terrorist attack. Prior to a high-profile terror attack on the USS Arizona Memorial, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are taken by surprise and viciously attacked. In a March 31, 2013, report entitled “Chinese “Kamikaze” Done Attack On Pearl Harbor Hawaii Imminent”, it was revealed that based on recent Chinese military drills and maneuvers, an attack by China on the U.S. island of Hawaii (President Obama home state) is highly likely. On October 15, 2012, it was reported that China held a joint military drill involving infantry, artillery and air forces to improve the ability of Chinese paratroops to land on and capture an island.

1:23: Wall Street (New York, New York)
Wall Street is the financial district of New York City, named after and centered on the eight-block-long street running from Broadway to South Street on the East River in Lower Manhattan. 93 years ago, the Wall Street bombing occurred at 12:01 pm on Thursday, September 16, 1920, in the Financial District of New York City. The terrorist attack killed 38 and seriously injured 14. With the rise of the Occupy Wall Street movement and the ever increasing hatred of banks and their usury practices, it is highly likely that Wall Street will once again be targeted for terror. On November 18, 2008, it was reported that terror suspect Aafia Siddiqui was taken into custody following her capture in Afghanistan on charges of attempted murder following revelations of a “Mass Casualty Attack” that listed various landmarks in New York, including Wall Street. Prior to a high-profile terror attack on Wall Street, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “The Dark Knight Rises” (2012) is a film (see trailer) which depicts Wall Street as the target of a major terror attack.

1.24: Washington D.C. (District of Columbia)
The city of Washington, D.C., formally the District of Columbia and commonly referred to as Washington, “the District”, or simply D.C., is the capital of the United States. On October 26, 2012, it was reported that historical American artifacts were stolen from the U.S. National Archives in Washington D.C., including the Wright Brothers airplane patent, the bombing maps for the nuclear attack on Japan, and photos allegedly taken by astronauts on the moon.  The shocking news was then complemented by reports that Washington D.C.’s Pennsylvania Avenue, also known as “America’s Main Street,” was now being listed among the nation’s endangered landscapes because of neglect and deferred maintenance, despite the fact that almost every major historical building, landmark or monument in Washington D.C. has either recently undergone renovation or is still currently under construction.  The notion that Washington D.C. is doomed is complemented by recent government terror drills which are preparing the capital for future acts of terror. On February 22, 2012, it was reported that a new security project to lock down gateways to the U.S. Capitol is being planned, aimed at targeting gang assaults and lone wolf attackers. According to the report, officials are warning lawmakers and Capitol security against a developing type of assault called a “blended attack” that combines a physical attack against a target along with a cyber-attack against the same or different targets.

1.25: Washington Monument (Washington D.C.)
The
Washington Monument is an obelisk on the National Mall in Washington, D.C., built to commemorate George Washington, commander-in-chief of the Continental Army and the first American president. On August 24, 2011, it was reported that due to an earthquake, the Washington Monument had suffered a crack near the pyramid-shaped tip and had monument been permanently tilted. Although this report was later denied by officials, the Washington Monument is currently closed due to construction and is not scheduled to re-open until 2014. Whether or not the “repair” job will ultimately undermine the structural integrity of the historic American landmark is not known, but the timely construction project could have theoretically provided cover for the installation of demolition explosives in and around the Washington Monument. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated terrorist attack. Prior to a high-profile terror attack or man-made “natural disaster” on the Washington Monument, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Olympus Has Fallen” (2013) is a film (see trailer) in which the Washington Monument is attacked by an ex-North Korean terrorist with military aircraft, suicide bombers and cyber warfare.

1.26: Washington Square Park Arch (New York, New York)
The Washington Square Arch is a marble triumphal arch in Washington Square Park, Greenwich Village, Manhattan, New York. On January 10, 2013, it was reported that a man had been keeping bomb-making materials in his Greenwich Village apartment with the goal of blowing up the Washington Square Park Arch. According to the report, police had been informed that Aaron Greene was seen sprinkling white powder on the sidewalk inside the park and trying to ignite it, stated Paul Browne, the chief spokesman for the New York Police Department. Investigators believe the powder was hexamethylene triperoxide diamine, or HMTD, a highly explosive ingredient used in bomb making that was discovered last month in the apartment Greene shared with his girlfriend, Morgan Gliedman. Obviously, no one in their right mind would attempt to detonate a concrete and steel structure in this manner, but the oddity and sheer stupidity of the case serves as a psychological splinter in the minds of the public for future reference in the aftermath of terror related attacks against American landmarks.

1.27: White House (Washington D.C.)
The
White House is the official residence and principal workplace of the President of the United States, located at 1600 Pennsylvania Avenue Northwest, Washington, D.C. On September 12, 2012, it was reported that after nearly two years and $86 million worth of construction, the West Wing of the Obama White House has emerged from its visual seclusion “remarkably unchanged”. According to the report, the construction project began in September of 2010 with the excavation of a huge multistory pit in front of the West Wing. Whether or not the “construction” job will ultimately undermine the structural integrity of America’s most famous residence is not known, but the timely construction project could have theoretically provided cover for the installation of demolition explosives in and around the White House. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated terrorist attack. Aside from its suspicious construction, the White House has been the target of a number of high-profile terror plots and threats. On January 18, 2012, it was reported that an Occupy Wall Street protester threw a smoke bomb over the fence of the White House. Two months later on March 8, 2012, it was reported that a top hacker and committed anarchist who worked closely with the LulzSec, openly spoke of burning down the White House. Six months later on September 30, 2012, it was reported that the White House was attacked by hackers allegedly linked to China’s government. The unprecedented cyber-terror attack targeted the U.S. government’s most sensitive computer networks, ultimately breaching a system used by the White House Military Office for nuclear commands. A month later on October 21, 2012, it was reported that a year-long investigation by the Investigative Project on Terrorism (IPT) has found that scores of known radical Islamists made hundreds of visits to the Obama White House, meeting with top administration officials. Prior to a high-profile terror attack on the White House, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Olympus Has Fallen” (2013) is a film (see trailer) in which the White House is attacked by an ex-North Korean terrorist with military aircraft, suicide bombers and cyber warfare.

About the Author
David Chase Taylor, the editor-in-chief of Truther.org, is an American journalist living in Zürich, Switzerland, where he has applied for political asylum after the release of The Nuclear Bible, a book credited with stopping a false-flag/state-sponsored nuclear terror attack upon America. Taylor has also released The Bio-Terror Bible, a book and website exposing the coming global bio-terror pandemic. Taylor has also been credited with exposing numerous terror plots including the 2012 DNC Terror Plot, the “Twilight” Premier Terror Plot, and the Alex Jones links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. Terror related assertions, forecasts and predictions made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically happen based on the cumulative terror related data. Historically, once a major false-flag terror plot is exposed (see: Super Bowl Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Namaste.

Chinese Drone Attack

Download & Forward PDF

David Chase Taylor
March 31, 2013
Truther.org

Based on recent news and events, it is highly likely that China will launch a “surprise” attack against the United States. For those who think a Chinese attack on the U.S. is laughable, consider the following: On September 30, 2012, it was reported that the White House was attacked by hackers allegedly linked to China’s government.

This unprecedented cyber-terror attack targeted the U.S. government’s most sensitive computer networks, ultimately breaching a system used by the White House Military Office for nuclear commands. The Chinese sneak attack is slated to be eerily reminiscent of the December 7, 1941, Japanese attack on Pearl Harbor, and will undoubtedly be the spark which ignites the World War III scenario between the U.S. and China.

Download & Forward PDF

This multifaceted attack will most likely involve a cyber-attack against U.S. financial interests (stock markets and banks), and an EMP attack targeting U.S. military radar and satellites ultimately leaving the U.S. electronically blind to a Chinese stealth drone attack on U.S. military bases in the Pacific, namely Pearl Harbor in Hawaii, the home state of U.S. President Obama. This sneak attack was first exposed in the November 31, 2012, report entitled “Red Dawn Scenario: Chinese Attack On America Imminent”. Since this watershed report was released, there have been countless accusations by the U.S. against China in respect to cyber espionage and cyber-attacks allegedly stemming from the Chinese military. To add more fuel to the fire, it was reported on March 21, 2013, that China had conducted a massive cyber-terror attack on South Korea, a close U.S. ally in the region.

Since June of 2012, numerous propaganda articles have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, “Threat Of ‘Spectacular’ Cyberattack Looms” and “U.S. Homeland Chief: Cyber 9/11 Could Happen “Imminently“, all indicate that an unprecedented act of state-sponsored cyber-terror upon the United States is imminent.

ENCLOSED CHAPTERS:

1. Chinese Drone Attack
2. Chinese Cyber-Terror Attack
3. Chinese EMP Attack
4. World War III Scenario: U.S. Versus China  

1. Chinese Drone Attack:

1.1: Surprise “Aerial Attack” Propaganda Films

Prior to a high-profile aerial attack on the Pacific Coast of the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are taken by surprise and viciously attacked. If and when this terror programming will manifest in reality is unknown, but it is definitely in the terror cards.

1.2: China’s Cyber/Drone Attack
On March 13, 2013, it was reported that China is building one of the world’s largest drone fleets aimed at attacking the United States in the event of a war. According to the report, “The Chinese military envisions its drone swarms scouting out battlefields, guiding missile strikes and overwhelming opponents through sheer numbers. China’s military-industrial complex has developed homegrown drones to accomplish these goals, according to the report released on March 11, 2013, by the Project 2049 Institute. “The PLA now fields one of the world’s most expansive UAV [unmanned aerial vehicle] fleets,” said Ian Easton and L.C. Russell Hsiao, researchers at the Project 2049 Institute and authors of the new report. The Project 2049 Institute report warned that China could consider “plausibly deniable” drone attacks blamed upon mechanical failure or cyberhackers. The drones could act as decoys, use electronic warfare to jam communications and radar, guide missile strikes on carriers, fire missiles at U.S. Navy ships or dive into ships like kamikaze robots.

1.3: China’s “Stealth” Drones
The report by Project 2049 goes on to state that China is developing drones such as the rumored “Dark Sword” stealth drone that have low radar profiles to escape radar detection and that Chinese engineers have even begun working on drones that have the software brains to fly in formation, do aerial refueling and takeoff and land autonomously. The report goes on to cautions the U.S. military to prepare for the worst-case scenario by hardening its existing air bases in Asia.

1.4: South Korea Developing “Kamikaze” Attack Drones
China is not alone in its quest for kamikaze drones. October 9, 2012, it was reported that a suicide drone capable of striking North Korea is under development in South Korea. According to the report, the “Devil Killer” can reach speeds of approximately 250 mph, carry an explosive payload, automatically identify targets, as well as undertake an automatic strike or a manually executed one. The Devil Killer can theoretically strike a target 25 miles away in about 10 minutes and is expected to be deployed by 2015. This development is an obvious threat and provocation to North Korea and will likely be cited as one of the main justifications for a future North Korean biological and/or chemical attack on South Korea.

1.5: North Korea’s “American-Made” Drones
North Korea is also attempting to secure “kamikaze” like drones. On February 6, 2012, it was reported that North Korea, by way of Syria, had purchased numerous high-speed American-made target drones with the intent of developing new drones based off the technology. According to the report, North Korea has already conducted numerous tests on high-speed drones mounted with high explosives and that the “North appears likely to deploy [the drones] near the inter-Korean border to target South Korean troops stationed on border islands in the Yellow Sea”.

1.6: Chinese Attack on Hawaii?

On November 5, 2012, it was reported in an article entitled “Red Flag Over The Atlantic: China Is Angling To Take Over A U.S. Airbase In The Azores” that “Chinese planes could patrol the northern and central portions of the Atlantic and thereby cut air and sea traffic between the U.S. and Europe” and that “China could target the American homeland…Lajes is less than 2,300 miles from New York, shorter than the distance between Pearl Harbor and Los Angeles”. While the aforementioned scenario is laughable and an obvious decoy, Pearl Harbor in the U.S. state of Hawaii is the most likely target. After all, history has a tendency to repeat itself.

1.7: A New Pearl Harbor
Based on recent military drills and maneuvers, an attack by China on the U.S. island of Hawaii (President Obama home state) is highly likely. A new Pearl Harbor would destroy a key U.S. foothold in the Pacific as well as remind Americans of when the Japanese attacked Pearl Harbor on December 7, 1941. In order to pull this sneak attack off, the Chinese would have to blind America electronically with an EMP/cyber-attack prior to any aerial drone attack. On August 13, 2012, it was reported that China had launched the “Bahai Sea Green Pearl”, a 36,000-ton ferry and cruise  ship commissioned in August of 2012 at Yantai Port in China’s northeastern Shandong Province. The ship is intended to ferry cars and passengers across the Yellow Sea, but when needed by the People’s Liberation Army, the “Green Pearl” can double as a troop carrier. Visually, the “Green Pearl” looks just like any other civilian cruise ship and could easily be used to secretly transport Chinese troops to Hawaii or the U.S. mainland in a surprise attack. Two months later on October 15, 2012, it was reported that one of China’s seven military command groups had held a joint military drill involving infantry, artillery and air forces to improve the ability of paratroops to land on and capture an island.

2. Chinese Cyber-Terror Attack:

2.1: China & Cyber Terror
The nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. Based on recent news and events, China, more than any other nation, is sure to be scapegoated in the aftermath of a cataclysmic cyber-terror attack against the United States. On October 5, 2011, U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two U.S. satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyber espionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta recently stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to clamp down on aggressive Chinese cyber-attacks against American companies and the U.S. government.  On October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.

2.2: Cyber Terror Target: U.S. Economy
Since 2010, there has been literally hundreds of cyber-attacks, a good many of them against the U.S. financial sector. In a 2007 CRS Report for Congress entitled “Terrorist Capabilities For Cyber-Attack: Overview And Policy Issues”, the U.S. government states that, “If terrorists [China] were to launch a widespread cyberattack against the United States, the economy would be the intended target for disruption” and that “…many security experts also agree that a cyber-attack would be most effective if it were used to amplify a conventional bombing or CBRN (chemical, biological, radiological or nuclear attack)”. Authorities have also expressed concerns about terrorists combining physical attacks such as bombings with hacker attacks to disrupt rescue efforts, known as hybrid or “swarming” attacks.

2.3: Financial Cyber Terror Blinking Red
Based on unprecedented financial cyber-terror propaganda and the recent rash of suspects and patsies arrested for financial cyber-terror related crimes, financial cyber-terror is blinking red on every level. On April 24, 2012, it was reported that Osama bin Laden was looking for a follow-up terror attack to doom the American economy, so a cyber-terror attack targeting U.S. banks and Wall Street hijacking trillions of dollars and dooming the American economy is definitely in the cards. To date, individuals have been arrested for numerous cyber-terror related crimes such as credit and debit card PIN theft, theft of proprietary software code from the Federal Reserve Bank of New York, illegal reproduction and distribution of more than 100 copyrighted commercial and financial business software programs, malware SpyEye used to steal and use personal banking and credit card data from unsuspecting victims’ online accounts, and the former head of fraud and security for digital banking at Lloyds Bank admitted to committing £2.5 million fraud. In other words, everything needed to commit the greatest bank heist ever is conveniently in place. Coincidentally, governments around the world have been executing financial cyber-terror drills in which hackers hijack trillions of dollars with no trace.

2.4: The Chase Bank “$0.00” Balance Beta-Test
On March 18, 2013, it was reported that millions of Chase Bank customers across the U.S. who use online and mobile banking saw their checking and savings accounts with a zero balance. Although this unprecedented electronic banking event was chalked up to being an “internal glitch”, it was most likely a beta-test to gage the American public’s reaction to a future cyber terror attack in which they are suddenly faced with the reality of losing their entire life’s saving. The beta-test was then used as a psychological marker of things to come as media operatives worldwide collectively prepped their respective audiences for an upcoming financial related cyber-heist that will most likely be blamed on China. “We have a technology problem regarding customers’ balance information,” Chase said in a statement. “It has nothing to do with cyber threats. It is an internal issue. We are very sorry to our customers for the inconvenience…It is not confined to the West Coast.”

3. Chinese EMP Terror Attack:

3.1: Chinese EMP Terror Attack
If the EMP terror propaganda is to be believed, a single Chinese EMP could destroy America, ultimately causing a nightmare worse than 9/11 and would result in an America with no power, no food, no transportation, no banking and no internet. Based on the recent news and events, it is highly likely that the Chinese EMP attack will target U.S. military radar and satellite installations in the Pacific, ultimately leaving the U.S. electronically blind to a Chinese aerial attack.

3.2: China’s EMP Quest

In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it is stated that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Adm. Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If U.S. propaganda is to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

3.3: Chinese “Mystery Missile” EMP Attack?
On November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. The U.S. government denied that they were responsible for the missile, but a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. or Chinese military attacked the “Carnival Splendor” with an EMP missile and the U.S. sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. fired EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

4. The World War III Scenario:

4.1: United Stated Versus China  
Inflammatory war propaganda, rising diplomatic tensions between the U.S. and China along with unprecedented U.S. propaganda against China indicates that World War III scenario between the United States and China is on the horizon. On June 4, 2012, it was reported that the Australian government’s Defense White Paper published in 2009 contained a “secret chapter” that assessed “Australia’s ability to fight an air-sea battle alongside the United States against China”. A few weeks later on June 27, 2012, Chinese general Peng stated that a future conflict with the United States is coming as a result of U.S. “containment” policy. Peng was then quoted as saying: “The United States has been exhausting all its resources to establish a strategic containment system specifically targeting China” and that “The contradictions between China and the United States are structural, not to be changed by any individual, whether it is G.H.W. Bush, G.W. Bush or Barack Obama, it will not make a difference to these contradictions.”

About the Author
David Chase Taylor, the editor-in-chief of Truther.org, is an American journalist living in Zürich, Switzerland, where he has applied for political asylum after the release of The Nuclear Bible, a book credited with stopping a false-flag/state-sponsored nuclear terror attack upon America. Taylor has also released The Bio-Terror Bible, a book and website exposing the coming global bio-terror pandemic. Taylor has also been credited with exposing the 2012 DNC Terror Plot, the “Twilight” Premier Terror Plot, and the Alex Jones links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. Terror related assertions, forecasts and predictions made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically happen based on the cumulative terror related data. Historically, once a major false-flag terror plot is exposed (see: Super Bowl Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Namaste.

Chinese Red Dawn by December 21, 2012

Chinese Red Dawn Imminent

Truther.org
November 30, 2012
David Chase Taylor

With no major Obama terror attack to date, it appears that the Obama Administration and its Zionist controllers have stuck a deal with China to allow for the “controlled” attack and the potential invasion of sovereign U.S. territory. A Chinese surprise attack is imminent and will most likely come in the form of a combined EMP terror attack, cyber-terror attack, and physical attack via manned aircraft and drones against U.S. military bases, cities and infrastructure in Hawaii and other U.S. coastal cities.

If the EMP terror propaganda is to be believed, a single Chinese EMP could destroy America, ultimately causing a nightmare worse than 9/11 resulting in an America with no power, no food, no transportation, no banking and no internet. To those who think a Chinese attack on the U.S. is laughable, consider this: On September 30, 2012, it was reported that the White House was attacked by hackers allegedly linked to China’s government. The unprecedented cyber-terror attack targeted the U.S. government’s most sensitive computer networks, ultimately breaching a system used by the White House Military Office for nuclear commands.

Download & Forward PDF

Unprecedented war propaganda, rising diplomatic tensions between the U.S. and China along with unprecedented U.S. propaganda against China indicates that World War III scenario between the United States and China is on the horizon. On June 4, 2012, it was reported that the Australian government’s 2009 Defence White Paper contained a “secret chapter” that assessed “Australia’s ability to fight an air-sea battle alongside the United States against China”. Then on June 27, 2012, Chinese general Peng stated that a future conflict with the United States is coming as a result of U.S. “containment” policy. “The United States has been exhausting all its resources to establish a strategic containment system specifically targeting China…The contradictions between China and the United States are structural, not to be changed by any individual, whether it is G.H.W. Bush, G.W. Bush or Barack Obama, it will not make a difference to these contradictions.”

This Truther.org terror warning is complex and interconnected and therefore can only be understood once all the following chapters are reviewed, confirmed and understood:

1. Rise of China
2. China & EMP Warfare
3. China & Cyber Terror
4. China & Space Terror
5. U.S. Landmarks Slated for Demolition

China Can’t Invade America
China, despite its 2.3 million man military, cannot physically occupy the continental Unites States. As General Isoroku Yamamoto, Fleet Admiral and Commander-in-Chief of the Imperial Japanese Navy (IJN) during World War II, once stated, “You cannot invade the mainland United States. There would be a rifle behind every blade of grass”. However, the invasion and occupation of Hawaii and select coastal locations such as New Orleans, Houston, San Diego, Los Angeles, San Francisco or Seattle is theoretically possible. Word about the Zionist occupation of America has reached critical mass and it is clear that Americans in both the police and military will not arrest, detain or execute their fellow American citizens. Therefore, a treacherous backroom deal has been struck between the Zionists and China to execute the dirty work that Americans won’t.

The Patriot Trap
In the aftermath of surprise Chinese attack and subsequent invasion, gun-wielding freedom loving patriots from all over America will flock to the coastal hotspots to fight the Chinese occupation. The will allow for the identification, apprehension, internment and subsequent death of potentially millions of American citizens. In the fog of war, it will be almost impossible to know whether these Americans disappeared at the hands of the Chinese or at the hands of the American government. In the end, it doesn’t really matter as both forces will be working together against the American people.

American Terrorists  
Essentially, a surprise Chinese attack and subsequent invasion would serve as both a psychological operation (PSYOP) and military diversion for the U.S. government in order to a) declare martial and seize total power, b) open FEMA camps for mass arrests and detection , and c) to regain public credibility which has been lost since 9/11. Once the patriot trap has served its purpose, so called American freedom fighters waging war against the Chinese government will be labeled as “terrorists” and treated as such. The Chinese invasion scenario depicted herein is essentially the storyline of two major films (see below), and appears to be the operational plan in place at the moment.

“Tomorrow, When the War Began”
In the propaganda film entitled “Tomorrow, When the War Began” (2010), (See: Trailer) a group of Australian youth out camping awake to find the skies full of invading Asian military aircraft, obviously Chinese. Once home, the group finds their homes abandoned, without power, without internet and without telephone. Eventually, the group finds out that the citizens of their town are being detained in FEMA like concentration camps by the invading military force from Asia. The group eventually decides to fight the foreign occupation and begins attacking and terrorizing them with the hope of regaining their freedom and country.

“Red Dawn”
In the propaganda film entitled “Red Dawn” (2012), (See: Trailer) a group of American youth out partying after a football game, suddenly find themselves in the middle of a major blackout, likely from an EMP attack. After returning home, they awake to find the skies full of invading North Korean military aircraft. The group vacates to a cabin and eventually finds out that their friends are being held in FEMA like prison camps. After debating what to do, the group begins plotting ways to attack and terrorize the occupying North Korean military force with the hope of regaining their freedom and country. The North Korea military strike deals with high ranking Americans and the group of youth known as the “Wolverines” are labeled as terrorists.

Terrorism No Longer Working
To date, there have been at least four Obama terror plots which have been foiled: The Super Bowl XLV nuclear terror plot, the 2012 New Year’s Eve dirty bomb plot, the 2012 Democratic National Convention terror plot, and the foiled Twilight Premier Massacre.  After being caught red-handed on multiple occasions, the Obama Administration and its Zionist controllers were so desperate for fresh new ways to terrorize the American public that in October of 2012, they enlisted the help of New York University. According to reports, NYU students were required to write a 10-15 page paper describing how they would hypothetically attack the United States. According to the class’s syllabus, students “must describe your hypothetical attack and what will happen in the aftermath of the attack,” considering how it’s achieved, funded, manned and responded to. The new terror ideas, whatever they may have been, obviously didn’t work and it appears that the tried and true method of full-scale war is back on the table.

China Planning to Attack U.S. Homeland?
On November 5, 2012, an article entitled “Red Flag Over The Atlantic: China Is Angling To Take Over A U.S. Airbase In The Azores” stated that “Chinese planes could patrol the northern and central portions of the Atlantic and thereby cut air and sea traffic between the U.S. and Europe” and that “China could target the American homeland. Lajes is less than 2,300 miles from New York, shorter than the distance between Pearl Harbor and Los Angeles”. The article concludes that “There are undoubtedly other stopgap solutions that the Pentagon could implement. None of them will be perfect, but all of them would be better than having Beijing’s red flag flying over the Atlantic — and permitting Chinese aircraft to patrol the waters connecting America to Europe”.

New Pearl Harbor: Chinese to Attack Hawaii?
Based on recent military drills and maneuvers, an attack by China on the U.S. island of Hawaii is highly likely. A new Pearl Harbor would destroy a key U.S. foothold in the Pacific as well as remind Americans of when the Japanese attacked Pearl Harbor on December 7, 1941. With state of the art radar and satellites, the Chinese will probably have to blind America electronically with an EMP/cyber-attack prior to an attack, or use unconventional means to transport their troops to Hawaii. On August 13, 2012, it was reported that China launched the “Bahai Sea Green Pearl”, a 36,000-ton ferry and cruise  ship commissioned in August of 2012 at Yantai Port in China’s northeastern Shandong Province. The ship is intended to ferry cars and passengers across the Yellow Sea, but when needed by the People’s Liberation Army, the “Green Pearl” can double as a troop carrier. Visually, the “Green Pearl” looks just like any other civilian cruise ship and could easily be used to secretly transport Chinese troops to Hawaii or the U.S. mainland in a surprise attack. On October 15, 2012, it was reported that one of China’s seven military command groups held a joint military drill involving infantry, artillery and air forces to improve the ability of paratroops to land on and capture an island.

Aircraft Carrier Attack?
If propaganda films like “Battleship” (2012) and “Red Tails” (2012) are any indication, high profile attacks on U.S. warships and aircraft carries may be imminent. On November 22, 2012, it was reported that the U.S. Navy is recalling the USS Dwight D. Eisenhower aircraft carrier back to Naval Station Norfolk, Virginia, for repairs. The USS Dwight D. Eisenhower, named after an American World War II hero, is currently stationed in the Persian Gulf but will be home for Christmas to allegedly “repair its flight deck”. On November 29, 2012, it was reported that the U.S.S. Enterprise, the world’s first nuclear-powered aircraft carrier, will retire after 5 decades of service. As of December 1, 2012, the U.S.S. Enterprise, whose name was made globally famous by the television show Star Trek, will also be stationed at Naval Station Norfolk, Virginia. Come December 21, 2012, both the USS Dwight D. Eisenhower and the USS Enterprise, maybe the two most famous ships in America’s history, will essentially become sitting ducks at Naval Station Norfolk, located just outside Washington D.C. Exactly how and when these ships will be attacked is not known, but they are a prime target or state-sponsored terror.

Pakistani Nuke Attack  
On February 1, 2011, Julian Assange of Wikileaks revealed to the world via leaked classified diplomatic documents that Al-Qaida was on the brink of using a nuclear bomb and that the West was on the verge of a “Nuclear 9/11″. What the diplomatic documents failed to mention was actual target, date and location of the upcoming nuclear terror attack which was previously revealed in The Nuclear Bible as Super Bowl XLV on February 6, 2011, in Dallas, Texas. Pakistan, whether they knew it or not at the time, had been set-up for the nuclear attack as they have been directly linked to every single major terror event including the 1993 World Trade Center Bombing, the USS Cole Bombing, the 9/11 attacks, the 7/7 Bombings in London, the Mumbai terror attacks as well as every major act of nuclear proliferation.

Nuclear Endgame: China
According to Wikipedia, since 1950, both China and Pakistan “have placed considerable importance on the maintenance of an extremely close and supportive relationship” and “each considers the other a close strategic ally”.  Had a nuclear attack transpired on Super Bowl Sunday, it is highly likely that a full scale nuclear war between Pakistan and the United States would have ensued, ultimately drawing China in on the side of Pakistan. During an Oval Office meeting on November 25, 2009, U.S. President Barack Obama was quoted as saying, “We need to make clear to people that the cancer is in Pakistan”. Since the nuclear terror plot was foiled, it appears that the nuclear World War III scenario between the U.S. and China will have to be brought about by unconventional means, namely a surprise attack.

1. RISE OF CHINA

1.1: A Chinese
Coup D’état
On September 11, 2012, the mysterious disappearance of then Chinese Vice-President Xi Jinping made international headlines. Shortly thereafter, Chinese President Hu Jintao was not re-elected as a member of the party’s Central Committee and was forced to step down as Communist Party leader. These timely events eventually cleared the way for now President Xi Jinping, a son of the Communist party whose father was a revolutionary hero. The quick and unprecedented shakeup of China’s leadership has fueled speculation and fears of an internal power struggle over the leadership and direction of Chinese government. A November 9, 2012, report entitled “China’s Hu Jintao Warns Party Of Enemy Within”, echoed those sentiments as outgoing President Hu spoke in front of 2,000 delegates at the opening of the 18th Communist Party Congress in Beijing stating that “Combating corruption and promoting political integrity is a major political issue. If we fail to handle it, it could prove fatal to the party and even cause the collapse of the party and the fall of the state. All those who violate party discipline and state laws, whoever they are and whatever power or official positions they have, must be brought to justice without mercy,” he warned. What direction President Xi Jinping will take China is still unknown, but it appears that World War III is on the horizon.

Potential Chinese Targets:
1. Japan
2. Hawaii
3. Australia
4. Mainland United States (New Orleans, Houston, San Diego, Los Angeles, San Francisco, Seattle)

1.2: U.S. Versus China War Propaganda
War propaganda between the U.S. and China is at an all-time high and escalating. In a May 16, 2012, report entitled “Chinese Official: It’s Us Or America”, quoted Song Xiaojun, a former senior officer of the People’s Liberation Army, who stated that “Australia always has to depend on somebody else, whether it is to be the ‘son’ of the US or ‘son’ of China”, ultimately implying that soon Australia will have to choose sides in an upcoming war between the U.S. and China. On May 18, 2012, it was reported by the Pentagon that China is exploiting Western commercial technology, conducting aggressive cyber espionage and buying more anti-ship missiles as part of a steady military build-up. A month later on June 3, 2012, a report entitled “America Threatens China: Pentagon Prepares For Confrontation In The Asia-Pacific Region” stated that “Having vanquished most all islands of resistance and neutrality in Europe, Africa and the Middle East, the Pentagon is moving its global military machine into the Asia-Pacific for a showdown with China”. A day later on June 4, 2012, it was reported that a newly published book by journalist David Uren had revealed that the Australian government’s 2009 Defence White Paper contained a “secret chapter” that assessed “Australia’s ability to fight an air-sea battle alongside the United States against China”. Two days later on June 6, 2012, it was reported that India declined to participate in a new and aggressive U.S. foreign policy towards Asia entitled ‘Rebalancing of Military Strategy with focus on Asia-Pacific‘ which essentially proposes that at least 60 percent of U.S. Naval assets be deployed in Asia-Pacific to counter China. A few weeks later on June 27, 2012, it was reported that a People’s Liberation Army (PLA) Maj. Gen. Peng Guangqian stated that a future conflict with the United States is coming as a result of U.S. “containment” policies. “The United States has been exhausting all its resources to establish a strategic containment system specifically targeting China,” Gen. Peng said. “The contradictions between China and the United States are structural, not to be changed by any individual, whether it is G.H.W. Bush, G.W. Bush or Barack Obama, it will not make a difference to these contradictions.” A few months later on August 24, 2012, in a report entitled “China Could Penetrate US With New Huge Missile”, it stated that the “Dongfeng-41 (DF-41) intercontinental [nuclear] ballistic missile (ICBM), had been fired in testing last month by the PLA’s Second Artillery Corps” and that “It might be time to sweep the cobwebs out of that old nuclear bunker at the bottom of the garden”.  A month later on September 3, 2012, it was reported that India, after declining an offer from the U.S. to counter China, India has now stepped up military relations and unity with China. On September 21, 2012, in a report entitled “PLA Admiral: China Should Prepare For Conflict With U.S. Over Disputed Islands” it quotes Zhang Zhaozhong, a rear admiral at China’s National Defense University, as stating that, “China has a stronger fighting capability than Japan in a war for the Diaoyu Islands, because China’s coastal areas are close to the islands and the radar and missiles there can cover all the islands.” Zhaozhong then makes it clear what will happen if the U.S. were to become embroiled in the conflict. “The intervention of the U.S. military will change the military strength contrast between China and Japan, so China should prepare for it”, Zhaozhong stated. In an October 8, 2012, report entitled “US: China Bears Malice Towards US”, states that a draft of a report by the U.S. House Intelligence Committee says that China bears malice towards the U.S. and that Chinese corporations pose “a threat to the U.S. national security”.

1.3: Latest Chinese Military Weapons
Complementing the ever growing U.S. versus China war propaganda is unprecedented military growth by China. A quick look at China’s new military might indicates that China is less concerned with self-defense but rather a stab at world dominance. Aside from their latest aircraft carriers, drones and stealth fighters, China boasts the new Type 99 Main battle tank, the HQ-19 missile system which can track up to 100 airborne targets at once, the PGZ-95 anti-aircraft system fires which up to 800 25mm rounds a minute, the Type 22 Houbei Class which is the world’s first attack catamaran, Type 052 destroyers which carry 48 missiles apiece, the Kilo-class submarine which can bring China’s nuclear payload anywhere in the world, and the Dongfeng class of ICBMs can theoretically drop a nuclear missile anywhere in North America.

Latest Chinese Military Advancements:

1. August 13, 2012: China Launches Cruise Ships to Haul Troops and Tanks
2. August 29, 2012: China Deploys Drones to “Conduct Maritime Surveillance”
3. September 17, 2012: China Activates New J-21 Stealth Fighter
4. September 25, 2012: China Unveils First Aircraft Carrier To Enter Service
5. October 16, 2012: China Leads Asia in Military Spending
6. November 1, 2012: China Tests Second Type of Stealth Fighter Prototype
7. November 8, 2012: China Subs to Carry Nuclear Warheads
8. November 9, 2012: China Launches Mystery Space Plane
9. November 10, 2012: China Plans To Launch Manned Spaceship
10. November 18, 2012: China Launches “Disaster-Monitoring Satellite”
11. November 25, 2012: China Lands First Jet on Aircraft Carrier

1.4: Latest Chinese Military Maneuvers  
Based on military maneuvers conducted by both China and the United States in 2012 alone, war between the two nuclear nations is closer than ever. On June 19, 2012, it was reported that China, Iran, Russia and Syria participated in the “largest war game”. Roughly four months later on October 15, 2012, it was reported that one of China’s seven military command groups held a joint military drill involving infantry, artillery and air forces to improve the ability of paratroops to land on and capture an island. On July 30, 2012, it was reported that Chinese naval forces were nearing Europe when their PLAN escort fleet, which included the Type 052 “Qingdao” destroyer, Type 054A “Yantai” missile frigate, and the “Weishanhu” auxiliary oil replenishment ship, crossed the Suez Canal, with Cairo’s permission, on their way to the Mediterranean Sea. On October 23, 2012, it was reported that China had announced a major reshuffle of the PLA with the appointment of a new air force commander and a new head to its General Political Department, which is responsible for army morale, personnel changes and loyalty to the Communist party. On October 24, 2012, it was reported that China has appointed a new army chief of staff and other top officers amid efforts to “further professionalize the world’s largest standing military”. On November 8, 2012, it was reported in a 2012 report by the U.S. Congress that China appears to be within two years of deploying submarine-launched nuclear weapons, but that China remains “the most threatening” in cyberspace. On November 21, 2012, it was reported that China’s military held holding naval exercises near Japan and closed off an area near the nuclear submarine base at Huludao, where China builds its Type 094 ballistic-missile submarines.

1.5: Anti-Chinese U.S. Military Maneuvers
Based on military maneuvers conducted by both China and the United States in 2012 alone, war between the two nuclear nations is closer than ever. On May 11, 2012, the U.S. Navy successfully tested a new anti-ballistic missile over the Pacific. The next month on June 12, 2012, commander of the U.S. Pacific Fleet Admiral Cecil Haney stated that the Navy will be sending its most advanced vessels and aircraft to the Asia-Pacific region. A couple weeks later on June 21, 2012, it was reported that the U.S, Japan and South Korea began joint naval exercises in waters near China. Two days after that on June 23, 2012, it was reported that the U.S. is now rebuilding and refurbishing former military bases in the Asia-Pacific region. Four days later on June 27, 2012, it was reported that the U.S. had tested yet another medium-range, separating ballistic missile off the coast of Hawaii. Three days after that on June 30, 2012, it was reported that a group of Russia’s Pacific Fleet warships arrived at the U.S. Pearl Harbor naval base to take part in the Rim of the Pacific international drills. A week later on July 8, 2012, it was reported that B-1 bombers are being transferred from Afghanistan to the Asia-Pacific region. “The B-1′s capabilities are particularly well-suited to the vast distances and unique challenges of the Pacific region, and we’ll continue to invest in, and rely on, the B-1 in support of the focus on the Pacific” stated Major General Michael Holmes, assistant deputy chief of staff for Air Force Operations. A month later on August 1, 2012, it was reported that Pentagon planners are considering adding bombers and attack submarines to the Pacific fleet as part of a growing U.S. focus on security challenges in the Asia-Pacific, namely China. On October 3, 2012, it was reported that U.S. Stryker Brigade spent the past month training in Hawaii conducting hand-grenade qualification, assault tactics with a focus on platoon-level training. On October 26, 2012, it was reported that the U.S. military had intercepted four out of five targets over the Pacific Ocean in the largest and most complex test of the nation’s ballistic missile defense system.

1.6: U.S. & Chinese Diplomatic Tensions
Diplomatic tensions between the U.S. and China are currently at unprecedented levels. A crisis of any kind could theoretically draw both sides into a violent and bloody conflict. On June 2, 2012, it was reported that a Chinese security official at the Ministry of State Security, China’s main intelligence agency, has been arrested on suspicion of spying for the U.S. after allegedly passing along information to the U.S. regarding China’s espionage activities. A month later on July 6, 2012, it was reported that a Pentagon Contractor was caught illegally selling military technology to China. Six days later on July 12, 2012, it was reported that the FBI had opened a criminal investigation targeting a leading Chinese telecommunications firm that allegedly conspired to illegally ship hardware and software purchased from U.S. tech firms to Iran’s government-controlled telecom company, a violation of several federal laws and a trade embargo imposed on the outlaw Islamic nation. That same day, July 12, 2012, it was also reported that the Chinese government has begun cracking down on GM (General Motors) car manufacturing and sales in China. A few months later on September 4, 2012, it was reported that two Chinese men were detained over an attack on the Japanese ambassador’s car in Beijing. The U.S. has been a long-time ally of Japan, especially in the escalating feud with China over the Senkaku Island. On September 5, 2012, a report entitled “Territorial Tensions Ripple As Clinton Visits Beijing” stated that tensions over territorial disputes have spiked this year between China and Japan and that “the United States has been drawn into the fray.” A month later on October 20, 2012, a report entitled “US Risks Drawing Beijing’s Ire With Military Cruise In Disputed Waters” stated that a U.S. aircraft carrier group cruised through the disputed South China Sea in “a show of American power in waters that are fast becoming a focal point of Washington’s strategic rivalry with Beijing”. On October 25, 2012, it was reported that China rejected sanctions and the use of force against Iran over its nuclear energy program, a direct slap in the face of both the U.S. and Israel. That same day, October 25, 2012, the Chinese government blocked access to the English-language and Chinese-language Web sites of The New York Times from computers in mainland China in response to an article in both languages describing wealth accumulated by the family of the country’s prime minister.

1.7: The Senkaku Islands Dispute
The Senkaku Islands dispute appears to be the powder keg which will eventually ignite the Chinese war machine to attack Japan, Hawaii, mainland United States and potentially even Australia. On September 21, 2012, in a report entitled “PLA Admiral: China Should Prepare For Conflict With U.S. Over Disputed Islands” it quotes Zhang Zhaozhong, a rear admiral at China’s National Defense University, as stating that, “China has a stronger fighting capability than Japan in a war for the Diaoyu Islands, because China’s coastal areas are close to the islands and the radar and missiles there can cover all the islands.” Zhaozhong then makes it clear what will happen if the U.S. were to become embroiled in the conflict. “The intervention of the U.S. military will change the military strength contrast between China and Japan, so China should prepare for it”, Zhaozhong stated. According to Wikipedia, the Senkaku Islands dispute concerns a territorial dispute over a group of uninhabited islands known as the Senkaku Islands in Japan and as the Diaoyu (in China) or Tiaoyutai Islands (in Taiwan). Aside from a 1945 to 1972 period of administration by the United States, the archipelago has been controlled by Japan since 1895.The People’s Republic of China (PRC) disputed the proposed US handover of authority to Japan in 1971and has asserted its claims to the islands since that time.The Republic of China (Taiwan) also claims the islands. The territory is close to key shipping lanes, rich fishing grounds, and there may be oil reserves in the area. Although the United States does not have an official position on the merits of the competing sovereignty claims,the islands are included within the U.S. Japan Security Treaty meaning that a defense of the islands by Japan may compel support from the United States military. In September 2012, the Japanese government purchased the remaining three of the disputed islands that it did not already own from their private owner, prompting large-scale protests in China.

1.8: Escalating War of Words

Historically speaking, prior to any bloody international conflicts, there is usually a verbal sparring of words from both sides prior to any act of war. The situation between the U.S. and China is no different and the rhetoric is getting more heated with each passing day. On May 25, 2012, the People’s Republic of China published a scathing report entitled, “The Human Rights Record of the United States in 2011” and released it via their  Chinese consulate in New York City. In the report, China is very critical of U.S. gun ownership laws: “The United States prioritizes the right to keep and bear arms over the protection of citizens’ lives and personal security and exercises lax firearm possession control, causing rampant gun ownership,” the report claims. On June 5, 2012, it was reported that China told foreign embassies to stop publishing their own reports on air quality in the country, escalating its objections to a popular U.S. Embassy Twitter feed that tracks pollution in smoggy Beijing. On June 25, 2012, a report entitled “Dogs Destined For The Table: Horrific Images Show Animals Being Killed, Cooked And Served Up As A Meal In Chinese Tradition” was published as part of an obvious  and growing propaganda campaign to demonize China and foment hatred prior to a military engagement against the country. On July 12, 2012, it was reported that U.S. Senate Majority Leader Harry Reid slammed the U.S. Olympic Committee over reports that the Team USA uniforms were made in China, saying officials “should burn” them. On August 6, 2012, it was reported that China blasted the U.S. for its recent public criticism and urging of diplomacy to address territorial disputes in the South China Sea, saying the U.S. statement shows “total disregard for the facts” and sends “a seriously wrong message“. On September 3, 2012, it was reported that some 8000 people chanted “No to brainwashing education. Withdraw national education” in an effort to denounce the Hong Kong government-funded booklet entitled “The China Model” they say glorifies China’s single Communist party rule while glossing over more brutal aspects of its rule and political controversies. On October 16, 2012, the Pew Global Attitudes Project released a report which allegedly found that people in China are increasingly worried about corruption, inequality, food safety, and that about half of Chinese like American ideas about democracy. On November 2, 2012, it was reported that China plans to launch a national voluntary organ donation system early next year in a bid to fulfill growing transplant lists and phase out its long-criticized reliance on organs from executed prisoners. The report essentially confirms that China is indeed still harvesting human organs illegally and that although they have plans to change, they still are engaged in potentially the most inhumane and brutal practices known to mankind.

1.9: Chinese Terrorism on the Rise
In an apparent move to menace the West with a new breed of terrorist as well as quell dissent at home once offensive Chinese military operations begin, China is suddenly dealing with an outbreak of homegrown Islamic terrorism. On June 30, 2012, it was reported that passengers and crew members thwarted a 9/11 style hijack attempt to overtake a plane in the western Chinese province of Xinjiang. According to the report, six Chinese terrorists posing as passengers tried to take control of the plane “through violence”. The passengers and crew members managed to subdue the Chinese hijackers, sustaining minor injuries in the struggle. On October 29, 2012, it was reported that Chinese Muslim separatists from the northwest region of Xinjiang were battling Syrian government forces alongside al-Qaida and other extremist groups. The report, citing unidentified Chinese anti-terrorism authorities, states that the groups were funding their activities through drug and gun trafficking, kidnapping and robbery, and providing training for “separatists, criminals and terrorists” who had fled Xinjiang. “After receiving orders from al-Qaida, terrorists from China came to Syria to meet with jihadists already on the ground before forming groups on the front lines,” the report quoted an unidentified official as saying. On October 9, 2012, it was reported that two flights out of Tibet and southern Jiangxi bound for Beijing were grounded on after China’s national carrier, Air China, received terror “threat calls” from unidentified sources, prompting a tightening of security in many airports across the country.

1.10: Chinese Dalai Lama Assassination Plot 
On May 12, 2012, it was reported that the Dalai Lama, a 76-year-old Nobel Peace Prize winner, revealed he was the intended target in a Chinese assassination plot. Lama stated that he had been passed reports from inside Tibet warning that Chinese agents had trained Tibetan women for a mission to poison him while posing as devotees seeking his blessings. The Dalai Lama is a darling of the West, especially the United States and the European Union, so any suspected plot to attack on the world-famous Buddhist monk paints China as an aggressive and brutal regime.

1.11: China Eclipses U.S. as Super-Power
A November 9, 2012, report entitled “China’s Economy To Overtake US In Next Four Years”, states that “The Paris-based Organisation for Economic Co-operation and Development (OECD) says that China’s economy will be larger than the combined economies of the eurozone countries by the end of this year, and will overtake the US by the end of 2016.” On November 21, 2012, it was reported that China is planning to build the tallest skyscraper in the world standing at 2,749ft (838m) high, over 220 floors, and it will only take them 90 days, an obvious slap in the face of America who has yet to finish the “Freedom Tower” which has been under construction since April 27, 2006. On November 29, 2012, a new report by Ernst & Young was published stating that the Chinese film market, the second biggest in the world, will surpass the U.S. by 2020.

1.12: 45 Signs That China Is Colonizing America
On May 23, 2012, a report entitled “45 Signs That China Is Colonizing America” was released. The report albeit true, is intended to make Americans feel insecure about themselves as a nation and as a people, as well as scapegoat China for their current financial situation as opposed to the Zionist who are running America into the ground.

1. It was recently announced that China’s Dalian Wanda Group has bought U.S. movie theater chain AMC Entertainment for a whopping 2.6 billion dollars.  This deal represents China’s biggest corporate takeover of a U.S. firm ever.
2. Earlier this month, the Federal Reserve announced that it has given approval for banks owned by the Chinese government to buy stakes in U.S.-owned banks.
3. A few days ago Reuters reported that China is now able to completely bypass Wall Street and purchase U.S. debt directly from the U.S. Treasury Department.
4. A recent investigation by the U.S. Senate Committee on Armed Services found more than one million counterfeit Chinese parts in the Department of Defense supply chain.  How in the world could we be so stupid?
5. After being bailed out by U.S. taxpayers, General Motors is currently involved in 11 joint ventures with companies owned by the Chinese government.  The price for entering into many of these “joint ventures” was a transfer of “state of the art technology” from General Motors to the communist Chinese.
6. A Chinese company known as “Sino-Michigan Properties LLC” has purchased 200 acres of land near the town of Milan, Michigan.  The goal is to build a “China City” with artificial lakes, a Chinese cultural center and hundreds of housing units for Chinese citizens.
7. As I reported on recently, corporations controlled by the Chinese government have been rapidly buying up U.S. oil and gas deposits worth billions of dollars.
8. Chinese investors have been gobbling up real estate all over New York City.  The following is from a recent Forbes article….“According to a recent report in the New York Times, investors from China are “snapping up luxury apartments” and are planning to spend hundreds of millions of dollars on commercial and residential projects like Atlantic Yards in Brooklyn. Chinese companies also have signed major leases at the Empire State Building and at 1 World Trade Center, the report said.”
9. The Chinese are also doing huge real estate deals in cities in the middle part of the country.  The following example is from an article in the Toledo Blade…“Dashing Pacific Group Ltd., which has already purchased the nearby Docks restaurant complex for $2.15 million, put its $3.8 million offer to buy the southern 69 acres at the Marina District in East Toledo back on the table for approval by Toledo City Council. Additionally, Dashing Pacific Chairman Yuan Xiaohong, in a letter signed in Hangzhou, said the firm wants a two-year option to buy the decommissioned Toledo Edison power plant property on the site.”
10. According to ABC News, major road and bridge projects all over the United States are being built by Chinese companies.  Meanwhile, there are millions upon millions of blue collar American workers that cannot find jobs.  The following is a brief excerpt from a recent ABC News article….”In New York there is a $400 million renovation project on the Alexander Hamilton Bridge…In California, there is a $7.2 billion project to rebuild the Bay Bridge connecting San Francisco and Oakland…In Alaska, there is a proposal for a $190 million bridge project…These projects sound like steps in the right direction, but much of the work is going to Chinese government-owned firms…”When we subsidize jobs in China, we’re not creating any wealth in the United States,” said Scott Paul, executive director for the Alliance for American Manufacturing.
11. The new World Trade Center tower is going to include glass that has been imported from China.
12. The new Martin Luther King memorial on the National Mall was made in China.
13. Check out this incredible photo which contrasts the decline of Detroit over the years with the amazing rise of Shanghai, China.
14. A couple of years ago, a large Chinese company was considering building “a 10,000- to 30,000-acre technology zone for industry, retail centers and homes” just south of Boise, Idaho.
15. Our trade deficit with China in 2011 was $295.5 billion.  That was the largest trade deficit that one country has had with another country in the history of the planet.
16. In 2011, our trade deficit with China was 28 times larger than it was back in 1990 and more than 49,000 times larger than it was back in 1985.
17. Back in 1998, the United States had 25 percent of the world’s high-tech export market and China had just 10 percent. Today, China’s high-tech exports are more than twice the size of U.S. high-tech exports.
18. America has lost more than a quarter of all of its high-tech manufacturing jobs over the past ten years.
19. According to the Economic Policy Institute, America is losing half a million jobs to China every single year.
20. The U.S. spends about 4 dollars on goods and services from China for every one dollar that China spends on goods and services from the United States.  Does that sound like “fair trade” to you?
21. While we allow Chinese goods to freely flood our shores, China just keeps slapping new tariffs on American-made goods.  According to the New York Times, a Jeep Grand Cherokee that costs $27,490 in the United States costs about $85,000 in China thanks to all the tariffs.
22. According to U.S. Representative Betty Sutton, an average of 23 manufacturing facilities a day closed down in the United States during 2010.
23. The United States has lost an average of approximately 50,000 manufacturing jobs a month and more than 56,000 manufacturing facilities in the United States have been shut down since China joined the World Trade Organization in 2001.
24. The United States has lost a staggering 32 percent of its manufacturing jobs since the year 2000.
25. Between December 2000 and December 2010, 38 percent of the manufacturing jobs in Ohio were lost, 42 percent of the manufacturing jobs in North Carolina were lost and 48 percent of the manufacturing jobs in Michigan were lost.
26. In 2010, China produced more than twice as many automobiles as the United States did.
27. In 2010, China produced 627 million metric tons of steel.  The United States only produced 80 million metric tons of steel.
28. In 2010, China produced 7.3 million metric tons of cotton.  The United States only produced 3.4 million metric tons of cotton.
29. Today, China produces nearly twice as much beer as the United States does.
30. 85 percent of all artificial Christmas trees are made in China.
31. China is now the number one producer of wind and solar power on the entire globe.
32. Chinese solar panel production was about 50 times larger in 2010 than it was in 2005.
33. Right now, China is producing more than three times as much coal as the United States does.
34. China is now the number one supplier of components that are critical to the operation of U.S. defense systems.
35. According to author Clyde Prestowitz, China’s number one export to the U.S. is computer equipment.  According to an article in U.S. News & World Report, during 2010 the number one U.S. export to China was “scrap and trash”.
36. According to Professor Alan Blinder of Princeton University, 40 million more U.S. jobs could be sent offshore over the next two decades.
37. The United States had been the leading consumer of energy on the globe for about 100 years, but during the summer of 2010 China took over the number one spot.
38. 15 years ago, China was 14th in the world in published scientific research articles.  But now, China is expected to pass the United States and become number one very shortly.
39. China now awards more doctoral degrees in engineering each year than the United States does.
40. China now possesses the fastest supercomputer on the entire planet.
41. China now has the world’s fastest train and the world’s most extensive high-speed rail network.
42. The Chinese economy has grown 7 times faster than the U.S. economy has over the past decade.
43. The Chinese economy is projected to be larger than the U.S. economy by 2016.
44. One economist is projecting that the Chinese economy will be three times larger than the U.S. economy by the year 2040.
45. China now holds approximately 1.17 trillion dollars of U.S. government debt.  If you were alive back when Jesus was born and you had spent a million dollars every single day since then, you still would not have spent that much money by now.

2. CHINA & EMP WARFARE

2.1: China’s EMP Quest
A January 8, 2011, article entitled “China’s Quest For Dominance In Electro-Magnetic Warfare” stated that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Adm. Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the U.S. propaganda is to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in any future conflict. Aside from China, the U.S. has also publically accused  North Korea of also developing EMP weapons. If and when an EMP terror attack strikes America, there is a high probability that China will ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

2.2: What is an EMP?
An electromagnetic pulse (EMP) is a burst of electromagnetic radiation which usually results from a high energy nuclear explosion that suddenly fluctuates the magnetic field. Theoretically, an EMP could wipe out everything electronic (planes, trains, cars, computers, internet, etc.) in a flash. EMP terror has gained popularity of late and has been featured in movies such as “The Matrix” and television shows such as “24” and the #1 show on NBC entitled “Revolution”, which eerily features a post-EMP America with no electricity. Aside from the Hollywood EMP propaganda, there has been recent EMP terror legislation by the U.S. congress, a number of EMP terror conferences, and EMP terror scholarly whitepapers which have all been preparing local, state and federal officials for an upcoming EMP terror attack on America. Based on the 12 major power outages in 2012 alone, it appears that the U.S. government is programming the public for the permanent loss of electricity. Coincidentally, in September of 2012, Alex Jones of Infowars released a new magazine which indicates that the STRATFOR intelligence operation known as Infowars knows that the internet is about to expire and have planned ahead by launching a new propaganda magazine.

2.3: Chinese “Mystery Missile” EMP Attack?
On November 10, 2010, it was reported that a satellite monitoring the western coastal regions of North America detected an “EMP anomalous event” which occurred on November 8, 2010, when a Chinese sub allegedly fired an EMP weapon. According to the report, the Chinese Navy fired an EMP missile on the U.S. based cruise ship “Carnival Splendor resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that same day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. The U.S. government denied that they were responsible for the missile, but a Russian report stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a US Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the Chinese attacked the “Carnival Splendor” with an EMP weapon and the U.S. sent up a random missile to distract the world from it.

2.4: EMP Terror Drills
To date, there have been only a handful of EMP terror drills, but a recent massive and unprecedented “nuclear terror drill” in Russia has drawn red flags for a number of different reason. First off, the nuclear terror scenario was highly exposed and ultimately foiled in 2011, so chances of another staged nuclear terror plot in 2012 is virtually non-existent. Therefore, the gathering of 58 nations to deal with “a simulated aftermath of a nuclear terrorism attack” is absurd, especially considering that the fallout of a nuclear terror attack would not directly affect 58 nations. It is far more likely that the 58 nations were drilling for the simulated aftermath of an EMP nuclear terror attack because the permanent loss of electricity in one nation would directly affect business, communication, energy media, travel, and a host of other electrical dependent sectors in other nations as well.

2.5: EMP Terror & Planes
On April 1, 2009, it was reported that counterterrorism analysts warned that EMP weapons capable of frying the electronics in civil airliners could be built using information and components available on the net. According to the report, all it would take to bring a plane down would be “a single but highly energetic microwave radio pulse blasted from a device inside a plane, or on the ground and trained at an aircraft coming in to land”. The same exact scenario of planes dropping like flies from the sky originally depicted by counterterrorism analysts in 2009 came to fruition in 2012 and is featured in the EMP terror television show entitled “Revolution”. Interestingly, in October of 2012, American Airlines has pulled 47 planes due to malfunctioning seats and 17 flights were diverted from Manila’s international airport due to an alleged air traffic equipment “glitch”. What role these 64 planes will play in the wake of a cyber-terror attack is unknown, but there is a real possibility that these planes have been remotely “programmed” to lose all power and drop to earth on a future date.

2.6: EMP Terror & Cars
One of the entities which will likely be affected by an EMP terror attack is cars and trucks. In 2012 alone, tens of millions of American cars have been recalled for suspicious reasons. Whether or not these cars, most of which have onboard computers, where uploaded with a virus or computer program to electrically debilitate the vehicle at a future date or by remote control is not known, but the large amount of recalls (partial list below) by almost every single motor company in the world is highly suspicious. The scenario of cars suddenly losing power and becoming useless is a main theme in the #1 show on NBC entitled “Revolution”, which eerily features a post-EMP America with no electricity and no working cars.

Recent Factory Recalls:

1. February 10, 2010: Toyota Vehicle Recall (2.3 Million)
2. May 19, 2010: Nissan Vehicle Recall (48,700)
3. June 30, 2011: Nissan Vehicle Recall (35,000)
4. July 14, 2011: Dodge Vehicle Recall (242,780)
5. December 31, 2011: GMC Vehicle Recall (4,296)
6. June 22, 2012: GMC Vehicle Recall (400,000)
7. July 19, 2012: Ford Vehicle Recall (11,500)
8. July 26, 2012: Ford Vehicle Recall (484,600)
9. July 30, 2012: Hyundai Vehicle Recall (221,631)
10. August 11, 2012: GMC Police Car Recall (38,000)
11. August 18, 2012: GMC & Isuzu Recall (258,000)
12. September 17, 2012: Ford Vehicle Recall (5,500)
13. September 13, 2012: Nissan Vehicle Recall (50,000)
14. September 21, 2012: GMC Vehicle Recall (426,000)
15. October 1, 2012: Honda Vehicle Recall (625,762)
16. October 1, 2012: GMC Vehicle Recall (40,859)
17. October 7, 2012: Honda Vehicle Recall (1.71 Million)
18. October 8, 2012: Dodge Vehicle Recall (44,300)
19. October 10, 2012: Toyota Vehicle Recall (7.43 Million)
20. October 17, 2012: Ford Vehicle Recall (262,000)
21. October 22, 2012: Nissan Vehicle Recall (13,919)
22. October 25, 2012: BMW Vehicle Recall (7,485)
23. October 28, 2012: BMW Vehicle Recall (45,500)
24. October 30, 2012: Nissan Vehicle Recall (11,000)
25. November 8, 2012: Jaguar Vehicle Recall (4,195)
26. November 9, 2012: Chrysler Vehicle Recall (919,000)
27. November 11, 2012: Jeep Vehicle Recalls (775,000)
28. November 12, 2012: Scion Vehicle Recall (11,200)
29. November 14, 2012: Toyota Vehicle Recall (2.77 Million)
30. November 14, 2012: GMC Vehicle Recall (2,949)
31. November 14, 2012: Cadillac Vehicle Recall (12,626)
32. November 15, 2012: Honda Generator Recall (150,600)
33. November 19, 2012: Honda Motorcycle Recall (11,500)
34. November 20, 2012: Volkswagen Vehicle Recall (2,471)
35. November 20, 2012: Mercedes-Benz Vehicle Recall (23)
36. November 21, 2012: Toyota Vehicle Recall (150,000)
37. November 29, 2012: Honda Vehicle Recall (157)

3. CHINA & CYBER TERROR

3.1: China & Cyber Terror
The nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. Based on news and events surrounding, China more than any other nation is sure to be scapegoated in the aftermath of cyber-terror attacks against the United States. On October 5, 2011, U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign and cybercrime against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two US satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyberespionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta, has publically stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to tamp down aggressive Chinese cyber-attacks against American companies and the government.  October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.

3.2: Cyber-Terror Attacks
Since 2011, there have been an epidemic of “cyber-attacks” targeting high-profile government entities such as the Vatican, United Nations, Interpol, NASA, Scotland Yard, FBI, DHS, CIA and the U.S. Federal Trade Commission. Less publicized however have been the cyber-attacks on critical infrastructure such as water plants, nuclear power plants, oil refineries and banks. These alleged cyber-attacks, whether real or not, give the perception that any entity with an internet connection is vulnerable to a future cyber-attack.

3.3: Cyber Terror Drills
Both the Israeli and U.S. government, namely the CIA and the U.S. Department of Homeland Security, have been drilling cyber-terror attacks on a routine basis. Past cyber-terror drills range in duration and targets, generally focus on the financial and infrastructure targets. According to reports, authorities have expressed concerns about terrorists combining physical attacks such as bombings with hacker attacks to disrupt rescue efforts, known as hybrid or “swarming” attacks.”

3.4: Cyber-Terror Hotline
Just as the United States and the Soviet Union had a nuclear hotline to avoid potential nuclear misunderstandings during the Cold War, a new “cyber-war hotline” is being speculated about in order to avoid future misunderstandings in the wake of major cyber-terror attacks. Security expert Bruce Schneier stated that a hotline between the world’s cyber commands would “at least allow governments to talk to each other, rather than guess where an attack came from.” On October 4, 2012, it was reported that Britain has begun tentative talks with China and Russia about setting up a hotline to help prevent cyber-emergencies from spiraling out of control. “At the moment, we don’t really have sufficient information-sharing arrangements with some countries such as China and the Chinese computer emergency response team,” said a senior Foreign Office official.

3.5: Cyber-Terror Plots & Patsies
Since April of 2011, there has been at least 25 major cases in which individuals or groups were charged with committing acts hacking or cyber-terror, while in China, police allegedly arrested 10,000 people in an unprecedented cyber-terror sweep. In most of the cases, finance or bank related hacking or cyber-terror was the motive although major corporate, energy or government institutions such AT&T, Blackberry, British National Party CIA, English Defence League, Facebook, Federal Reserve Bank, NATO, NHI, Nintendo, Sega and Symantec have also been allegedly targeted.

3.6: Cyber-Terror Security Takeover
Under the guise of “cyber security”, the U.S. government has spent billions of dollars mapping and federalizing cyberspace and cyber security throughout America. According to the 2009 CRS Report for Congress entitled “Comprehensive National Cybersecurity Initiative”, the sudden change in policy is to ensure that “U.S. Government cyber security initiatives are appropriately integrated, resourced and coordinated with Congress and the private sector“. This changes essentially ensures that the private sectors of the economy (banks, gas, oil, power, stock markets, etc.) are under the cyber thumb of the U.S. government so that they can be targeted, hijacked and ultimately destroyed in a future cyber terror attack.

3.7: Cyber-Terror Target: Airplanes
According to recent cyber-terror propaganda, drones and planes can be remotely hijacked and then used as weapons, similarly to what happened on September 11, 2001. On June 25, 2012, it was reported that with the right equipment, anyone could take control of a GPS-guided drone and easily turn it into a weapon. Professor Todd Humphreys of the University of Texas at Austin stated that “Each one of these [drones] could be a potential missile used against us.” A month later on July 27, 2012, it was reported that air traffic control software which is used around the world could be exploited by hackers to unleash squadrons of ghost planes. Interestingly, in October of 2012, American Airlines has pulled 47 planes due to malfunctioning seats and 17 flights were diverted from Manila’s international airport due to an alleged air traffic equipment “glitch”. What role these 64 planes will play in the wake of a cyber-terror attack is unknown, but there is a real possibility that these planes have been remotely “programmed” to lose all power at a future date.

3.8: Cyber-Terror Target: Nuclear Reactors
On December 13, 2011, it was reported that U.S. officials were investigating whether Iranian and Venezuelan diplomats in Mexico were involved in planned cyber-attacks against U.S. targets, including nuclear power plants. There have also been approximately 45 nuclear reactor “emergencies”, “closures”, “leaks” and other major incidents clearly setting the stage for nuclear reactor terror on an unimaginable scale. Complementing the unprecedented nuclear reactor emergencies are multiple cases of “terrorists” attempting to breach nuclear reactors, repeated lapses in nuclear reactor security, as well as countless propaganda articles indicating that a Fukushima-level event inside the United States is a foregone conclusion.

3.9: Cyber-Terror Target: Prisons
Since September of 2012, there have been 4 major prison breaks in Iraq Libya Mexico and the U.S. which untimely indicates that more major prison breaks are imminent. On November 10, 2011, it was reported that officials with the Federal Bureau of Prisons have been informed that U.S. penitentiaries could be vulnerable to cyber-terror attacks that would help prisoners escape. According to the report, most American prisons are operated by industrial control systems (ICS) that also are used by power plants, water treatment facilities and other infrastructure operations. ICS’ vulnerability was demonstrated two years in Iran, when hackers sabotaged that country’s nuclear program by exploiting its Siemens programmable logic controllers (PLCs). Almost all of the 117 federal correctional facilities, 1,700 prisons and 3,000 jails in the United States use PLCs to control doors and manage their security systems. Coincidentally, on October 2, 2012, it was reported that the Obama administration plans to buy an Illinois prison which end up being the prison facility that suffers a cyber-terror prison break.

3.10: Cyber-Terror Target: Subways & Trains
On December 29, 2011, it was reported that Professor Stefan Katzenbeisser of Technische Universität Darmstadt had told a security conference in Berlin that new train system was vulnerable to hackers and “Denial of Service”. Future cyber-terror attacks could rhetorically target train switching systems, which enable trains to be guided from one track to another at a railway junction. Although these switching systems have historically been separate from the online world, this is no longer the case.  The Israeli cyber-terror worm entitled the “Duqu virus”, has already wreaked havoc worldwide and could be used to target trains in the U.S. and Europe. Based on recent and inexplicable train crashes, this virus may already be attacking trains worldwide. Acting as a Trojan horse, the Duqu virus has the ability to essentially hijack its victim and then allow for the remote control of whatever entity is hijacked. If the Duqu virus hijacked a train, it could theoretically control train acceleration, braking and track switching.

3.11: Cyber-Terror Target: U.S. Stock Markets
Based on unprecedented financial cyber-terror propaganda and the recent rash of suspects and patsies arrested for financial cyber-terror and financial related crimes, financial cyber-terror is blinking red on every level. An April 24, 2012, report stated that Osama bin Laden was looking for a follow-up terror attack to  doom the American economy, so there is a real possibility that cyber terror attack targeting U.S. banks and Wall Street could hijack trillions of dollars ultimately dooming the American economy. To date, individuals have been arrested for cyber-terror related crimes such as credit and debit card PIN theft, the theft of proprietary software code from the Federal Reserve Bank of New York, the illegal reproduction and distribution of more than 100 copyrighted commercial and financial business software programs, the malware SpyEye used to steal and use personal banking and credit card data from unsuspecting victims’ online accounts, and the former head of fraud and security for digital banking at Lloyds Bank has admitted to committing £2.5 million fraud. Essentially, everything needed to commit the greatest bank heist ever is conveniently in place. Coincidentally, governments around the world have been executing financial cyber-terror drills in which hackers hijack trillions of dollars with no trace.

3.12: Military Computer Thefts
Since 2006, thousands of military laptops have been stolen in the United States and the United Kingdom. Why these thefts are being allowed to occur is not yet clear, but it plays nicely into the narrative of impending cyber-terror attacks. These laptops will have likely made it onto the black market and into the waiting hands of “terrorists” who will allegedly launch cyber-terror attacks against the U.S. and U.K. militaries and governments.

3:13: U.S. & Israeli Sponsored Cyber Terror
When massive cyber-terror attack begins to occur, the prime suspects should be the U.S. and Israeli governments who openly brag about their offensive cyber-attack capabilities.  According to Wikipedia, the Joint Functional Component Command – Network Warfare team (JFCCNW) is “responsible for coordinating offensive computer network operations for the United States Department of Defense” and that the JFCCNW is “the world’s most formidable hacker posse: a super-secret, multimillion-dollar weapons program that may be ready to launch bloodless cyber-war against enemy networks”. Aside from being implemented in both the “Stuxnet” virus and the “Duqu” virus, the Israeli government allegedly ranks  #1 in cyber terrorism.

4. CHINA & SPACE TERROR

4.1: China & Space Warfare
China has been directly implicated in cyber-attacks on NASA, U.S. satellites and the international Space Station. Should future space terror strike America, there is little doubt that China will scapegoated for the attacks.  On October 28, 2011, it was reported that Chinese hackers may have interfered with two US satellites on four separate occasions. On March 1, 2012, it was reported that a laptop stolen from NASA last year was unencrypted and contained command and control codes for the International Space Station on it. The particular laptop in question was one of 48 NASA notebooks or mobile devices stolen between April 2009 and April 2011. Although China has not been directly implicated in the thefts, based on their cyber related crimes against NASA, they are the top suspect. On March 7, 2012, it was reported that Chinese hackers had gained ‘full access’ to the computer network in one of NASA’s key control centers, the Jet Propulsion Laboratory (JPL). The JPL manages 23 spacecraft on active space missions, including missions to Jupiter, Mars and Saturn. On May 3, 2012, it was reported that a new hacking group calling itself “The Unknowns” had published a list of passwords and documents reportedly belonging to NASA, the European Space Agency and the U.S. Air Force, among other high-profile government targets. Although China has not been implicated in the “Unknown” attacks, based on their cyber related crimes against NASA, they are again the top suspect.

4.2: Space Terror Imminent
The threat of space terror, whether natural or man-made, is now imminent. Based on the sudden increase in cases of falling space debris  and the approximately 30 incidents where satellites or man-made spacecraft suddenly and unexpectedly reentered the earth’s atmosphere, the potential for space terror is at an all-time high. Complementing the rash of falling space objects is a plethora of space terror propaganda and space debris propaganda which openly states that the chance that earth will be attacked by asteroids, comets, meteoroids, falling satellites,  solar explosion, space junk and ‘solar flare’ storms is real and increasing by the day. So perilous is the situation, that Federal Emergency Management Agency (FEMA) released a falling satellite memo and a “First Responder Guide For Space Object Re-Entry” which instructs first responders on the dangers and procedures of satellite re-entry response. FEMA’s memos are also supported by a number of different scholarly whitepapers which also address the inherent dangers of falling satellite space terror.

4.3: Satellite & Space Station Cyber Terror
Recent space cyber-terror propaganda states that the international space station and satellites may be targeted for cyber-terror in the near future. On October 28, 2011, it was reported that Chinese hackers may have interfered with two US satellites on four separate occasions in 2007 and 2008. According to the report, the Chinese hackers had enough access to take complete control of one of the satellites but chose not to do.  Then on May 17, 2011, it was reported that a Romanian hacker claimed to have breached a computer server at NASA’s Goddard Space Flight Center and gained access to confidential satellite data. Roughly a year later on March 1, 2012, it was reported that in testimony before a House Science, Space and Technology subcommittee, NASA Inspector General Paul Martin said the notebook computer stolen in March 2011 “resulted in the loss of the algorithms” used to control the space station. This particular laptop, Martin said, was one of 48 NASA notebooks or mobile devices stolen between April 2009 and April 2011. A week later on March 7, 2012, it was reported that Chinese hackers gained ‘full access’ to the computer network in one of NASA’s key control centres, the Jet Propulsion Laboratory (JPL) which manages 23 spacecraft conducting active space missions, including missions to Jupiter, Mars and Saturn. Operating from an internet address in China, the hackers gained full system access allowing them to upload hacking tools to steal user IDs and control NASA systems, as well as copy sensitive files. Should U.S. satellites or spacecraft begin a free-fall to planet earth, China will certainly be scapegoated.

4.4: SpaceX Program
A mysterious new program entitled SpaceX has been launched just as the Chinese space cyber-terror rhetoric and propaganda is at an all-time high. What exactly SpaceX does is unknown, but since its launch it has already drawn red flags for a number of different reasons. When it was first launched, SpaceX was allegedly was allegedly sent into the wrong orbit because of a booster problem during launch. Secondly, SpaceX is actively engaging the international space station which is interesting considering SpaceX is a “private” company which is fully engaging the public international space station without any apparent public consent or permission. Thirdly, once in orbit, the communications satellite flying piggyback aboard a SpaceX’s Falcon 9 rocket allegedly fell out of orbit and burned up in the atmosphere following a problem during liftoff. While all the aforementioned anomalies surrounding SpaceX may in fact be real and harmless, it appears that SpaceX is the private space program set-up to destroy the international space station and numerous satellites in the wake of an alleged Chinese based cyber-terror or EMP terror attack.

5. U.S. LANDMARKS SLATED FOR DEMOLITION

5.1: 9/11 Déjà vu?
As fate would have it, the Brooklyn Bridge, the Gateway Arch, the Golden Gate Bridge, Independence Hall, the Lincoln Memorial Reflecting Pool, Mount Rushmore, the Statue of Liberty, the U.S. Capitol, the U.S. Supreme Court Building, the USS Arizona Memorial at Pearl Harbor and the Washington Monument have all undergone recent renovations or are currently under construction. Timely construction could allow for the undercover placement of explosives which could then be detonated via remote control at a future date. American history shows that the World Trade Center received a timely “elevator renovation” just prior to 9/11, and that the Pentagon also underwent a renovation project in the exact location where it was later hit. Should the Chinese attack America, most if not all of these historic landmarks could be demolished within a matter of minutes, ultimately enraging Americans and causing them to blame the Chinese. These attacks would likely destroy America psychologically, make the U.S. government look sympathetic, and garner unprecedented hatred towards the Chinese.

5.2: Brooklyn Bridge (New York City)
Recently exposed U.S. bridge terror plots and bridge closures due to bomb threats may indicate that American bridges will be targeted for terror in the near future.  According to reports, the Brooklyn Bridge is currently undergoing a four-year, $500 million safety and aesthetic improvement program that will be completed in 2014. Aside from the construction, an April 27, 2011, report stated that a long-standing plot by al-Qaida to take down the Brooklyn Bridge was revealed by classified documents obtained by the New York Times. In 2012 alone, there have been at least 5 rather suspicious closings of the Brooklyn Bridge in New York City which may indicate that the bridge has already been set-up for demolition.

5.3: Federal Building Terror?
The recent terror attacks on U.S. Embassies in Libya, Egypt, Yemen and Tunisia may be a prelude to future terror attacks against U.S. Federal buildings in America on the scale of the Oklahoma City Bombing of 1995. Recent and highly publicized attacks and foiled terror plots against, U.S. Capitol Buildings, U.S. Courthouses, U.S. Federal buildings, the Pentagon as well as attacks against U.S. military bases indicate that terror against U.S. Federal buildings, bases and property is now imminent. Interestingly, the U.S. government is shutting down six courthouses in the southern part of the United States due to “money problems” which may indicate that the south is where future acts of federal false-flag terrorism is be being planned.

5.4: Federal Reserve Terror?
Before terrorist Quazi Mohammad Rezwanul Ahsan Nafis, allegedly attempted to detonate a 1,000-pound bomb in front of the Federal Reserve building in New York City in October of 2012, the U.S. government was conducting terror drills on the Federal Reserve in August of 2012. According to the report, the FED terror exercise was executed by U.S. Special Operations Command, an elite and secretive military unit based in Florida who has done extensive operations in Somalia, an alleged home to Al Shabaab. The elite unit trained for two weeks on the FED terror drills which were scheduled to occur between 7 p.m. and midnight and that reportedly involved three Black Hawks hovering over the Federal Reserve’s parking lot with four smaller helicopters landing on the bank’s roof. Should Federal Reserve terror strike America, it will happen at one or more of the FED’s 12 locations: Boston, New York, Philadelphia, Cleveland, Richmond, Atlanta, Chicago, St. Louis, Minneapolis, Kansas City, Dallas or San Francisco. Coincidentally, in September of 2012, Alex Jones of Infowars released a new magazine whose maiden cover featured the Federal Reserve on fire, further indicating that the STRATFOR intelligence operation known as Infowars knew that Federal Reserve terror was being planned.

5.5: Gateway Arch (St. Louis, Missouri)
On December 15, 2011, it was reported that the Gateway Arch in St. Louis, Missouri, would undergo a facelift renovation with the aid of $20 million from the federal government with the goal to finish improvements to the area by 2015, the 50th anniversary of when the Gateway Arch was completed.

5.6: Golden Gate Bridge (San Francisco)
Recently exposed U.S. bridge terror plots and bridge closures due to bomb threats may indicate that American bridges will be targeted for terror in the near future.  On February 23, 2012, it was reported that the Golden Gate Bridge in San Francisco, California, would undergo a renovation project that will “take years to complete”. According to the report, the project involves repainting the two main suspension cables which are responsible for holding the bridge in place. In what appears to be psychological programming The Onion ran a story in 2009 which joked about a “horrific attack on San Francisco’s Golden Gate Bridge, which left thousands missing and assumed dead”.

5.7: Independence Hall (Philadelphia, Pennsylvania)
On February 15, 2012, it was reported that after 18 months of rehabilitation, the iconic clock tower at Independence Hall will be completed. Independence Hall, where the Declaration of Independence was signed, and the Liberty Bell are two of America’s most famous attractions.

5.8: Lincoln Memorial Reflecting Pool (Washington D.C.)
On September 1, 2012, it was reported that construction workers had finally taken down the construction fence which had marred the view of the Lincoln Memorial Reflecting Pool for nearly two years. According to the report, the renovation costing $34 million gave the pool a new steel reinforced foundation as well as a new filtration system that pumps water from the Potomac Tidal Basin

5.9: Mt. Rushmore (Black Hills, South Dakota)
According to a July 3, 2005, report, Mt. Rushmore has been targeted for terror on multiple occasions. A September 18, 2012, report openly questioned whether Mt. Rushmore was a terrorist target and subsequently released a U.S. government security assessment of the Mount Rushmore National Monument. According to the report, the government conducted a 2008 study on the psychosocial impacts of a terrorist attack on national monuments such as Mr. Rushmore. Curiously, some of the findings in the study have been blacked out.

Mt. Rushmore has been targeted for terror on multiple occasions:
1.
Between 1970 and 1973, members of the American Indian Movement made several attempts to occupy and deface the monument.
2. In 1975, a bomb went off in front of the visitor center prior to visitors’ morning arrival.
3. In 1987, the environmental group Greenpeace climbed the mountain with plans to unfurl a 160-by-50-foot protest banner reading “We the people say no to acid rain” over the presidents’ faces.
4. In 1991, the Park Service received threats to assassinate then-President George H.W. Bush during a celebration marking the monument’s 50th anniversary of completion.
5. In 1999, a Colorado man was arrested for threatening to blow up the mountain.

5.10: Nuclear Reactor Terror
Ever since the Fukushima nuclear reactor disaster in 2011, there have been approximately 45 nuclear reactor “emergencies”, “closures”, “leaks” and other major incidents clearly setting the stage for coming nuclear reactor terror on an unimaginable scale. Complementing the unprecedented nuclear reactor emergencies are multiple cases of “terrorists” attempting to breach nuclear reactors, repeated lapses in nuclear reactor security, as well as countless propaganda articles indicating that a Fukushima-level event inside the United States is a foregone conclusion. Aside from blatant programming of the 2012 Hollywood nuclear reactor disaster film entitled “Chernobyl Diaries”, a recent Nuclear Regulatory Commission (NRC) panel recommended that the U.S. government customize emergency plans for each of America’s 65 nuclear power plants, a change would “expand” the standard 10-mile evacuation zone surrounding nuclear reactors.

5.11: Pearl Harbor USS Arizona Memorial (Pearl Harbor, Hawaii)
On May 30, 2012, it was reported that the USS Arizona Memorial in Pearl Harbor, Hawaii, was in dire need of funds to finish its restoration project which was started back in 2007. The USS Arizona Memorial marks the resting place of 1,102 of the 1,177 sailors killed on the USS Arizona during the attack on Pearl Harbor on December 7, 1941 by Japanese imperial forces.

5.12: Statue of Liberty (New York City)
On April 3, 2012, it was reported that al Qaeda would be “coming soon again” to New York City, according to an alleged jihadi on-line forums. Six months later on October 26, 2012, it was reported that the Statue of Liberty will reopen on the 126th anniversary of its dedication after a year-long renovation.  The $30 million renovation allegedly improved fire alarms, sprinkler systems and exit routes to bring Lady Liberty in line with New York City safety codes.

5.13: U.S. Capitol Building (Washington D.C.)
According to reports, the U.S. Capitol dome will undergo its first major face-lift in more than 50 years, costing $19 million in repairs to the lower portion of the dome. According to the American Institute of Architects, American Society of Civil Engineers and other groups, “The U.S. Capitol is not merely Congress’ work space; it is also an attraction for millions of visitors from around the world…and a potential target for those who wish to do us harm“. Suspiciously, Knesset security and the Jerusalem district police anti-terror squad recently conducted a terror exercise in which a plane crashes into the Knesset, Israel’s congressional building. In the drill, the plane contained “dangerous materials” so it was necessary for Israeli security officers to wear protective clothing for radiation and biological contamination. Aside from the 2011 terror plot targeting the U.S. Capitol building, the U.S. Capitol was also the target of an Israeli suicide bomber  in 1998, but due to faulty wiring the bomb was never detonated.

5.14: U.S. Supreme Court
(Washington D.C.)
On May 22, 2012, it was reported that the U.S. Supreme Court is getting a “facelift” and that workers have now started a two-year Supreme Court renovation project on the building’s marble facade. According to the report, the decision for the 2012 renovation was due to a November 2005 incident, in which 80 pounds of marble fell from the Authority figure of Robert Aitken’s sculpture of “Liberty Enthroned. Why the U.S. government waited 7 years to repair one of its most precious landmarks ultimately leaves more questions than answers.

5.15: Washington D.C.
Recently, historical American artifacts were stolen from the U.S. National Archives in Washington D.C., including the Wright Brothers airplane patent, the bombing maps for the nuclear attack on Japan, and photos allegedly taken by astronauts on the moon.  The shocking news was then complemented by reports that Washington D.C.’s Pennsylvania Avenue, also known as “America’s Main Street,” was now being listed among the nation’s endangered landscapes because of neglect and deferred maintenance, despite the fact that almost every major historical building, landmark or monument in Washington D.C. has either recently undergone renovation or is still currently under construction.  The notion that  Washington D.C. is doomed is complemented by recent government terror drills that are preparing the capital for future acts of terror. On February 22, 2012, it was reported that a new security project to lock down gateways to the U.S. Capitol is being planned, aimed at targeting gang assaults and lone wolf attackers. According to the report, officials are warning lawmakers and Capitol security against a developing type of assault called a “blended attack” that combines a physical attack against a target along with a cyber-attack against the same or different targets. Six months later on August 20, 2012, it was reported that the U.S. Air Force and Coast Guard aircraft would fly “intercept and identification” exercises entitled “Falcon Virgo” over Washington D.C. as part of efforts to prevent suicide aircraft attacks or other threats to the capital.

5:16: Washington Monument (Washington D.C.)
On August 24, 2011, it was reported that due to an earthquake, the Washington Monument had suffered a crack near the pyramid-shaped tip and had monument been permanently tilted. Although this report was later denied by officials, the Washington Monument is currently closed sue to construction and is not scheduled to re-open until 2014.

5.17: White House (Washington D.C.)
On September 12, 2012, it was reported that after nearly two years and $86 million worth of construction, the West Wing of the Obama White House has emerged from its visual seclusion “remarkably unchanged”. According to the report, the construction project began in September of 2010 with the excavation of a huge multistory pit in front of the West Wing. Aside from the suspicious construction, the White House has been the target of a number of high-profile terror plots and threats: On January 18, 2012, it was reported that an Occupy Wall Street protester threw a smoke bomb over the fence of the White House. Two months later on March 8, 2012, it was reported that a top hacker and committed anarchist who worked closely with the LulzSec, openly spoke of burning down the White House. Six months later on September 30, 2012, it was reported that the White House was attacked by hackers allegedly linked to China’s government. The unprecedented cyber-terror attack targeted the U.S. government’s most sensitive computer networks, ultimately breaching a system used by the White House Military Office for nuclear commands. A month later on October 21, 2012, it was reported that a year-long investigation by the Investigative Project on Terrorism (IPT) has found that scores of known radical Islamists made hundreds of visits to the Obama White House, meeting with top administration officials.

CONCLUSION

Starting wars between foreign countries is taken directly out of the 7th Protocols of Zion which states: “In order to display our system of keeping the governments of the goyim in Europe in check, we shall show our strength by committing terrorist attacks against one of them. If the governments of Europe should collectively rise against us, we shall respond using the military might of America, or China, or Japan.” Clearly, the Zionists have lost control of America and are hell bent on starting World War III in order to consolidate power, kill off millions of patriotic Americans, and further bankrupt America into endless debt. That obviously cannot be allowed to happen. Please do your part and spread the word.

About the Author
David Chase Taylor is an American journalist living in Zürich, Switzerland, where he has applied for political asylum after the release of The Nuclear Bible, a book credited with stopping a false-flag/state-sponsored nuclear terror attack upon America. Taylor also released The Bio-Terror Bible, a book and website exposing the coming global bio-terror pandemic. Taylor, the editor-in-chief of Truther.org, has also exposed the 2012 Democratic National Convention Terror PlotNATO’s implementation of the SKYNET Terminator Program, the “Twilight” Premier Terror Plot, as well as the Alex Jones links to STRATFOR.

TRUTHER.ORG LEGAL DISCLAIMER: Terror related assertions, forecasts and predictions made by Truther.org DO NOT necessarily imply that said terror events will transpire in reality, but rather that there is a distinct possibility that said terror events theoretically could happen based on the cumulative terror related data. Historically, once a particular false-flag terror related plot is widely exposed (See: Super Bowl XLV), the terror plot is immediately canceled or postponed. State-sponsored terror attacks must have a prior “paper trail” in order to set-up patsies, create plausible deniability, develop scapegoats, and mislead the public from the true perpetrators of terror. Truther.org’s sole purpose is preventing 9/11 type terror events by drawing unwanted global attention to various terror related “paper trails” prior to their fruition.