Archive for the ‘Cyber-Terror’ Category

NYSE

Download & Forward PDF

David Chase Taylor
April 15, 2014
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that international intelligence agencies will once again attempt to execute a massive cyber-attack against Wall Street and the U.S. banking system. Although a finance-related cyber-attack could occur at any time, it will most likely transpire prior to June 1, 2014.

Although a cyber-attack on Wall Street could manifest itself any number of different ways, a so-called “high frequency trading” (HFT) type of attack is the most likely. A future scenario in which the stock market is hacked or hoaxed so that the computers (which do 90% of the trading) induce a digital sell-off appears to be part of the working Wall Street cyber-terror script.

READ: Wall Street Banking Cyber-Heist to Transfer Billions to Bitcoin

In what appears to be a pre-HFT terror warning, it was reported on April 3, 2014, that discount trader Charles Schwab & Co. issued a statement in respect to HFT which read: “High-frequency traders are gaming the system, reaping billions in the process and undermining investor confidence in the fairness of the markets. It’s a growing cancer and needs to be addressed”.

In order to gain plausible deniability prior to an unprecedented HFT cyber-attack in which trillions of dollars are lost, the European Parliament voted to curb high-frequency trading, on April 14, 2014, although the measures will only take effect 2.5 years after they are adopted. In other words, the EU vote against HFT is more for show more than anything as it will do nothing to stop the impending HFT cyber-attack.

READ: ATM Cyber-Terror Bank Heist Planned for 2014

In a report entitled “Hackers Set Sights on Market Mayhem”, it was revealed that Anonymous took credit for a hack inducted HFT sell-off which resulted in a 6% slide in the share price of Sony (SNE) after a cyber-attack on the PlayStation Network. Interestingly, on April 10, 2014, it was reported that the FBI has arrested 3 suspects for hacking Microsoft Xbox, ultimately invoking the notion of the 2011 Sony attack just prior to another hack-induced HFT sell-off.

The notion that thieves are actively attempting to heist trillions of dollars was witnessed on March 30, 2014, when “con men” were stopped from entering Vatican Bank with €3 trillion of fake bonds. The staged incident was evidently executed in order to set the precedent for an unprecedented cyber-attack in which trillions of dollars are instantaneously hijacked.

READ: 9/11-Style Terror Attack on Dallas FED Building Foiled

Although a HFT cyber-attack could be scapegoated onto China, Iran or Russia, the state-sponsored cyber-terror group known as Anonymous will likely be implicated. Because Anonymous does not have a country, no one can be invaded in retaliation. In other words, the intelligence agencies behind the Wall Street cyber-heist can escape will trillions and never be brought to justice.

Predictably, it was revealed on April 2, 2014, that Anonymous hacked the Albuquerque police department, an incident designed to show that they are above the law and untouchable. Four days later on April 6, 2014, Anonymous in Israel reportedly called for massive cyber-attack, a curious notion considering that the apartheid state of Israel is the world’s #1 state-sponsor of cyber-related terror who are responsible in part for most of the world’s deadliest computer viruses (e.g., Stuxnet, Flame, and Duqu)

Prolexic HFT Cyber-Attack Warning
In what appears to be the pre-High Frequency Trading attack warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. “We have uncovered a disturbing trend: Many of these malicious attacks appear to be intent on lowering the target’s stock price or currency values, or even temporarily preventing trades from taking place,” Stuart Scholly, president of Prolexic, said in a statement. Prolexic also said that it found a “causal relationship between cyber-attacks and a change in the valuation of a company in a given market.” The report then speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”.

READ: Federal Reserve Bank False-Flag Terror Threat Assessment


Hack Induced HFT Sell-Off
Back on April 23, 2013, the Twitter feed of the Associated Press stated that Barack Obama had been injured in an explosion at the White House. The fake tweet, which was allegedly the result of a hack, spread like wildfire over the internet, garnering more than 4,000 retweets. Although the AP quickly addressed the situation, the tweet sent shock waves through the stock market, wiping out $130 billion in stock value in a matter of seconds. The notion of a fake or staged market glitch, flash or hack occurred twice before and will likely happen again (e.g., the  2010 “Flash Crash” and the Knight Capital Management Crisis of 2013 in which a computer glitch cost the firm $440 million and nearly sent it into bankruptcy) Coincidentally, on April 13, 2014, a 14-year old girl reportedly sent a “terroristic tweet” to American Airlines which allegedly ended with her arrest. The incident, which was likely staged, ultimately invoked the fake Obama assassination tweet and has set the precedent for another fake terror tweet, possibly targeting Wall Street. A day later on April 14, 2014, US Airways apologizes for a lewd photo which was sent via Twitter, further highlighting the notion of a rogue tweet.

READ: Bank of America: False-Flag Terror Threat Assessment

“Heartbleed” Cyber-Bug
In what appears to be the “cyber loophole” that will allow for a major Wall Street HFT cyber-attack, it was reported on April 9, 2014, millions of passwords are now vulnerable due to a security flaw entitled the “Heartbleed Bug”. According to reports, the Heartbleed bug has exposed millions of passwords, credit card numbers and other sensitive bits of information to potential theft by hackers who may have been “secretly exploiting the problem before its discovery”. Predictably, on April 11, 2014, the U.S. federal government issued a dire warning that hackers are trying to exploit Heartbleed bug. According to the report, the U.S. Department of Homeland Security stated that hackers were attempting to exploit the bug in widely used OpenSSL code by scanning targeted networks. Federal regulators also advised financial institutions to patch and test their systems to make sure they are safe. Corporations including Cisco, IBM, Intel, Juniper and Oracle have now warned their customers “they may be at risk”. A consortium of regulators including the Federal Reserve and the Treasury Department suggested that banks consider replacing those certificates and keys. “Financial institutions should operate with the assumption that encryption keys used on vulnerable servers are no longer viable for protecting sensitive information and should therefore strongly consider requiring users and administrators to change passwords after applying the OpenSSL patch”. A day later on April 12, 2014, it was reported that millions of Android devices are now vulnerable to the Heartbleed bug, presenting a situation whereby hackers could access trader’s cell phone on which a majority of high frequency trading is conducted. Two days later on April 14, 2014, it was revealed that tax data in Canada was stolen in a Heartbleed breach, ultimately confirming that Heartbleed is capable of attack financial-related systems.

Banking “Suicides”
In order to psychologically program the world for the impending financial collapse of America, at least 19 bankers have died, most under highly suspicious circumstances. Whether or not these finance-related people died of natural causes is irrelevant for their deaths have created an ongoing media narrative which suggests that the banking sector is unstable, vulnerable, and on the verge of collapse.

2013-2014 Banking Deaths:

1. August 19, 2013: Moritz Erhardt: Bank of America (London, England)
2. August 26, 2013: Pierre Wauthier: Zurich Insurance Group AG (Zurich, Switzerland)
3. December 23, 2013: Robert Wilson: Hedge Fund Manager (New York, New York)
4. January 19, 2014: Tim Dickenson: Swiss Re AG (United Kingdom)
5. January 28, 2014: William ‘Bill’ Broeksmit: Deutsche Bank (Kensington, England)
6. January 28, 2014: Gabriel Magee: JPMorgan Chase (London, England)
7. January 30, 2014: Mike Dueker: Russell Investments (Tacoma, Washington)
8. February 3, 2014: Ryan Crane: JPMorgan Chase (Stamford, Connecticut)
9. February 7, 2014: Richard M. Talley: American Title Services (Greenwood Village, Colorado)
10. February 18, 2014: Li Junjie: JPMorgan Chase (Hong Kong, China)
11. February 28, 2014: Autumn Radtke: BitCoin (Singapore)
12. March 11, 2014: Edmund “Eddie” Reilly: Vertical Group (New York, New York)
13. March 12, 2014: Kenneth Bellando: JPMorgan-Levy Capital (New York, New York)
14. March 12, 2014: Jon Corzine: Goldman Sachs-MF Global (Mexico City, Mexico)
15. April 1, 2014: Charles H. Keating:  Lincoln Savings and Loan (Phoenix, Arizona)
17. April 5, 2014: Jan Peter Schmittmann: ABN AMRO (Laren, Netherlands)
18. April 14, 2014: Juergen Frick: Bank Frick (Liechtenstein)
19. April 14, 2014: Juergen Hermann: Fund Manager (Liechtenstein)

[Does not purport to be a complete list of finance-related deaths]

Market Crash Warnings
Prior to a high-profile stock market crash, the American public must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. Starting in March of 2014, there have been an unprecedented amount of headlines which have been predicting Wall Street’s doom. For example, on March 30, 2014, USA Today published a report entitled, “Warning Signs are Flashing on Wall Street”, which coincidentally included the term “flash” to invoke the notion of a “flash trading”. Less than a week later on April 2, 2014, USA Today published a rather curious headlines entitled, “Is a 1987-Type Market Crash 37 Days Away?, suggesting that a stock market crash is likely prior to May 9, 2014. Roughly a week later on April 10, 2014, CNBC published a report entitled, “2014 Crash will be Worse than 1987′s: Marc Faber”, ultimately confirming that a 2014 stock market crash is planned. Needless to say, these headlines (of which there are hundreds) suggest that a state-sponsored Wall Street crash is imminent.

U.S. Vulnerable to Cyber Attack
Prior to major cyber-attack on America’s financial system, the public must believe that the U.S. government is highly vulnerable to a cyber-attack. Aside from the fact that hackers reportedly crashed Federal Election Commission website on December 19, 2013, recent reports in respect to cyber-security (or lack thereof) suggests that cyber-attacks against U.S. governmental institutions are imminent. For example, on February 4, 2014, it was revealed that a U.S. Senate report found that federal agencies often fail to take basic preventive cyber-security measures. That same day, it was also reported that “password” is the password on many U.S. government computer accounts, furthering the notion that feds are an easy target for hackers. A day later on February 5, 2014, a U.S. government report found that 4 in 10 government security breaches go undetected, suggesting that cyber-attacks are much more prevalent than originally thought. Most recently on March 16, 2014, the Ukrainian CyberBerkut terror group allegedly took down NATO websites, another clear sign that the West is vulnerable to a cyber-attack. After all, if NATO can be hacked, so too can Wall Street. Most recently, on March 17, 2014, it was reported that one-tenth of U.S. government computers will come under an increased threat of hack after April 8, 2014, an ominous sign that a cyber-attack on the U.S. government is imminent.

“Quantum Dawn 2” Cyber-Attack Drill (June 2013)
Prior to a major cyber-terror attack on the New York Stock Exchange (NYSE), one would expect there to be some stock-market related terror drills to prepare Wall Street insiders for the attack. Coincidentally, on June 13th, 2013, it was reported that Wall Street executed “Quantum Dawn 2”, a cyber-terror war-game apparently meant to give insiders an opportunity to make financial moves before the market crashes—for good. According to the report, Cyber Strategies oversaw a terror exercise which included Citigroup, Bank of America, the Department of Homeland Security, the Treasury Department, the Federal Reserve, the Securities and Exchange Commission, as well as 40 other firms. The drill, which featured a hacker, possibly from China, operating from a fake trading platform, prompted a response in which the participants facilitated a conference call to “figure out what was going on”. In other words, the drill simulated a real-life scenario in which insider firms received the “heads up” about an impending cyber-attack and subsequently shared this information accordingly so that their bank accounts and those of their clients would not be affected. The same sort of thing occurred just prior to 9/11 when “put options” or bets were taken out on United Airlines and American Airlines, the two airline companies involved in the attacks. According to the “9/11 Commission Report”, “some unusual trading did in fact occur”, however, it claimed that, “each such trade proved to have an innocuous explanation”.

“Quantum Dawn 2” Fallout (September, 2013)
In the October 23, 2013, Fox Business report entitled “‘White Hat’ Hackers Expose Flaws of U.S. Stock Market”, the details of “Quantum Dawn 2”  cyber-attack exercise were revealed. According to the report, ethical “white hat” hackers intentionally “looking to expose the cyber vulnerabilities of U.S. equity markets”, were able to directly impact market performance by “forcing a mock market close”. According to the report, more than 50 entities and 500 people in the financial services sector participated in the cyber-attack which was executed by the Securities Industry and Financial Markets Association (SIFMA) on July 18, 2013. So called “ethical hackers” were told to give everything they had to try and cripple the U.S. stock market during the 6-hour exercise. “Quantum Dawn 2 demonstrated the industry’s resiliency when faced with serious cyber-attacks that aimed to steal money, crash systems and disrupt equity market trading,” SIFMA CEO Judd Gregg stated. According to Cedric Leighton, a former U.S. intelligence officer, “The more realistic the exercise the better prepared they’ll be if and when attacks from a cyber standpoint occur”.

FLASHBACK: “Black Friday” Cyber-Attack
In yet another example of how state-sponsored terror drills always precede real-life terror events, on November 27, 2013, Truther.org published a report entitled, “Black Friday-Cyber Monday 2013 (SSTTA): NATO Executing “Largest Ever” Cyber-Terror Drill on Black Friday—Attack Imminent”. As revealed in the report, NATO was executing their largest cyber-terror drill ever and therefore the likelihood of state-sponsored cyber terror was extremely high. Predictably, it was later revealed that a major cyber-attack did in fact take place on “Black Friday” and that up to 40 million Target shoppers had their credit card information compromised. According to Brian Krebs, a journalist who specializes in computer security, the Target computer breach occurred on or around Black Friday, the busiest shopping day of the year. Evidently, the “Black Friday” cyber-attack was executed in order to set the precedent for greater acts of bank-related state-sponsored cyber-terror, namely an attack on U.S. stock markets and banks.

Wall Street Crash Propaganda

Wall Street” (1987) was a film (see trailer) about the criminality and illegality of Wall Street which was released on December 11, 1987, just 2 months after the stock market crash of October 19, 1987. Coincidentally, “The Wolf of Wall Street” (2013) is a film (see trailer) about the corrupt nature of Wall Street starring  Leonardo DiCaprio which will released on DVD on March 25, 2014, just in time for the big crash. Wall Street propaganda films are released just prior to a major stock market crash in order to demonize real investors. This is done by swaying public opinion against investors so that a real investigation into the root cause of the crash will not gain any public support. By making the stock market look like a joke and a racket, it delegitimizes the millions of Americans who will lose their pensions, properties, and investments in the market.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the man-made comet ISON hoax and the drone strike on “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a false-flag terror plot is exposed (e.g., 2011 Super Bowl Nuclear Terror Plot), it is immediately canceled or postponed (e.g., 2014 Super Bowl Nuclear Terror Plot). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

truther-rss

Flight MH 370 Nuke Attack

Download & Forward PDF

David Chase Taylor
March 16, 2014
Truther.org

SWITZERLAND, Zurich — Recent reports now confirm that the mysterious disappearance of Malaysian Airlines Flight MH 370 was an “act of piracy”, that the plane’s communication system “was disabled before it disappeared”, and that “it is conclusive” that the commercial jetliner was hijacked. Who is responsible for this brazen hijack and what kind of terror-related event this plane will be used for has remained a mystery—until now.

READ: “Live” Iranian Nuclear Attack Planned for New York City During Super Bowl XLVIII

Based on breaking news and events, it appears that Flight MH 370 was hijacked by the country of Iran for use in a 9/11-style nuclear strike on America—most likely New York City. Since international intelligence agencies were unable to execute the Iranian nuclear terror strike on New York City during Super Bowl XLVIII, they hijacked the Boeing 777 specifically in order to fly an Iranian nuclear bomb into one of the four following New York City skyscrapers.

NYC Nuclear 9/11 Targets:

1. One World Trade Center (Freedom Tower)
2. Four World Trade Center
2. Empire State Building
3. U.N. Building

When the hijacked Boeing 777 will appear out of thin air in order to execute its kamikaze nuclear strike is not known, but it will likely happen just prior to or right after the 2014 Nuclear Security Summit in the Netherlands which is scheduled for March 24-26, 2014. As evidenced herein, headlines and events in respect to Iran’s nuclear program and their role in disappearance Malaysian Airlines Flight MH 370 are trending, which is to be expected just prior to a 9/11-style nuclear strike by Iran.

READ: Hijacked? Malaysia Airlines Flight 370 May Be Used In Chinese 9/11-Style Attack On U.S.

In order for America (possibly the entire world) to witness the 9/11-style nuclear terror attack “live” on television, Iran must first execute an unprecedented cyber-attack in order to electronically hijack American television stations in order to show the nuclear attack on “live” television. This particular angle is a redux of a recent Chinese nuclear terror plot as depicted in the June 30, 2014, Truther.org report entitled “Live TV Cyber-Hijack With “Live” Nuclear Detonation”.

READ: Malaysian Flight MH 370 Hijacked for Islamic Terrorist Invasion of America?

The plot to use Flight MH 370 as a vehicle for a nuclear terror attack only adds to the growing skepticism over whether or not nuclear weapons even exist. In short, large amounts of explosives (e.g., C4) are needed to create a massive explosion and subsequent fireball in order to convince the public that they just witnessed a nuclear explosion. Since ALL fireballs tend to mushroom, the bigger the explosion the greater the perceived nuclear attack. Evidently, a Boeing 777 can be packed with enough explosives in order to convince humanity that it just witnessed a nuclear attack.

Iranian Hijack
Evidence linking Iran to the hijacked Flight MH 370 was first identified on March 10, 2014, when it was revealed that the 2 stolen passports used to board the missing plane were used with 2 tickets purchased by an Iranian man who: a) bought the tickets at the last-minute, b) paid cash, and c) only purchased one-way tickets—All three of which are red-flags for terrorism. Three days later on March 10, 2014, it was reported that the mystery fake-passport holders on missing flight were in fact Iranian, ultimately confirming Iran’s hand in the hijack of the plane. A day later on March 11, 2014, Iranian lawmaker blamed the U.S. for the plane’s disappearance, an ominous sign that Iran is attempting to shift the blame of the hijacking onto the U.S. However, since Truther.org exposed the Iranian terror angle on March 10, 2014, intelligence officials quickly declared on March 12, 2014, that there was no Iranian terror link in respect to Flight MH 307. On any other day, Iranian nationals using stolen passports to board a plane which has since been hijacked would be construed as terrorism, but not in this case. Evidently, the real terrorists orchestrating this particular terror plot want the Iranian based 9/11-sytle nuclear terror strike to be a complete and utter surprise.

Iran’s Nuclear Bomb
While Iran was attending meetings in Switzerland over its nuclear program, numerous reports were leaked which suggests that Iran already has a nuclear weapon. For example, on January 6, 2014, Fox News reported that an Iranian cleric stated that “Having a nuclear bomb is necessary to put down Israel”, a comment obviously directed at the United States. Roughly 2 weeks later on January 19, 2014, World Net Daily reported that Iran is “2 to 3 weeks” away from nuclear bomb. A week later on January 26, 2014, it was reported that an Iranian official confirmed that the country sought to build nuclear weapons. Predictably, 3 days later on January 29, 2014, the Times of Israel cited U.S. intelligence sources which found that Iran can now build and deliver nukes. On February 1, 2014, a day prior to the planned nuclear strike on New York City during Super Bowl XLVIII, an Iranian commander stated that “We have targets within America”, further confirming that an Iranian nuclear strike in the U.S. is imminent.

Iran Trending
Aside from headlining the 2014 Nuclear Security Summit, Iran’s nuclear program has been trending as of late. For example, on March 1, 2014, it was reported that the U.S. is pushing Israel to stop assassinating Iranian nuclear scientists, a report designed to show a vibrant Iranian nuclear program. A day later on March 2, 2014, it was revealed that Obama and Netanyahu held a meeting to discuss the Iranian nuclear deal which happened to coincide with the 2014 AIPAC conference in Washington, D.C. Although impossible to confirm, it is likely that this particle terror plot was hatched at the AIPAC conference as events began to unfold shortly thereafter.  Ten days later on March 12, 2014, it was reported that Iran and Russia are now discussing adding nuclear plants. Most recently on March 15, 2014, it was reported that Iran prevented sabotage at their nuclear facility. The latter incident was likely fabricated specifically so that Israel can tell the world in the aftermath of a nuclear terror strike on New York City that they tried to sabotage Iran’s nuclear program but it was too late.

IRAN-NUCLEAR-DEAL4_2744240b

Jewish Leadership of Iran
In the event that Iran is successful in attacking the United States with a nuclear weapon, it is imperative to remember that the leadership of Iran is not Iranian but rather Jewish. According to a Telegraph report dated October 3, 2009, former Iranian President Mahmoud Ahmadinejad has a Jewish past. Roughly 4 years later on September 19, 2013, the current President of Iran Hassan Rouhani took a Jewish member of parliament to the United Nations when Iran was brokering the historic nuclear deal with the West. Most recently, on February 7, 2014, it was revealed that Iranian President Hassan Rouhani donated $400,000 to a Jewish hospital in Tehran, a gesture only done by someone of Jewish ethnicity. These reports further confirm that international intelligence agencies just play country off of country to the detriment of all mankind.

Pakistan Disinformation
Although Iran is the most likely country to use Flight MH 370 in a 9/11-style terror attack on America, there is always the possibility that Pakistan could be primed for the same role. After all, Pakistan was to be implicated in the Super Bowl XLV Nuclear Terror Plot of February 6, 2011, and therefore cannot be ruled out in future nuclear-related attacks on America. Interestingly, on March 14, 2014, billionaire Rupert Murdoch tweeted the following message: “World seems transfixed by 777 disappearance.  Maybe no crash but stolen, effectively hidden, perhaps in Northern Pakistan, like Bin Laden”. Evidently, Murdoch didn’t get the memo that bin Laden was reported dead in Afghanistan on December 26, 2001. Whether he knows it or not, he is acting as a disinformation agent, possibly with the goal of camouflaging the impending Iranian 9/11-style nuclear terror attack.

New York Trending
Prior to an unprecedented nuclear terror attack in New York City, the American public must be led to believe though fabricated headlines and staged event that yes, it can happen. Starting on March 11, 2014, when President Obama made an inexplicable shopping stop at the New York Gap, the Big Apple has been trending in a major way. A day later on March 12, 2014, a deadly explosion caused 3 buildings to collapse in Manhattan killing at least 8 people. New York Congressman Charlie Rangel stated that the massive explosion was “Our community’s 9/11”, an ominous sign that the explosion was executed in order to set the pretext for an impending 9/11-level terror event in New York City.  Two days later on March 14, 2014, after years in retirement, legendary NBA basketball coach Phil Jackson signed a deal with the New York Knicks. A day later on March 15, 2014, New York reportedly stole London’s mantle as world’s top financial center. Also on March 15, 2014, it was reported that Al-Qaeda has called for “car bomb” attack on American Cities, one of which was New York City. Needless to say, most of these events have been staged or timed in order to bring unprecedented media attention to the city of New York just prior to an Iranian nuclear terror attack.

U.S. Vulnerable to Cyber Attack
Prior to an Iranian cyber-attack on the U.S: government and its various media outlets (e.g., CNN, Fox News, CSPAN, etc.) the American public must believe that the U.S. government is highly vulnerable to a cyber-attack. Aside from the fact that hackers reportedly crashed Federal Election Commission website on December 19, 2013, recent reports in respect to cyber-security (or lack thereof) suggests that cyber-attacks against U.S. governmental institutions are imminent. For example, on February 4, 2014, it was revealed that a U.S. Senate report found that federal agencies often fail to take basic preventive cyber-security measures. That same day, it was also reported that “password” is the password on many U.S. government computer accounts, furthering the notion that feds are an easy target for hackers. A day later on February 5, 2014, a U.S. government report found that 4 in 10 government security breaches go undetected, suggesting that cyber-attacks are much more prevalent than originally thought. Roughly a week later on February 13, 2014, Iran’s supreme leader told Iranian students to prepare for cyber war, an ominous sign that an Iranian cyber-TV hijack may be imminent. Most recently on March 16, 2014, the Ukrainian CyberBerkut terror group allegedly took down NATO websites, another clear sign that the West is vulnerable to a cyber-attack. After all, if NATO can be hacked, so too can a corporate television stations.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the man-made comet ISON hoax and the drone strike on “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a false-flag terror plot is exposed (e.g., 2011 Super Bowl Nuclear Terror Plot), it is immediately canceled or postponed (e.g., 2014 Super Bowl Nuclear Terror Plot). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

truther-rss

Chinese EMP Nuke Drone Attack

Download & Forward PDF

David Chase Taylor
March 2, 2014
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that international intelligence agencies have once again green-lit a Chinese-based nuclear attack on the United States of America. With a recent poll finding that China is now America’s top enemy and revelations that a new U.S. versus China cold war is imminent, the pretext for a “Digital Pearl Harbor” has quietly been established.

The impending Pearl Harbor-like surprise attack will likely commence with an EMP (Electromagnetic Pulse) attack on U.S. satellites and defense systems in the Pacific theater, ultimately rendering U.S.-based radar and electronic warning systems useless. Shortly thereafter, autonomous drones armed with nuclear weapons will likely be launched from Chinese ships and nuclear subs in the Pacific Ocean. Although targets are always subject to change, twin nuclear drone strikes against the West Coast cities of San Diego and San Francisco, California are the most likely attack scenario.

READ: China’s World War III Doomsday Plot Exposed

Although reports in respect to China’s EMP program have been public since 2011 (see below), it was revealed on January 30, 2014, that China’s EMP weapons are an “ace” against U.S. defense systems and that the Chinese military is looking to use an EMP attack as part of a “one-two punch to knock out – literally within seconds – all defensive electronics”. The one-punch being the EMP attack followed by a two-punch nuclear attack. The notion that China plans to target the U.S. with an EMP strike was reiterated in the February 3, 2014, report entitled “U.S. Evaluates China’s EMP Threat”. Predictably, the Department of Defense (DOD) publically stated that they are “unaware of any increase in the threat of a deliberate destructive use of an EMP device”.

As depicted in the January 8, 2014, report entitled “Strategic Military Satellites Vulnerable to Attack by China in Future Space War”, U.S. satellites are no match for a space-based Chinese cyber-attack. The notion that U.S. computers could suddenly be rendered useless by an unseen and undetectable force such as an EMP strike was recently highlighted in a February 25, 2014, report which revealed that the first contagious airborne Wi-Fi computer virus has now been detected. Unbeknownst to most, digital backdoors, which allow for “Zero Day Attacks”, have been built into all military software to specifically allow for EMP and cyber-like attacks.

READ: Red Dawn Scenario: Chinese Attack On America Imminent

Back on November 19, 2013, it was reported that retired U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the Internet. In other words, Chinese computer viruses could theoretically attack U.S. military defense systems (even those not connected to the internet), ultimately rendering them useless.

Despite growing evidence that nuclear bombs likely do not even exist (see: February 4, 2014 Truther.org report) U.S. President Barack “O-Bomb-A”, (i.e., Barry Soetoro) is without a doubt the anointed nuclear doomsday president. Therefore, until Obama is ousted from public office, the world will be under the threat of state-sponsored nuclear terrorism. In the aftermath of a Chinese or Iranian nuclear attack, Obama will institute martial law and declare himself dictator. This was all but confirmed in the February 27, 2014, Fox News report which stated that Obama is about ready to make a “government unto himself“, a Hitler-like move if there ever was one.

fallout

Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

Chinese Space Attack
In order to attack U.S. satellites and defense systems, the Chinese government had to first prove to the world that they are smart enough technologically-wise to do so. This was all but confirmed on December 14, 2013, when China allegedly became the third country to land on moon. Roughly 2 weeks later on December 29, 2013, a report entitled “NASA Beware China’s Red Space Storm Rising” sounded the alarm in respect to China’s offensive space program. A month later on January 29, 2014, defense experts warned that China has boosted its space warfare capabilities. Although not yet confirmed, it does appear that China’s “Jade Rabbit” moon rover is military cover for the EMP-attack program which will take out U.S.-based military satellites and defense systems.

china-military-drone-stealth-russia.si

Chinese Drone Launch
Should Chinese drones nuke U.S. cities, they will most likely takeoff from Chinese ships in or near U.S. waters. According to a February 11, 2014, report published in respect to two Iranian warships off the coast of the U.S., the Pentagon stated that they may sail wherever they like, a reckless gesture at best. Four days later on February 15, 2014, a North Korean ship which had previously transported illegal weapons to Cuba returned to the island, unabated. A few weeks later on February 26, 2014, it was reported that a Russian spy ship was docked in Havana, Cuba, just 90 miles off the coast of America. These reports were published in order to: a) show that enemy war ships are sailing just off the coast of America, and b) that Chinese ships will be able to get close enough to U.S. shores in order to launch their nuclear drone strikes.

The “Invisibility Cloak
In order for China to pull off a “stealth” nuke attack on America, they will have to, at least theoretically speaking, employ some sort of technology which renders America’s defenses useless. Coincidentally, on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat about the development of an invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when the Chinese attack America, they may do so with the aid of superior technology which in will in essence have allowed their military equipment to become invisible to American defense systems (e.g., radar, satellites, sonar, etc.).

Asian Sneak “Attack” Propaganda
Prior to a high-profile Asian based West Coast attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. On July 12th, 2013, the film “Pacific Rim” (2013) (see trailer) was released which features a story line in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, their first 3 attacks target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico. If and when this Hollywood terror programming will manifest in reality is unknown, but the precedent for a surprise attack on the West Coast of America definitely has been set.

emp-blast-effects1

I: EMP ATTACK:

1.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

1.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

II. CYBER TERROR:

2.1: U.S. Vulnerable to Chinese Cyber Attack
Aside from the fact that Chinese hackers reportedly crashed Federal Election Commission website on December 19, 2013, recent reports in respect to cyber-security (or lack thereof) suggests that cyber-attacks against U.S. governmental institutions are imminent. For example, on February 4, 2014, it was revealed that a U.S. Senate report found that federal agencies often fail to take basic preventive cyber-security measures. That same day, it was also reported that “password” is the password on many U.S. government computer accounts, furthering the notion that feds are an easy target for hackers. A day later on February 5, 2014, a U.S. government report found that 4 in 10 government security breaches go undetected, suggesting that cyber-attacks are much more prevalent than originally thought. Needless to say, these propaganda reports have been disseminated with the goal of making the American public believe that the U.S. government is highly vulnerable to a cyber-attack, possibly emanating from China.

2.2: Cyber Doomsday
Since June of 2012, numerous propaganda articles have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, “Threat Of ‘Spectacular’ Cyberattack Looms” and “U.S. Homeland Chief: Cyber 9/11 Could Happen “Imminently“, all indicate that an unprecedented act of state-sponsored cyber-terror upon the United States is imminent. Exactly how a cyber-Doomsday will manifest itself is unknown, but a Chinese-based EMP strike followed by twin nuclear attacks appears to be the working terror scenario.

2.3: China & Cyber Terror
As previously reported, the nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. China, more than any other nation, is sure to be scapegoated in the aftermath of a cataclysmic cyber-terror attack against the United States. On October 5, 2011, U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two U.S. satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyber espionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta recently stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to clamp down on aggressive Chinese cyber-attacks against American companies and the U.S. government.  On October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.

READ: Chinese “Live TV” Cyber-Hijack With “Live” Nuclear Detonation

2.4: Cyber-Related Nuclear Terror
Prior to a high-profile EMP attack followed by twin nuclear attacks, the public must be psychologically prepared to accept that this is in fact possible. Based purely on research conducted to date, the marriage between cyber-terror and nuclear terror was first made on February 19, 2013, when a CNN headline entitled “Former CIA Official: Cyber War ‘More Sinister Than Nuclear Age’” first paired the terms “cyber” and “nuclear” together in the same sentence. Roughly a month later on March 22, 2013, the propaganda film entitled “Olympus Has Fallen” (2013) was released (see trailer) in which Washington D.C., America’s capital is attacked by an ex-North Korean terrorist who wants to hack the White House computer network and detonate American nuclear warheads while in their respective missile silos. Exactly a month later on April 22, 2013, the Wall Street Journal ran a headline entitled “China: Cyberattacks Are Like Nuclear Bombs”, ultimately linking the words “China”, Cyberattacks” and “Nuclear Bombs” in the same sentence. Roughly two months later on June 28, 2013, another propaganda film entitled  “White House Down” (2013), was released (see trailer) in which Washington D.C., America’s capital, was attacked by hackers attempting to breach the U.S. Department of Defense’s computers to access the “Nuclear Football”, the briefcase used by the President of the United States to initiate nuclear war.

original

III: DRONE ATTACK:

3.1: China’s Drone Attack
China is building one of the world’s largest drone fleets aimed at attacking the United States in the event of a war. According to the report, “The Chinese military envisions its drone swarms scouting out battlefields, guiding missile strikes and overwhelming opponents through sheer numbers. China’s military-industrial complex has developed homegrown drones to accomplish these goals, according to the report released on March 11, 2013, by the Project 2049 Institute. “The PLA now fields one of the world’s most expansive UAV [unmanned aerial vehicle] fleets,” said Ian Easton and L.C. Russell Hsiao, researchers at the Project 2049 Institute and authors of the new report. The Project 2049 Institute report warned that China could consider “plausibly deniable” drone attacks blamed upon mechanical failure or cyberhackers. The Chinese drones could act as decoys, use electronic warfare to jam communications and radar, guide missile strikes on carriers, fire missiles at U.S. Navy ships, drop nuclear bombs, or dive into U.S. ships like kamikaze robots.

READ: Chinese “Kamikaze” Done Attack On Pearl Harbor Hawaii Imminent

3.2: China’s “Stealth” Drones
If and when Chinese drones execute nuclear strikes against American cities, the drones will have to be stealth drones in order to circumvent U.S. aerial defense systems (in the event that they are not disabled due to an EMP attack). Another possibility is that the Chinese may cyber-hijack (commandeer) U.S. drones and arm them with Chinese-made nuclear weapons in order to get them past U.S. defense systems. Based on the following reports, both drone scenarios are possible, at least theoretically speaking. On March 11, 2013, Easton and L.C. Russell Hsiao, researchers at the Project 2049 Institute, stated that “The PLA [China] now fields one of the world’s most expansive UAV [unmanned aerial vehicle] fleets” and that China could consider “plausibly deniable” drone attacks blamed upon mechanical failure or cyberhackers. The drones could act as decoys, use electronic warfare to jam communications and radar, guide missile strikes on carriers, fire missiles at U.S. Navy ships or dive into ships like kamikaze robots. Project 2049 went on to state that China is developing drones such as the rumored “Dark Sword” stealth drone that have low radar profiles to escape radar detection and that Chinese engineers have even begun working on drones that have the software brains to fly in formation, do aerial refueling and takeoff and land autonomously. The report cautions the U.S. military to prepare for the worst-case scenario by hardening its existing air bases in Asia. On March 13, 2013, it was reported that China is building one of the world’s largest drone fleets aimed at attacking the United States in the event of a war. As of November 22, 2013, it was reported that China’s first stealth combat drone has taken its maiden flight.

IV. U.S. VERUS CHINA:

nuclear_explosion

4.1: Red China Rising
Aside from the fact that China openly called for the world to be “de-Americanised” on October 13, 2013, it was revealed on December 12, 2013, that a group of U.S. defense analysts told a prominent House subcommittee that the U.S. military needs a more focused war plan specific to China, especially after China’s declaration of an air defense zone over the East China Sea. A week after this shocking revelation, Chinese hackers reportedly crashed Federal Election Commission website on December 19, 2013, a direct attack on the U.S. and its democratic form of government. As of February 19, 2014, China cut its U.S. Treasury holdings the most since 2011, an ominous sign that a Chinese attack is imminent. After all, China holds most of America’s debt and therefor a nuclear strike against America may be a sign to pay up.

READ: China vs. Japan War Plot Exposed—Attack on Iwo Jima and Okinawa Imminent

4.2: U.S. Versus China  
Inflammatory war propaganda, rising diplomatic tensions between the U.S. and China along with unprecedented U.S. propaganda against China indicates that World War III scenario between the United States and China is on the horizon. On June 4th, 2012, it was reported that the Australian government’s Defense White Paper published in 2009 contained a “secret chapter” that assessed “Australia’s ability to fight an air-sea battle alongside the United States against China”. A few weeks later on June 27th, 2012, Chinese Maj. Gen. Peng Guangqian stated that a future conflict with the United States is coming as a result of U.S. “containment” policy. Guangqian was then quoted as saying, “The United States has been exhausting all its resources to establish a strategic containment system specifically targeting China” and that “The contradictions between China and the United States are structural, not to be changed by any individual, whether it is G.H.W. Bush, G.W. Bush or Barack Obama, it will not make a difference to these contradictions”.

4.3: U.S. Military Vulnerable to Attack
Prior to an unprovoked and unabated attack by China against the West Coast of America, the public must first be led to believe through propaganda and alleged whistleblowers that U.S. military equipment and weapons systems are vulnerable to Chinese cyber-related espionage. That way, in the aftermath of a Chinese invasion whereby U.S. defense systems such as missiles, planes and radars are suddenly rendered useless, the narrative of a Chinese cyber-attack can be floated to the American public and military as the reason for the deadly attack which will surely take America to war. If the following reports are to be believed, Chinese hackers have gained access to U.S. weapons secrets, stole blueprints from Australia’s intelligence agency, stole a number of the latest U.S. weapons, hacked the NSA chairman’s accounts, targeted U.S. missile systems, hacked the Obama campaign, and hacked the head of the Nuclear Security Agency. The notion that the Chinese military is “smarter” than the U.S. military and therefore vulnerable to an attack was basically confirmed on January 16, 2014, when it was reported that a U.S. admiral conceded that the U.S. is losing dominance to China.

Chinese Espionage Headlines:

1. March 29, 2013: Report: China Gained U.S. Weapons Secrets Using Cyberespionage
2. May 27, 2013: Chinese Hackers Steal Australian Security Intelligence Blueprints
3. May 28, 2013: Pentagon: The Chinese Stole Our Newest Weapons
4. May 28, 2013: Chinese Infiltrated Top U.S. Weapons Systems, Confidential Report Claims
5. May 28, 2013: Report Lists U.S. Weapons Compromised By Chinese Cyberspies
6. May 29, 2013: Pentagon Aircraft, Missile Defense Programs Target Of China Cyber Threat
7. May 29, 2013: China to Hold Digital War Games
8. May 31, 2013: Hagel Says Chinese Cyberthreats Pose ‘Stealthy’ Danger To US
9. June 5, 2013: China Claims ‘Mountains Of Data’ On Cyber Attacks By US
10. June 6, 2013: Chinese Hacked Obama, McCain Campaigns, Took Internal Documents

[Does not purport to be a complete list of events of headlines]

4.4: U.S. Weapon Systems Compromised by Chinese Hackers
Based on multiple reports, Chinese hackers have compromised numerous U.S. military weapons systems,  ultimately making U.S. military personal and equipment vulnerable to a Chinese attack. According to a May 28th, 2013, report by the Washington Post, the following is an “expanded partial list” of compromised DOD system designs and technologies:

I. U.S. System Designs
Terminal High Altitude Area Defense, Patriot Advanced Capability-3, Extended Area Protection and Survivability System (EAPS), F-35, V-22, C-17, Hawklink, Advanced Harpoon Weapon Control System, Tanker Conversions, Long-term Mine Reconnaissance System, Global Hawk, Navy antenna mechanisms, Global Freight Management System, Micro Air Vehicle, Brigade Combat Team Modernization, Aegis Ballistic Missile Defense System, USMC Tracked Combat Vehicles, Warfighter Information Network-Tactical (WIN-T), T700 Family of Engines, Full Authority Digital Engine Controller (FADEC), UH-60 Black Hawk, AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile), Affordable Weapons System, Littoral Combat Ship, Navy Standard Missile (SM-2,3,6), P-8A/Multi-Mission Aircraft, F/A and EA-18, RC-135 Detect./Collect, and the Mk54 Light Weight Torpedo.

II. U.S. Technologies
Directed Energy, UAV video system, Specific Emitter identification, Nanotechnology, Dual Use Avionics, Fuze/Munitions safety and development, Electronic Intelligence Processing, Tactical Data Links, Satellite Communications, Electronic Warfare, Advanced Signal Processing Technologies for Radars,  Nanostructured Metal Matrix Composite for Light Weight Ballistic Armor, Vision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV), Space Surveillance Telescope, Materials/processing technologies, IR Search and Track systems, Electronic Warfare systems, Electromagnetic Aircraft Launch, Rail Gun, Side Scan sonar, Mode 5 IFF, Export Control, ITAR, Distribution Statement B,C,D Technical Information, CAD drawings, 3D models, schematics, Software code, Critical technology, Vendor/supply chain data, Technical manuals, PII (email addresses, SSN, credit card numbers, passwords, etc.), and attendee lists for program reviews and meetings.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the 2014 global bio-terror pandemic. To date, David Chase Taylor has blown the whistle on 50+ state-sponsored terror plots, including the man-made comet ISON hoax, the drone strike on “Fast and Furious” star Paul Walker, and he was the first to expose Alex Jones’ links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. State-sponsored terror alerts, warning, assertions and forecasts made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically occur based on the cited date. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl XLV Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

truther-rss

Download & Forward PDF

UPDATE II: Less than 24-hours after the following Truther.org report was published, it was revealed on February 11, 2014, that the websites of Venetian and Palazzo casinos were hacked. A day later on February 12, 2014, it was reported that the U.S. government’s climate change website was hacked.

UPDATE I: As predicted, a massive cyber-attack in the form of aDDoS attack hit EU and US computer servers on February 11, 2014. Security companies reported that the attack may have been more powerful than last year’s Spamhaus attacks and CloudFlare warned there are “ugly things to come”.

David Chase Taylor
February 10, 2014
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that a major act of state-sponsored terror will take place on Tuesday, February 11, 2014. Aside from the fact that February 11th is STRATFOR intelligence operative Alex Jones’ 40th birthday, a number of treasonous state-sponsored terror plots have just been identified and exposed within the last 48-hours (e.g., the Obama White House Coup; the 9/11 Style Terror Attack Plot; and the Iranian Plot to Attack the U.S.) and therefore the likelihood of a false-flag terror attack is almost guaranteed. Although any type of terror attack is possible, an NSA attack or a cyber-attack targeting U.S. nuclear reactors, the stock market, the power grid, or the International Space Station are the most likely.

Recent reports in respect to cyber-security (or lack thereof) suggests that cyber-attacks against U.S. governmental institutions are imminent. For example, on February 4, 2014, it was revealed that a U.S. Senate report found that federal agencies often fail to take basic preventive cyber-security measures. That same day, it was also reported that “password” is the password on many U.S. government computer accounts, furthering the notion that feds are an easy target for hackers. A day later on February 5, 2014, a U.S. government report found that 4 in 10 government security breaches go undetected, suggesting that cyber-attacks are much more prevalent than originally thought. Needless to say, these recent reports have been disseminated with the goal of making the American public believe that the U.S. government is highly vulnerable to a cyber-attack.

In the wake of the 2014 World Economic Forum, Israeli Prime Minister and war criminal Benjamin Netanyahu called for the “UN of the internet”, something which would likely occur in the wake of an unprecedented cyber-terror attack. As it currently stands, the nation of Israel would benefit the most from an international cyber-attack as they are the self-proclaimed leader in cyber-security (and cyber in-security) with a majority of the world’s cyber-security contracts. Coincidentally, on January 30, 2014, it was reported that “cyber-attack emergency response teams” are currently being created in Israel, an ominous sign that Israel is already preparing for a major cyber-related emergency, one that they will most likely initiate. Should a cyber-attack occur as theorized, it would come just days before Vice Admiral Michael S. Rogers takes over the NSA and U.S. Cyber Command. Major acts of state-sponsored terror are often committed right before or right after new puppets take public office (e.g., George W. Bush—9/11) and therefore the chances of a state-sponsored cyber-attack is extremely high.

1.si

February 11, 2014 Attack
Similar to how the major acts of cyber-terror planned for November 5, 2013, were to be scapegoated onto the state-sponsored terror group known as “Anonymous”, cyber-terror attacks planned for February 11, 2014, will likely be scapegoated onto the so-called “rights group” affiliated with Reddit and Mozilla who will allegedly be protesting online spying by the NSA in memory of the late Aaron Swartz. With the collective eyes of the world focused on the 2014 Winter Olympics in Russia, a cyber-terror attack on the U.S. or any other country for that matter would obviously receive international media exposure which is exactly why the so-called NSA protest was scheduled during the winter games.

NSA Attack  
Although the February 11, 2014, protest is in respect to the NSA, a physical terror attack against one of the NSA’s 11 listed facilities is highly likely. This was all but stated in the February 10, 2014, U.S. News & World Report article entitled, “Lights Out for NSA? Maryland Lawmakers Push to Cut Water, Electricity to Spy Agency Headquarters”. Recent revelations that NSA whistleblower Edward Snowden used cheap software to steal NSA data implies that anyone can attack the NSA, cyber or otherwise. With over 5,700 websites planning to protest the National Security Agency, the likely hood of an attack, albeit cyber or real-world, is all but guaranteed.

Public NSA Facilities:

1. National Security Agency Headquarters (Fort George G. Meade, Maryland)
2. Roaring Creek Station Satellite Receiver (Catawissa, Pennsylvania)
3. Salt Creek Station Satellite Receiver (Arbuckle, California)
4. Friendship Annex (FANX) (Linthicum, Maryland)
5. Aerospace Data Facility at Buckley Air Force Base (Aurora, Colorado)
6. Texas Cryptology Center at Lackland Air Force Base (San Antonio, Texas)
7. NSA Georgia at Fort Gordon (Augusta, Georgia)
8. NSA Hawaii (Honolulu, Hawaii)
9. Multiprogram Research Facility (Oak Ridge, Tennessee)
10. Yakima Research Station (Yakima, Washington)
11. Utah Data Center (Camp Williams, Utah)

Nuclear Reactor Attack
In what appears to be the proverbial government whitepaper issued just prior to an act of state-sponsored terror against U.S. nuclear plants, on February 4, 2014, the Senate Homeland Security and Governmental Affairs Committee’s minority staff released a 19-page memo entitled “The Federal Government’s Track Record on Cybersecurity and Critical Infrastructure”. The timely report found that nuclear reactors must be protected from earthquakes, terrorists and cyber-attacks, and not necessarily in that order. Investigators also discovered that the Nuclear Regulatory Commission “stored sensitive cybersecurity details for nuclear [power] plants on an unprotected” computer. The report was obviously published in order to give government officials plausible deniability in the wake of an impending cyber-attack on U.S. nuclear reactors.

Stock Market Attack
As depicted in the February 6, 2014, Fox Business report entitled, “Hackers Set Sights on Market Mayhem”, a staged-cyber terror attack could always target the rigged stock market which could then theoretically create a massive sell-off or disruption in the market. A day later on February 7, 2014, a report entitled “Dirty Ticks’: UK Spies use Sex, Cyber Attacks to Discredit Targets” was published which suggests that a foreign based cyber-attack on the U.S. or U.K. is imminent. Coincidentally, on February 11, 2014, newly elected Federal Reserve Chairwoman Janet Yellen will appear before the U.S. Congress. With all the media attention on Federal Reserve, it would be the perfect time to launch a state-sponsored cyber-terror attack on the U.S. stock market. This would obviously lead to a bank run-off which would eventually collapse the U.S. dollar. This would obviously cause millions of people to scream and “yell”, which is exactly why Ms. “Yellen” was selected as FED Chairwoman for she will oversee the collapse of the U.S. financial system.

Power Grid Attack
Literally hours after the aforementioned 2014 Winter Olympic cyber terror plot was foiled, a fabricated story about an alleged April 16, 2013, sniper attack on the power grid in California suddenly came to light. This particular intelligence spawned narrative was first identified on February 5, 2014, when Fox News published a report entitled, “Ex-Federal Official Raises Concerns over Terror Attack on Power Grid”. A day later, Fox News published another report entitled, “Threat to the grid? Details Emerge of Sniper Attack on Power Station”. That same day, the LA Times ran a story entitled, “Attack on Electric Grid Raises Alarm”, obviously trying to alarm its readers about an incident which allegedly occurred almost a year ago but was never even reported. Regardless, on February 7, 2014, Yahoo published a report entitled “Silicon Valley Power-Grid Attack ‘Terrorism’” while the Associated Press published a report entitled “Democratic US Senators want Grid Security Review”. A day later, Fox News published a third report entitled, “Senators Mull Stronger Regs on US Power Grid, following News of 2013 Sniper Attack”, and it was also revealed that the hackers behind the Target cyber-attack may have used Pennsylvania power company to get in the back door. Needless to say, all of the aforementioned reports are in respect to an incident which was never reported which suggests that the April 16, 2013 attack was fabricated in order to set the precedent for an unprecedented cyber-attack on the U.S. power grid. The February 10, 2014 U.S. News & World Report headline entitled “Maryland Lawmakers Push to Cut Water, Electricity to Spy Agency Headquarters” essentially says it all, albeit reversed. In this particular case however, international spy agencies will cut the electricity and water of the American people just like they did on February 8, 2014, when 113,000 people in Pennsylvania lost power after a storm.

gridex_banner

Cyber-Terror Drill: “GridEx II”
Coincidentally, on November 13-15, 2013, a massive power grid terror drill entitled “GridEx II” was executed on the East Coast of America in apparent preparation for the electrical blackout of America. According to the August 16, 2013, New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow”, “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. The report further states that, “…Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate”. Terror drills always precede real-life terror events and therefore a state-sponsored cyber-attack on the U.S. power grid is just a matter of time.

ISS Attack
Considering that a state-sponsored cyber-terror attack was evidently planned for the 2014 Winter Olympics in Sochi, Russia, there is always the possibility that the progenitors of terror may flip the deck so-to-speak and launch a cyber-attack on the U.S. in a bid to scapegoat Russia and reignite the Cold War which has been heating up as of late. Coincidentally, on February 6, 2014, it was reported that a robotic Russian spaceship has docked with International Space Station (ISS). Whether or not the ISS will be infected with a Russian computer virus is not known, but it wouldn’t be the first time. A situation whereby the entire ISS blows up after it is revealed that it was the victim of a Russian cyber-attack is not out of the question.

Russian Cyber-Attack?
In the event that the U.S. suffers a cyber-terror attack, the country of Russia (or her Eastern European allies) might ultimately be blamed by the international community for either executing the attack themselves or allowing it to happen. The Russian cyber-terror narrative was first identified on January 13, 2014 when it was revealed that the recent U.S. based data thefts may have originated in Romania. Five days later on January 18, 2014, a Russian teen was accused of creating the BlackPOS malware used to hack Target and Neiman Marcus. Four days later on January 22, 2014, it was reported that the country of Romania caught the hacker “Guccifer” who allegedly hacked former U.S. Secretary of State Colin Powell’s email. According to a January 30, 2014, report, Russia is in the process of creating “cyberwarfare units” which will be operational by 2017, potentially foreshadowing an impending wave of Russian-based cyber-attacks.

Cyber-Attacks Trending
Prior to an unprecedented cyber-terror attack, the American public must be led to believe though fabricated headlines and staged event that yes, it can happen. Starting in December of 2013, there has been a wave of cyber-related attacks which appear to be trending towards a major cyber-attack. As depicted in the February 3, 2014 Truther.org report entitled “ATM Cyber-Terror Bank Heist Planned for 2014 — February 11, 2014 Attack Trending”, a financial related-cyber-attack was just been identified and exposed and therefore the likelihood of another state-sponsored cyber-related terror plot targeting the U.S. financial system is all but to be expected.

2013-2014 Cyber-Attacks:

1. December 18, 2013: FDA hacked, pharmaceutical companies push for online security audit
2. December 19, 2013: Target says breach may affect 40 million credit, debit cards
3. December 19, 2013: Chinese hackers reportedly crashed Federal Election Commission website
4. December 23, 2013: Texas county blames hackers for $27G phone bill charge
5. January 2, 2014: New York State benefit cards hacked
6. January 2, 2014: ‘Stop spying on people!’: Syrian Electronic Army hacks Skype
7. January 5, 2014: Reports: Yahoo servers hit in malware attack
8. January 6, 2014: “Guccifer” Files Further Detail Hacking Spree
9. January 10, 2014: Credit card hackers hit Neiman Marcus
10. January 21, 2014: Hackers ‘compromise’ 16 million German online accounts
11. January 22, 2014: China suffers massive Internet outage, analysts suspect hackers
12. January 24, 2014: Syrian Electronic Army hacks CNN accounts amid Geneva 2 talks
13. January 24, 2014: Court system hit with cyberattack
14. January 29, 2014: ‘Spying Birds’: Hackers deface Angry Birds website following NSA revelations
15. January 30, 2014: Yahoo email account passwords stolen
16. February 2, 2014:  Hacked Belgian cryptography expert could be victim of NSA
17. February 3, 2014: Marriotts among hotels in 8-state-wide data breach, manager says
18. February 6, 2014: ‘Happy Birthday Mark!’ Syrian Electronic Army hacks into Facebook’s domain

[Does not purport to be a complete list of headlines or events]

FLASHBACK: “Black Friday” Cyber-Attack
In yet another example of how state-sponsored terror drills always precede real-life terror events, on November 27, 2013, Truther.org published a report entitled, “Black Friday-Cyber Monday 2013 (SSTTA): NATO Executing “Largest Ever” Cyber-Terror Drill on Black Friday—Attack Imminent” which revealed that NATO was executing their largest cyber-terror drill ever and therefore the likelihood of state-sponsored cyber terror was extremely high. Predictably, it was later revealed a week later that a major cyber-attack did in fact take place on “Black Friday” and that up to 40 million Target shoppers had their credit card information compromised. According to Brian Krebs, a journalist who specializes in computer security, the Target computer breach occurred on or around Black Friday, the busiest shopping day of the year. Evidently, the “Black Friday” cyber-attack was executed in order to set the precedent for even greater acts of cyber-related terrorism.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the 2014 global bio-terror pandemic. To date, David Chase Taylor has blown the whistle on 50+ state-sponsored terror plots, including the man-made comet ISON hoax, the drone strike on “Fast and Furious” star Paul Walker, and he was the first to expose Alex Jones’ links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. State-sponsored terror alerts, warning, assertions and forecasts made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically occur based on the cited date. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl XLV Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

Truther RSS

Sochi Cyber Terror

Download & Forward PDF


David Chase Taylor

February 7, 2014
Truther.org

SWITZERLAND, Zurich — From February 7th through the 23rd, the 2014 Winter Olympics will take place in Sochi, Russia. Due to the fact that a man-made avalanche attack and a terror plot to kidnap, hold hostage, and behead members of the U.S. men’s national ice hockey team has already been identified, exposed, and ultimately foiled, the progenitors of terror have evidently transitioned to “Plan C” in their quest to terrorize the Sochi Olympics and the estimated 3-billion people who will be watching them on television.

The latest 2014 Winter Olympics terror plot that has been identified involves a state-sponsored cyber-terror attack on the Olympics themselves, namely the International Olympic Committee which is responsible for timing, computing and ultimately declaring the various winners of games. In the event that the games are hit with a major cyber-attack, a scenario whereby last place finishers are awarded gold medals is theoretically possible.

During the opening ceremonies of the Sochi Olympics on February 7, 2014, a glimpse of impending cyber-related terror occurred when a so-called “technical glitch” left one of the famous Olympic rings unlit and in the dark. If and when the Olympics suffer a cyber-attack, a terror scenario whereby the entire Olympic village and games themselves lose power and are blacked out is also theoretically possible. Depending on the severity of the attack, the winter games may even be canceled.

DHS Olympic Cyber-Terror Warning
When the
U.S. revealed that there were “specific” threats to the Olympic Games, a state-sponsored cyber-terror attack was evidently one of them. This was made perfectly clear by the U.S. Department of Homeland Security on February 4, 2014, when they revealed though a terror warning that “A number of hacktivist campaigns may attach themselves to the upcoming Olympics simply to take advantage of the on-looking audience”, and that “Anonymous Caucasus” has launched a threat against any company that finances or supports the winter games. The DHS report concluded that “the group is likely capable of waging similar attacks on the websites of organizations they believe financed Olympic related activities; however, no specific threat or target has been identified at the time of this report”.

“Live TV” Cyber-Hijack
As depicted in the aforementioned Olympic terror warning by the U.S. Department of Homeland Security, hacktivists may attempt to take advantage of the large audience to spread their own message. One way cyber-“terrorists” could accomplish this is by hijacking NBC Universal’s international television coverage of the winter games themselves. The “Live TV” cyber-hijack terror scenario has already been identified twice before as depicted in the June 30, 2013 Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”, and the December 28, 2013 Truther.org report entitled “CNN Center Attack?—A U.S. Television Studio State-Sponsored Terror Warning”. Needless to say, hijacking the Olympic television airwaves would be the perfect opportunity for a new Osama bin Laden-like figure to make his appearance to the world.

1.si

February 11, 2014 Attack?
Although a state-sponsored cyber-terror attack could occur at any time during the 2014 Winter Olympics (February 7-23, 2014) it will most likely transpire on February 11, 2014 when a “rights group” affiliated with Reddit and Mozilla will reportedly protest online spying by the NSA in memory of the late Aaron Swartz. With the collective eyes of the world focused on Sochi, Russia, a cyber-terror attack would obviously receive international attention which is exactly why the so-called cyber-“protest” was scheduled during the Winter Olympics.

Sochi Cyber-Terror Trending
Prior to an unprecedented cyber-terror attack targeting the 2014 Winter Olympics in Sochi, Russia, the public must be led to believe though fabricated headlines and staged events that yes, it can happen. The intelligence spawned narrative that Sochi is vulnerable to a cyber-attack started on February 4, 2014, just hours after the USA Hockey terror plot was exposed. Since then, there has been a number or cyber-related headlines and events which suggests that a state-sponsored cyber-terror attack on the winter games is imminent.   

Sochi Cyber-Terror Time-Line:

1. February 4, 2014: Hacked Within Minutes: Sochi Visitors Face Internet Minefield
2. February 5, 2014:
Welcome to Sochi: You’re hacked!
3. February 5, 2014: Sochi Security: Warning of Cyber Attacks as Hackers Target Games
4. February 5, 2014: Sochi Olympics’ Other Security Threat: How To Avoid Cyber-Related Attacks
5. February 6, 2014: The other security concern at Sochi Olympics: cyberthreats
6. February 6, 2014: It’s ‘Hacker Hunting Season’ for Journalists Covering Sochi Olympics
7. February 7, 2014: Sochi Threat: Russia-U.S. Need to Cooperate on Cyber Terror
8. February 7, 2014: ‘Fabricated!’ NBC Sochi ‘hack hysteria’ exposed
9. February 7, 2014: Cyber Risk at the Sochi Winter Olympics
10. February 7, 2014: Sochi Olympics hacking story by NBC completely false – cyber security expert

[Does not purport to be a complete list of headlines or events]

Governmental Institutions Vulnerable to Cyber-Terror
Recent revelations in respect to cyber-security suggest that a cyber-related attack against governmental institutions, possibly the IOC, is imminent. For example, on
February 4, 2014, it was revealed that a U.S. Senate report found that federal agencies often fail to take basic preventive cyber-security measures. That same day, it was also reported that “password” is the password on many U.S. government computer accounts, furthering the notion that feds are an easy target for hackers. A day later on February 5, 2014, a U.S. government report found that 4 in 10 government security breaches go undetected, suggesting that cyber-attacks are much more prevalent than originally thought. Needless to say, these recent reports have been disseminated with the goal of making the public believe that governmental institutions, namely the U.S. government, is vulnerable to a cyber-attack.

Cyber-Attacks Trending
Prior to an unprecedented cyber-terror attack on the 2014 Winter Olympics, the public must be led to believe though fabricated headlines and staged event that yes, it can happen. Starting in December of 2013, there has been a wave of cyber-related attacks which appear to be trending towards an unprecedented cyber-attack. As depicted in the February 3, 2014 Truther.org report entitled “ATM Cyber-Terror Bank Heist Planned for 2014 — February 11, 2014 Attack Trending”, a financial related-cyber-attack has just been identified and exposed and therefore the likelihood of another state-sponsored cyber-related terror plot targeting the Olympics has never been higher.

2013-2014 Cyber-Attacks:

1. December 18, 2013: FDA hacked, pharmaceutical companies push for online security audit
2. December 19, 2013:
Target says breach may affect 40 million credit, debit cards
3. December 19, 2013:
Chinese hackers reportedly crashed Federal Election Commission website
4. December 23, 2013:
Texas county blames hackers for $27G phone bill charge
5. January 2, 2014:
New York State benefit cards hacked
6. January 2, 2014:
‘Stop spying on people!’: Syrian Electronic Army hacks Skype
7. January 5, 2014:
Reports: Yahoo servers hit in malware attack
8. January 6, 2014:
“Guccifer” Files Further Detail Hacking Spree
9. January 10, 2014:
Credit card hackers hit Neiman Marcus
10. January 21, 2014:
Hackers ‘compromise’ 16 million German online accounts
11. January 22, 2014:
China suffers massive Internet outage, analysts suspect hackers
12. January 24, 2014:
Syrian Electronic Army hacks CNN accounts amid Geneva 2 talks
13. January 24, 2014:
Court system hit with cyberattack
14. January 29, 2014:
‘Spying Birds’: Hackers deface Angry Birds website following NSA revelations
15. January 30, 2014:
Yahoo email account passwords stolen
16. February 2, 2014: 
Hacked Belgian cryptography expert could be victim of NSA
17. February 3, 2014: Marriotts among hotels in 8-state-wide data breach, manager says
18. February 6, 2014:
‘Happy Birthday Mark!’ Syrian Electronic Army hacks into Facebook’s domain

[Does not purport to be a complete list of headlines or events!

State-Sponsored Cyber-Terror
In the wake of the 2014 World Economic Forum, Israeli Prime Minister and war criminal Benjamin Netanyahu called for the “UN of the internet”, something which would likely occur in the wake of an unprecedented Olympic cyber-terror attack. As it currently stands, the nation of Israel would benefit the most from an international cyber-attack as they are the self-proclaimed leader in cyber-security (and cyber in-security) with a majority of the world’s cyber-security contracts. Coincidentally, on January 30, 2014, it was reported that “cyber-attack emergency response teams” are currently being created in Israel, an ominous sign that Israel is already preparing for a major cyber-related emergency, one that they will most likely initiate. Should a cyber-attack occur during the 2014 Winter Olympics as theorized, it would come just days before Vice Admiral Michael S. Rogers will take over the NSA and U.S. Cyber Command. Major acts of state-sponsored terror are often committed right before or right after new puppets take public office (e.g., George W. Bush—9/11) and therefore the chances of a state-sponsored cyber-attack is extremely high.

FLASHBACK: “Black Friday” Cyber-Attack
In yet another example of how state-sponsored terror drills always precede real-life terror events, on November 27, 2013, Truther.org published a report entitled, “Black Friday-Cyber Monday 2013 (SSTTA): NATO Executing “Largest Ever” Cyber-Terror Drill on Black Friday—Attack Imminent” which revealed that NATO was executing their largest cyber-terror drill ever and therefore the likelihood of state-sponsored cyber terror was extremely high. Predictably, it was later revealed a week later that a major cyber-attack did in fact take place on “Black Friday” and that up to 40 million Target shoppers had their credit card information compromised. According to Brian Krebs, a journalist who specializes in computer security, the Target computer breach occurred on or around Black Friday, the busiest shopping day of the year. Evidently, the “Black Friday” cyber-attack was executed in order to set the precedent for even greater acts of cyber-related terrorism.

Russian-Based Cyber Attack?
In the event that the 2014 Winter Olympics suffer a cyber-terror attack, the country of Russia (or her Eastern European allies) might ultimately be blamed by the international community for either executing the attack themselves or allowing it to happen. The Russian cyber-terror narrative was first identified on January 13, 2014 when it was revealed that the recent
U.S. based data thefts may have originated in Romania. Five days later on January 18, 2014, a Russian teen was accused of creating the BlackPOS malware used to hack Target and Neiman Marcus. Four days later on January 22, 2014, it was reported that the country of Romania caught the hacker “Guccifer” who allegedly hacked former U.S. Secretary of State Colin Powell’s email. According to a January 30, 2014, report, Russia is in the process of creating “cyberwarfare units” which will be operational by 2017, potentially foreshadowing an impending wave of Russian-based cyber-attacks. In reality, Russian or Romanian hackers would never attack the Olympics when they are in their own country. Needless to say, a cyber-attack on the winter games may be used to try and ignite the Cold War between the U.S. and Russia.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the 2014 global bio-terror pandemic. To date, David Chase Taylor has blown the whistle on 50+ state-sponsored terror plots, including the man-made comet ISON hoax, the drone strike on “Fast and Furious” star Paul Walker, and he was the first to expose Alex Jones’ links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. State-sponsored terror alerts, warning, assertions and forecasts made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically occur based on the cited date. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl XLV Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

truther-rss

236778-terminator-2-judgment-day-1991

Download & Forward PDF

UPDATE: On February 3, 2013, the same day that the following Truther.org terror warning was published, it was reported that the NYPD was investigating Phillip Seymour Hoffman’s possible drug buy at ATM. Since Hoffman’s death has the earmarks of an assassination, the propaganda report was evidently published to highlight ATMs just prior to a state-sponsored terror plot being executed against them.

David Chase Taylor
February 3, 2014

Truther.org

SWITZERLAND, Zurich — Unable to stage a wave of domestic terror attacks on U.S. banks, a 9/11-style attack on the U.S. Federal Reserve, or the controlled demolition of the New York Stock Exchange, it now appears that the Obama administration, at the behest of international intelligence agencies, will attempt to execute a bank-related cyber-attack which will ultimately hijack trillions of dollars and bankrupt America. Although an electronic banking heist could manifest itself any number of different ways, it appears that the progenitors of state-sponsored terror will attempt to recreate the hacking scene from “Terminator 2: Judgment Day” (1991) in which John Conner successfully hacks an ATM machine with a computer (see photo or #14 in video).

Naturally, a banking heist of this magnitude would have a devastating impact on the Federal Reserve, the stock market, and the U.S. economy in general. In the aftermath of the largest bank robbery in the history of the world, the crash of the U.S. dollar and the New York Stock Exchange would be a mere formality.  In order to sell the notion that trillions of U.S. dollars just disappeared into thin air, a cyber-banking heist must be accompanied by a number of New York City “bankers” who suddenly commit suicide by jumping out of their skyscraper windows, just as they reportedly did during the infamous stock market crash of 1929.

1.si

February 11, 2014
Although this type of state-sponsored banking hoax could occur at any time in 2014, it will most likely transpire on February 11, 2014 when a “rights group” affiliated with Reddit and Mozilla will reportedly protest online spying by the NSA in memory of the late Aaron Swartz. Coincidentally, February 11th is also the 5th day of the 2014 Winter Olympics and therefore the collective eyes of the world will be focused on Sochi, Russia. Consequently, any U.S. based terror attack would have international ramifications which is exactly why the “protest” and attack was scheduled during the Olympics. In other words, the cyber-attack would be used to demonize and humiliate America on the international stage.

Cash Withdrawals Limited
The notion that bank patrons will not be able to access their cash was first reported on January 24, 2014 when the BBC revealed that HSBC bank had imposed new restrictions on large cash withdrawals. Two days later on January 28, 2014 it was reported that a Russian bank had halted all cash withdrawals. Because the world is truly run by international intelligence agencies, events tend to transpire in other countries in order to set the precedent for larger events which will eventually occur in America. Although a bank-related cyber-attack could emanate from any computer in the world, it will most likely come from one or more of the laptops stolen from Coca-Cola on January 25, 2014. That way, anytime people drink a Coke, it will rehash the memory of when America went bankrupt overnight. After all, what is more American than Coca-Cola?

Financial Terror Programming
In order to psychologically prepare America and the world for the impending collapse of the U.S. financial system, the Dow Jones Industrial fell over 300 points on January 24, 2014 and another 326 points on February 3, 2014, the two single greatest losses since 2011. Apparently anticipating a backlash post cyber-heist, it was reported on January 6, 2014 that the Federal Reserve is hiring a number of new armed police officers. In what appears to be prophetic words of warning, it was reported on January 23, 2014 that the new Jesuit Pope stated that the internet is a “gift from God” but to watch out for the trolls. Needless to say, these seemingly unrelated events have the scene for an unprecedented financial attack.

ATM Attack
Although cyber-terrorists could launch a financial-related cyber-attack from anywhere in the world, it will most likely come from an ATM (automated teller machine) within the United States. This type of cyber-attack scenario would allow international intelligence agencies to: a) scapegoat American citizens for the attack, b) provide the pretext for draconian banking legislation, and c) provide a reason to institute a new and “safe” currency as an alternative to the U.S. dollar. The foreshadowing of an ATM-like cyber-attack was first made on January 16, 2014 in an article entitled “For the First Time, Hackers Have Used a Refrigerator to Attack Businesses”. Although appearing harmless, the propaganda report made a key link between large appliances and business-related cyber-attacks. After all, if hackers can use a refrigerator to attack a business, they can surely use an ATM to hack a bank.  A day later on January 17, 2014, Fox News reported that a majority of the world’s ATMs are still running on Windows XP, ultimately implying that ATM software is outdated and vulnerable to attack.

Banking Problems

Prior to an unprecedented cyber-related banking heist, there must be a wave of baking related attacks and problems which will ultimately set the precedent for the attack. This particular terror narrative began on December 24, 2013 when it was reported that the Target hackers stole encrypted bank PINs, ultimately linking hacking with bank PINs. Roughly a month later on January 21, 2014 it was reported that two men were arrested at the Texas border in credit card fraud case, furthering the notion of international financial crime. Five days later on January 26, 2014 it was reported that Lloyds Banking Group was hit by bank card and ATM problems, ultimately linking bank cards and ATM problems in the same headline. Four days later on January 30, 2014 it was reported that recent financial crimes could lead to new banking security measures involving microchips, insinuating that current bank cards are no longer safe. Needless to say, these reports were published to create a sense of uncertainty in respect to banking and to foreshadow upcoming bank-related terrorism.

Black Friday

FLASHBACK: “Black Friday” Cyber-Attack
In yet another example of how state-sponsored terror drills always precede real-life terror events, on November 27, 2013, Truther.org published a report entitled, “Black Friday-Cyber Monday 2013 (SSTTA): NATO Executing “Largest Ever” Cyber-Terror Drill on Black Friday—Attack Imminent”. As revealed in the report, NATO was executing their largest cyber-terror drill ever and therefore the likelihood of state-sponsored cyber terror was extremely high. Predictably, it was later revealed that a major cyber-attack did in fact take place on “Black Friday” and that up to 40 million Target shoppers had their credit card information compromised. According to Brian Krebs, a journalist who specializes in computer security, the Target computer breach occurred on or around Black Friday, the busiest shopping day of the year. Evidently, the “Black Friday” cyber-attack was executed in order to set the precedent for greater acts of bank-related state-sponsored cyber-terror.

State-Sponsored Cyber-Terror
In the wake of the 2014 World Economic Forum, Israeli Prime Minister and war criminal Benjamin Netanyahu called for the “UN of the internet”, something which would likely occur in the wake of an unprecedented cyber-banking heist. As it currently stands, the nation of Israel would benefit the most from a cyber-bank heist as they are a leader in cyber-security (and cyber in-security) with a majority of the world’s cyber-security contracts. Coincidentally, on January 30, 2014, it was reported that “cyber-attack emergency response teams” are currently being created in Israel, a sign that Israel is already preparing for a cyber-related emergency, one that they will most likely create. Should a bank-related cyber-attack occur during the 2014 Winter Olympics as theorized, it would come only days after Janet Yellen was sworn in as the new chairwoman of the Federal Reserve on February 3, 2014, and just days before Vice Admiral Michael S. Rogers will take over the NSA and U.S. Cyber Command. Major acts of state-sponsored terror and financial crimes are often committed right before or right after new puppets take public office (e.g., George W. Bush—9/11 Attacks and Alan Greenspan—Black Monday) and therefore the chances of a financial-related cyber-attack is extremely high.

Russian Cyber Attack?
Although cyber-attacks on the U.S. banking system will most likely be scapegoated onto Americans, there is always the chance that it could be blamed on Russian/Eastern European-based cyber-terrorists. This particular narrative began started with the notion that the recent U.S. based data thefts may have originated in Romania. According to a report dated January 18, 2014, a Russian teen allegedly created the BlackPOS malware used to hack Target and Neiman Marcus. Four days later on January 22, 2014, it was reported that Romania caught the hacker “Guccifer” who allegedly hacked Colin Powell’s email. According to a January 30, 2014 report, Russia is in the process of creating “cyberwarfare units” which will be operational by 2017, potentially foreshadowing future Russian-based cyber-attacks. Needless to say, any suspect, patsy or government which is not affiliated with the state of Israel is a red herring. The obvious question in respect to any crime is who benefits. In reality, hackers in Russia or Romania could never get away with trillions of stolen U.S. dollars—but Israel could.

Bank of America Attack
If and when state-sponsored bank attacks occur within the United States, Bank of America is the most likely target. As evidenced in the“2012 DNC Terror Plot” which targeted Bank of America Stadium in Charlotte, North Carolina,and the June 26, 2013 Truther.org report entitled “U.S. Bank Terror: False-Flag Threat Assessment: Bank of America Attacks Trending”, Bank of America has been systematically targeted with terrorism. By attacking Bank of America, the attack will be seen as an attack on America and all economic confidence in the United States will be lost. In other words, if Bank of America appears insolvent, the idea that America is unsafe and a financially risky place to investment will begin to emerge, which is exactly the point. Coincidentally, on January 25, 2014 it was reported that Bank of America’s trading practices are being examined, a possible sign that the bank may be acting illegally or fraudulently. Six days later January 31, 2014 it was reported that a New York judge approved an $8.5 billion dollar Bank of America settlement. Although impossible to known without a proper investigation, this huge settlement may be a “pay-off” of sorts just prior to a cyber-heist involving of Bank of America.

Banking “Suicides”
As evidenced, there has been an unprecedented amount of banking and finance-related deaths, especially in the last few weeks. Whether these men die of natural causes or not, their highly suspicious deaths have created the narrative that the banking community is unstable, vulnerable to attack, and on the verge of collapse.

2013-2014 Banking Deaths:

1. August 19, 2013: A 21-Year-Old Bank Of America Intern In London Has Died
2. August 26, 2013:
Zurich Insurance Financial Chief Found Dead
3. January 28, 2014:
Former Top Executive at Deutsche Bank Found Hanged
4. January 28, 2014:
Exec plunges to death from JP Morgan skyscraper
5. January 30, 2014:
Russell Investments Chief Economist Dueker Found Dead After Fall
6. February 3, 2014: Financial World Shaken by 4 Bankers’ Apparent Suicides in a Week

[Does not purport to be a complete list of headlines or events]

“Falls” Trending

As evidenced, news and events surrounding falls are trending which suggests that more are on their way. As previously mentioned, in order to sell the notion that trillions of U.S. dollars just disappeared into thin air, a cyber-banking heist must be accompanied by a number of New York City “bankers” who suddenly commit suicide by jumping out of their skyscraper windows, just as they reportedly did during the infamous stock market crash of 1929.

2014 Falls:

1. January 27, 2014: Tata Motors Managing Director Karl Slym Falls off Bangkok Hotel, Dies
2. January 28, 2014:
Exec plunges to death from JP Morgan skyscraper
3. January 30, 2014:
Russell Investments Chief Economist Dueker Found Dead After Fall
4. January 30, 2014:
Reporter: NY Congressman Apologized for Threat to Throw Him Off Balcony
5. February 1, 2014:
First Person Plunge: Baumgartner’s Exhilarating Space Leap
6. February 1, 2014:
Teen’s Parachute Doesn’t Fully Open During Birthday Skydive

[Does not purport to be a complete list of headlines or events]

Cyber-Attacks Trending
Prior to a high-profile cyber-terror attack, the public must first be psychologically programed to accept that this is in fact possible. Starting in December of 2013, there has been a wave of cyber-related attacks which appear to be trending towards an unprecedented cyber-attack.

2013-2014 Cyber-Attacks:

1. December 18, 2013: FDA hacked, pharmaceutical companies push for online security audit
2. December 19, 2013:
Target says breach may affect 40 million credit, debit cards
3. December 19, 2013:
Chinese hackers reportedly crashed Federal Election Commission website
4. December 23, 2013:
Texas county blames hackers for $27G phone bill charge
5. January 2, 2014:
New York State benefit cards hacked
6. January 2, 2014:
‘Stop spying on people!’: Syrian Electronic Army hacks Skype
7. January 5, 2014:
Reports: Yahoo servers hit in malware attack
8. January 6, 2014:
“Guccifer” Files Further Detail Hacking Spree
9. January 10, 2014:
Credit card hackers hit Neiman Marcus
10. January 21, 2014:
Hackers ‘compromise’ 16 million German online accounts
11. January 22, 2014:
China suffers massive Internet outage, analysts suspect hackers
12. January 24, 2014:
Syrian Electronic Army hacks CNN accounts amid Geneva 2 talks
13. January 24, 2014:
Court system hit with cyberattack
14. January 29, 2014:
‘Spying Birds’: Hackers deface Angry Birds website following NSA revelations
15. January 30, 2014:
Yahoo email account passwords stolen
16. February 2, 2014: 
Hacked Belgian cryptography expert could be victim of NSA

[Does not purport to be a complete list of headlines or events]

DHS Banking Continuity
According to a December 10, 2004, CRS Report for Congress entitled “Homeland Security: Banking And Financial: Infrastructure Continuity”, bank terror and financial collapse have been planned for accordingly. According to the report, “H.R. 2043 sought to address bank risks under terrorism” and the Terrorism Risk Insurance Act of 2002 (TRIA) “provides a federal backstop for insurers willing to provide terrorism insurance”, ultimately protecting insurance banks against “catastrophic payouts in case of terrorist attacks”.  In other words, if and when a bank related terror attacks occur resulting in financial panic, private banks will not have to foot the bill for their losses because the U.S. government has assumed all the risk and liability. This convenient set-up essentially guarantees that the U.S. government, not the banks, will go bankrupt in the aftermath of bank related terror attacks.

US-court-cyber-attack

The “Contagion Effect”

Among other things, the CRS Report for Congress found that once one bank goes, the rest will follow:  “Financial institutions face two categories of emergencies that could impair their functioning. The first is directly financial: danger of a sudden drop in the value of financial assets, whether originating domestically or elsewhere in the world, such that a global financial crisis might follow. The second is operational: failure of physical support structures that underlie the financial system. Either could disrupt the nation’s ability to supply goods and services and alter the behavior of individuals in fear of the disruption (or fear of greater disruption). They could reduce the pace of economic activity, or at an extreme, cause an actual contraction of economic activity”. The report went on to state that “Collapse of one prominent entity could evoke a contagion effect, in which sound financial institutions become viewed as weak — today’s equivalents of a bank run, in which panicked customers withdraw funds from many entities, causing others to fail as well”.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the 2014 global bio-terror pandemic. To date, David Chase Taylor has blown the whistle on over 50 Obama sanctioned terror plots, exposed the man-made ISON doomsday asteroid hoax, exposed the drone strike on “Fast and Furious” star Paul Walker, and exposed Alex Jones’ links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. State-sponsored terror alerts, warning, assertions and forecasts made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically occur based on the cited date. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl XLV Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

Truther RSS

    

Download & Forward PDF

UPDATE: Adding to growing skepticism over whether nuclear weapons even exist, it was reported on December 19, 2013, that the U.S. federal government spent $3.1 billion on an alleged highway tunnel underneath the city of Seattle using a 5-story high mechanical drill entitled “Bertha”. Coincidentally, “Bertha” tunneled almost exactly adjacent to the Space Needle before running into “the object” which has postponed the supposed tunnel project indefinitely. Seattle nuclear terror plot exposed and drilling stops? Evidently, the tunnel was bored to funnel tons of explosives into downtown Seattle where it would eventually send the flying saucer that is the Space Needle hundreds of miles away. This same type of scenario is was witnessed in the foiled Super Bowl XLV Terror Plot in Dallas, Texas on February 6, 2011 when a brand new stadium was built specifically for the Super Bowl. Like Seattle, Dallas has Reunion Tower whose Space Needle-like top would have been blown away by the supposed nuclear bomb.

David Chase Taylor
December 20, 2013
Truther.org

SWITZERLAND, Zurich — In the very near future, the Chinese military will launch an unprovoked wave of attacks—starting with the islands of Japan and Hawaii and ending with twin nuclear detonations in the U.S. cities of San Francisco, California and Seattle, Washington.

The Chinese will start their attacks in the East and make their way West with the use of a radar cloaking technology which will render their drones, planes, ships and submarines invisible to U.S. military defense systems. Once in the clear, Chinese subs will likely launch a pair of unmanned drones which will be outfitted to carry nuclear warheads to their respective targets.

Download & Forward PDF

The notion of a Chinese nuclear attack on the United States was openly flaunted on October 31, 2013, when the Chinese government released a nuclear blast map projection for the U.S. cities of Seattle and Los Angeles, after they were struck by Chinese nuclear warheads (see photo below). A few weeks later on December 17, 2013, a Chinese rover diorama showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent.

In a move which shows the duplicity of the U.S. government, on December 16, 2013, it was revealed that hundreds (possibly thousands) of armored tanks and trucks are being moved to the West Coast by train (see video). In the aftermath of nuclear attacks in Seattle and San Francisco, a martial law scenario would surly result and therefore U.S. military hardware needs to be on hand prior to the event transpiring in reality.  

In order for a nuclear attack to be the most psychologically terrifying, an iconic American landmark must be destroyed (i.e., the Twin Towers on 9/11) in the attack in order to serve as a life-long reminder of that horrific day. Therefore, the cities of Seattle and San Francisco have been chosen due to their storied landmarks (see below). In order to bring unprecedented attention to Hawaii and the Pacific theater just prior to a Chinese attack, President Obama left for a 17-day Hawaiian vacation on December 20, 2013.

Chines Targets (East to West):

1. Japan (Okinawa, Japan, and Iwo Jima, Japan)
2. Hawaii (
Joint Base Pearl Harbor-Hickman)
3. Seattle, Washington (
Space Needle)
4. San Francisco, California (
Golden Gate Bridge)

Aside from the fact that China openly called for the world to be “de-Americanised” on October 13, 2013, it was revealed a month later on December 12, 2013, that a group of U.S. defense analysts told a prominent House subcommittee that the U.S. military needs a more focused war plan specific to China, especially after China’s declaration of an air defense zone over the East China Sea. A week after this shocking revelation, Chinese hackers reportedly crashed Federal Election Commission website on December 19, 2013, a direct attack on the U.S. and its democratic form of government.

As revealed in previous Truther.org reports (e.g., Red Dawn Scenario: Chinese Attack On America Imminent” and “Chinese “Kamikaze” Done Attack On Pearl Harbor Hawaii Imminent”), international intelligence agencies have attempted  to spark a “doomsday” nuclear conflict between the U.S. and China on multiple occasions. Evidently, they won’t give up until World War III has commenced. This is the second Chinese nuclear terror attack plot which has been identified in 2013. Back on July 30, 2013, a Truther.org report entitled, “Live TV” Cyber-Hijack with “Live” Nuclear Detonation Now Trending”, exposed a nuclear terror plot in which China was slated to hijack the world’s television airwaves just prior to surprise nuclear attacks on the U.S. cities of San Francisco and Seattle. Although this particular nuclear terror plot was canceled due to unwanted media attention, it appears that a redux is now in order.

Live TV Nuke

The notion of an impending “doomsday” was recently highlighted on November 26, 2013, when it was revealed that U.S. spies are worried over the “doomsday” cache stashed by ex-NSA contractor Snowden. As evidenced herein (see below), Snowden is the slated to be scapegoated for the upcoming lapse in U.S. security that will allow for a Chinese attack on America. Roughly a month later on December 18, 2013, the so-called “Doomsday Minister” Harold Camping died at the age of 92. Mr. Camping, an obvious intelligence plant, predicted an American “doomsday” on May 21, 2011, roughly 90 days after the now foiled state-sponsored nuclear terror attack on Super Bowl XLV in Dallas, Texas on February 6, 2011.

In the aftermath of nuclear detonations in Seattle and San Francisco, the Yellowstone (Caldera) Volcano in Yellowstone National Park, Wyoming, will predictably erupt. Based on recent headlines (e.g., April 17, 2013: Yellowstone’s Volcano Bigger Than Thought; December 12, 2013: Beneath Yellowstone, a volcano that could wipe out U.S.; and December 18, 2013: Huge Magma Pocket Lurks Beneath Yellowstone Supervolcano), the volcano is quite massive and a major threat to America.

Once the Yellowstone Caldera erupts, the entire West Coast will likely become inundated with a heavy smog. The horrific smog which recently engulfed Singapore was apparently a beta-test for an upcoming nuclear detonation and subsequent fallout in America. A major beta-test was needed to see how people would respond to a massive smog-like change to their environment. Unfortunately, Singapore was the chosen city. 

Although the smog will be blamed on nuclear fallout and volcanic ash, the source of the deadly smog will most definitely come from heavy-duty chemtrails delivered by aerial drones 24/7. Coincidentally, on December 13, 2013, the long awaited film entitledThe Hobbit: The Desolation of Smaug” (2013) opened in theaters nationwide. Hollywood’s psychological programming never disappoints. Four days later on December 17, 2013, it was reported that a Chinese hospital opened a smog clinic, a potential preview of things to come.

I. THE SET-UP:

1.1: Chinese Military Drills
Prior to a full-scale war in the Pacific theater between Australia, China, Japan and the U.S., the respective militaries of these countries must exercise and drill the various war scenarios that they will eventually be engaged in. As evidenced, there has been an unprecedented amount of drills on all sides, especially in respect to China. Interestingly, China has executed drills in both Hawaii and California. In the aftermath of a surprise attack on the U.S. by China, these drills, sanctioned by Obama, will be cited as a primary cause for the invasion. It will likely be said that during these drills, the Chinese gathered the necessary information needed for an invasion.

Pacific Theater War Drills:


1. February 7, 2013:
US, Japan, Australia Conduct Military Drills Over Pacific
2. April 5, 2013:
Japan Will Join US Military Drill In California In June
3. June 9, 2013:
Japan Sending Soldiers to US for First Time Amid Tensions with China
4. June 21, 2013:
US, Japan Begin Naval Drills Near China
5. June 27, 2013:
US-Japan War Games Off The California Coast Imitate Chinese Invasion
6. July 2, 2013: China to join Russia for largest naval drills with foreign partner
7. September 6, 2013:
Chinese Military Ships Visit Hawaii for Joint Exercises with US

8. September 26, 2013:
Russia, China Hold Large-Scale War Games
9. November 6, 2013: U.S. commander says disaster relief drill with China improves relationship
10. November 14, 2013: Communist Chinese Troops on U.S. Soil for “Exchange” Mission
11. December 9, 2013: China holds war games near Korean border

[Does not purport to be a complete list of war drill and exercises]

1.2: The Air Defense Zone
In order to highlight the U.S.-China rift just prior to the start of World War III, it was revealed on November 26, 2013, that U.S. B-52 bombers snubbed China’s new air defense zone during a flyover of the disputed Japanese islands. Two days later on November 28, 2013, China reportedly patrolled the Air Zone over the disputed islands. Two days after that on November 30, 2013, U.S. airlines were publically advised to comply with China’s new defense zone. Although the airlines complied, on December 6, 2013, the U.S. officially refused to recognize new Chinese air defense zone, an obvious ploy to enrage China. Chiming in on December 3, 2013, was Vice President Joe Biden who stated that China’s air zone raises risk of accidents and miscalculations. Whether or not an “accident” or “miscalculation” will lead to world war is not yet known, but the entire Air Defense Zone is a military ploy which was specifically designed to spark an international conflict (i.e., Remember the Maine incident and the Gulf of Tonkin incident, etc.) between the U.S. and China.

1.3: The Ship Incidents
Aside from the aforementioned “Air Defense Zone”, it was reported on December 13, 2013, that a Chinese naval vessel tried to force a U.S. Warship to stop in international waters. Three day later on December 16, 2013, another incident occurred when China’s state media blamed the U.S. for a near collision of two warships. A Christian Science Monitor think-tank report dated December 18, 2013, entitled “Is China’s near miss with US ship the start of a new pattern?” highlights the notion that these type of incidents will only intensify. Predictably, on December 19, 2013, it was revealed that the U.S. has determined that China was ‘irresponsible’ in stand-off at sea. U.S. vs. China ship incidents in the Pacific will likely escalate in a tit-for-tat manner until they spark a nuclear war—exactly what they are designed to do.

1.4: Chinese Tech Advances
Prior to China doing the unthinkable—attacking the United States of America—the Chinese must appear technologically capable of pulling off a “stealth” attack. After all, the Chinese military has to travel roughly 5,396 miles without being seen. Recent reports in respect to China’s alleged scientific advancements indicates that Chinese may have the technical knowhow to attack America. For example, on December 14, 2013, it was reported that China became just the third country to land on moon. Five days later on December 19, 2013m it was reported that China built its fourth Antarctic research base, again showing that China is advancing on all fronts. Regardless of whether the aforementioned reports are actually true, they were disseminated in order to show Chinese is smart enough to execute a stealth attack on America.

1.5: The “Invisibility Cloak
In order for the Chinese to pull off a “stealth” attack on America, they will have to, at least theoretically speaking, employ some sort of technology which renders America’s defenses useless. Coincidentally, November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when the Chinese attack America, they will do so due to superior technology which in will in essence have allowed their military equipment to become invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Even worse, on November 19, 2013, it was reported that retired U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

1.6: Nuclear Submarine Attack?

Although a direct nuclear missile strike via a Chinese nuclear submarine is always possible, it’s far more likely that a nuclear strike will come from a drone launched from by a submarine. Coincidentally, on October 31, 2013, it was reported that Chinese nuclear submarines are capable of widespread attack on U.S., namely, the cities of Seattle and Los Angeles. Roughly a month later on December 2, 2013, it was reported that a World War II era Japanese mega-submarine was discovered off Hawaii, ultimately rehashing a surprise attack (possibly submarine) on the U.S. from an Asian country. Four days later on December 5, 2013, the U.S. Navy launched a drone from a submerged submarine, ultimately verifying that that a nuclear drone strike from a submerged submarine is at least theoretically possible.

china-military-drone-stealth-russia.si

1.7: China’s “Stealth” Drones
If and when Chinese drones execute nuclear strikes against American cities, the drones will have to be stealth drones in order to circumvent U.S. aerial defense systems. Another possibility is that the Chinese may cyber-hijack (commandeer) U.S. drones and arm them with Chinese-made nuclear weapons in order to get them past U.S. defense systems. Based on the following reports, both drone scenarios are possible, at least theoretically speaking. On March 11, 2013, Easton and L.C. Russell Hsiao, researchers at the
Project 2049 Institute, stated that “The PLA [China] now fields one of the world’s most expansive UAV [unmanned aerial vehicle] fleets” and that China could consider “plausibly deniable” drone attacks blamed upon mechanical failure or cyberhackers. The drones could act as decoys, use electronic warfare to jam communications and radar, guide missile strikes on carriers, fire missiles at U.S. Navy ships or dive into ships like kamikaze robots. Project 2049 went on to state that China is developing drones such as the rumored “Dark Sword” stealth drone that have low radar profiles to escape radar detection and that Chinese engineers have even begun working on drones that have the software brains to fly in formation, do aerial refueling and takeoff and land autonomously. The report cautions the U.S. military to prepare for the worst-case scenario by hardening its existing air bases in Asia. On March 13, 2013, it was reported that China is building one of the world’s largest drone fleets aimed at attacking the United States in the event of a war. As of November 22, 2013, it was reported that China’s first stealth combat drone has taken its maiden flight.

1.8: U.S. Navy Corrupt
Prior to an unprecedented attack by China against U.S. Navy installations in the Pacific, high-ranking members of the U.S. Navy must appear inept, incapable and downright corrupt. That way, in the aftermath of the attack, one or more of these Navy admirals or commanders can be publically scapegoated for the attacks. Case in point: On November 4, 2013, it was reported that a Navy commander accepted prostitutes and Lady Gaga tickets in bribes; On November 9, 2013, it was reported that U.S. Navy admirals under investigation in widening bribery scandal
; On November 28, 2013, it was reported that the Navy suspended business with defense contractor Inchcape Shipping Services over “questionable business integrity”; and on December 6, 2013, it was reported that a U.S. intelligence adviser resigns after work with Chinese firm revealed. Needless to say, these events (of which there are likely more) were orchestrated in order to show that U.S. Navy personal are bribable and corrupt and therefore are susceptible to selling secrets and/or shirking their military duties.

1.9: U.S. Military Vulnerable to Attack
Prior to an unabated attack by China against U.S. military bases in the Pacific (i.e.,
Okinawa, Japan, Iwo Jima, Japan, and Pearl Harbor, Hawaii), the public must first be led to believe through propaganda and alleged whistleblowers that U.S. military equipment and weapons systems are vulnerable to Chinese cyber-related espionage. That way, in the aftermath of a Chinese invasion whereby U.S. defense systems such as missiles, planes and radars are suddenly rendered useless, the narrative of a Chinese cyber-attack can be floated to the American public and military as the reason for the deadly attack which will surely take America to war. If the following reports are to be believed, Chinese hackers have gained access to U.S. weapons secrets, stole blueprints from Australia’s intelligence agency, stole a number of the latest U.S. weapons, hacked the NSA chairman’s accounts, targeted U.S. missile systems, hacked the Obama campaign, and hacked the head of the Nuclear Security Agency.

Chinese Espionage Headlines:

1. March 29, 2013:
Report: China Gained U.S. Weapons Secrets Using Cyberespionage (CNN)
2. May 27, 2013:
Chinese Hackers Steal Australian Security Intelligence Blueprints (News.com)
3. May 28, 2013:
Pentagon: The Chinese Stole Our Newest Weapons (RT)
4. May 28, 2013:
Chinese Infiltrated Top U.S. Weapons Systems, Confidential Report Claims (Fox News)
5. May 28, 2013:
Obama Intelligence Agency Chairman Hacked By “Guccifer” (Smoking Gun)
6. May 28, 2013:
Report Lists U.S. Weapons Compromised By Chinese Cyberspies (Washington Post)
7. May 29, 2013:
Pentagon Aircraft, Missile Defense Programs Target Of China Cyber Threat (Fox News)
8. May 29, 2013:
China to Hold Digital War Games (Guardian)
9. May 31, 2013:
Hagel Says Chinese Cyberthreats Pose ‘Stealthy’ Danger To US (Fox News)
10. June 5, 2013:
China Claims ‘Mountains Of Data’ On Cyber Attacks By US (FT)
11. June 6, 2013:
Chinese Hacked Obama, McCain Campaigns, Took Internal Documents (NBC)
12. June 12, 2013:
Head of U.S. Nuclear Security Agency Is Hacked By “Guccifer” (Smoking Gun)

[Does not purport to be a complete list of events of headlines]

1.10: U.S. Weapon Systems Compromised by Chinese Hackers
Based on multiple reports, Chinese hackers have compromised numerous U.S. military weapons systems,  ultimately making U.S. military personal and equipment vulnerable to a Chinese attack. According to a May 28th, 2013, report by the Washington Post, the following is an “expanded partial list” of compromised DOD system designs and technologies: 

I. U.S. System Designs: Terminal High Altitude Area Defense, Patriot Advanced Capability-3, Extended Area Protection and Survivability System (EAPS), F-35, V-22, C-17, Hawklink, Advanced Harpoon Weapon Control System, Tanker Conversions, Long-term Mine Reconnaissance System, Global Hawk, Navy antenna mechanisms, Global Freight Management System, Micro Air Vehicle, Brigade Combat Team Modernization, Aegis Ballistic Missile Defense System, USMC Tracked Combat Vehicles, Warfighter Information Network-Tactical (WIN-T), T700 Family of Engines, Full Authority Digital Engine Controller (FADEC), UH-60 Black Hawk, AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile), Affordable Weapons System, Littoral Combat Ship, Navy Standard Missile (SM-2,3,6), P-8A/Multi-Mission Aircraft, F/A and EA-18, RC-135 Detect./Collect, and the Mk54 Light Weight Torpedo.

II. U.S. Technologies: Directed Energy, UAV video system, Specific Emitter identification, Nanotechnology, Dual Use Avionics, Fuze/Munitions safety and development, Electronic Intelligence Processing, Tactical Data Links, Satellite Communications, Electronic Warfare, Advanced Signal Processing Technologies for RadarsNanostructured Metal Matrix Composite for Light Weight Ballistic Armor, Vision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV), Space Surveillance Telescope, Materials/processing technologies, IR Search and Track systems, Electronic Warfare systems, Electromagnetic Aircraft Launch, Rail Gun, Side Scan sonar, Mode 5 IFF, Export Control, ITAR, Distribution Statement B,C,D Technical Information, CAD drawings, 3D models, schematics, Software code, Critical technology, Vendor/supply chain data, Technical manuals, PII (email addresses, SSN, credit card numbers, passwords, etc.), and attendee lists for program reviews and meetings.

1.11: Whistleblower Edward Snowden
The case of former National Security Agency (NSA) whistleblower Edward Snowden is fascinating for many reasons but mainly because of his role in an upcoming Chinese attack. In the aftermath of an attack emanating from China, Snowden will be scapegoated as a traitor for giving information to the Chinese which ultimately enables them to circumvent U.S. military programs and weapons systems. This particular narrative first began to form on June 10th, 2013, when CIA officer Bob Baer stated on CNN that Obama officials are speculating that
Snowden’s whistleblowing could be considered “potential Chinese espionage”. Four days later on June 14th, 2013, it was reported that a popular Communist Party-backed newspaper was urging China’s leadership to get more information from Snowden rather than send him back to the U.S., because his revelations about secret U.S. surveillance programs were in China’s national interest. Another June 14th, 2013, report stated that Snowden could offer intelligence that would help China update its understanding of cyberspace and improve its position in negotiations with Washington, D.C. A week later, on June 21st, 2013, the Obama Administration reportedly charged NSA Whistleblower Snowden with espionage, theft and conversion of government property. These charges were leveled at Snowden in order to give the Obama administration the much needed plausible deniability in the aftermath of a Chinese attack on the U.S. Six day later on June 26th, 2013, it was reported that intelligence agencies in China and Russia had gained access to highly classified U.S. intelligence and military information contained on electronic media held by Snowden. According to the report, the exact compromise of the secret data held on Snowden’s laptop computers remains unknown but the biggest fear is that China gained access to new U.S. nuclear war plans. The Snowden case was most recently highlighted on December 15, 2013, in a report by 60 Minutes which showed how NSA security was compromised by Snowden. Two day later on December 17, 2013, a DOD official: stated that Snowden ‘stole everything — literally everything’ from the U.S. government. That same day, an Ex-CIA director stated that Snowden should be ‘hanged’ if convicted for treason, further implying that Snowden’s crimes are treasonous in nature and that U.S. security has been unduly compromised.

Asian Americans

1.12: High-Profile Asian Crimes
Prior to a nuclear attack emanating from Asia, Asian people must be demonized publicly in order to psychologically prep the public for the impending chaos and death. Starting in October of 2011, there have been 3 heinous crimes in which the alleged perpetrator was of Asian descent. The first incident occurred on October 11, 2013, when an
Asian-American male allegedly murdered the son of NFL star running back Adrian Peterson. Two days later on October 13, 2013, an Asian male allegedly shot 5  people at the Hmong festival in Tulsa, Oklahoma. Roughly 2 months later on December 17, 2013, a male of Asian descent allegedly committed a bomb hoax at Harvard University. In all three cases, the face of the alleged perpetrator was all over the news. This especially true in respect to the Harvard incident which ultimately burned the notion of Asians and bombs into the psyche of the American public just prior to a Asian-based nuclear attack upon America.

II. CHINESE TARGETS:

2.1: Attack on Japan
The Japanese people are some of the most independent people on earth and therefore have been the target of numerous earthquakes, tsunamis, wars and nuclear attacks (e.g.,
Hiroshima, Nagasaki, and Fukushima). The Zionist backed Chinese would love nothing more than to invade and destroy the Japanese culture and way of life as much as possible. Unfortunately, as it currently stands, the country of Japan is America’s closest ally in the Pacific and therefore an attack on Japan by China would instantly be seen as an attack on America. The U.S. has numerous military bases in Japan including two very strategic locations in Okinawa, Japan, and Iwo Jima, Japan. In World War II, the Battle of Iwo Jima was made famous by a photo of U.S. soldiers hoisting an American flag atop the island. Therefore, the capture of this island by “Communist” China would undoubtedly serve as an American war cry for revenge. If China were to successfully capture these two islands along with Pearl Harbor, Hawaii, they would have almost conquered the entire Asian-Pacific region.

China-Japan War Headlines:

1. February 7, 2013: US, Japan, Australia Conduct Military Drills Over Pacific
2. April 5, 2013:
Japan Will Join US Military Drill In California In June
3. June 9, 2013:
Japan Sending Soldiers to US for First Time Amid Tensions with China
4. June 21, 2013:
US, Japan Begin Naval Drills Near China
5. June 27, 2013:
US-Japan War Games Off The California Coast Imitate Chinese Invasion
6. October 22, 2013:
China warns Japan over reported plan to shoot down drones
7. November 23, 2013: China creates air defence zone over Japan-controlled islands

8. November 28, 2013:
U.S. military: ‘improvised launch device’ found near Air Force base in Japan
9. November 28, 2013: China’s presence looms amid massive U.S.-Japanese AnnualEx war games
10. December 3, 2013: China Threatens Japan Ahead of Biden Trip
11. December 7, 2013: Impending Japan-China war has the makings of a Clancy classic
12. December 17, 2013: Japan’s hawks unveil sweeping defense upgrade

[Does not purport to be a complete list of events of headlines]

2.2: Head of U.S. Military in Japan Suspended
In a move which paves the way for an unabated Chinese attack on U.S. troops stationed Japan, it was reported on June 7th, 2013, that U.S. Army Major General Michael Harrison, the man directly responsible for responding to an attack on Japan, was suspended for allegedly failing to properly investigate a sexual assault complaint. Harrison, who was stationed in Camp Zama, was in charge of U.S. Army-Japan and was suspended four days prior to his completion of his 32-month assignment. It’s no secret that sexual assault and the military are synonymous and therefor the timing of the suspension is highly suspicious to say the least. Harrison’s scheduled replacement is Major General James Boozer, the former deputy commanding general of the US Army in Europe. With Boozer at the helm, plausible deniability due to his greenness on the job and his name “Boozer”, meaning drinker or drunk, will be cited as the reasons he failed to properly respond to a Chinese sneak attack.

2.3: U.S. F-15 Squadron Grounded
Prior to a Chinese invasion in which U.S. military aircraft fail to work properly, there must be an incident whereby U.S. planes can be “updated” with a virus or mechanical tweak so they are rendered useless in battle. On May 28, 2013, it was reported that a U.S. pilot flying an F-15 over the Pacific Ocean identified an unspecified problem which forced him to eject in mid-flight. A day later on May 29, 2013, it was reported that the U.S. Air Force grounded its F-15 fighters on the southern Japan island of Okinawa for a safety review following a crash that forced the aforementioned pilot to eject over the Pacific Ocean. All F-15s attached to the 18th Wing on Okinawa’s Kadena Air Base were scheduled to undergo “inspections” during the reported stand down to ensure that they are “safe” to fly. Although it is not clear whether these planes are still grounded, the so called “inspections” may have allowed for the entire fleet of American F-15s to be digitally sabotaged.

2.4: Invasion of Hawaii
A preview of the Chinese invasion of Hawaii was first witnessed on September 6, 2013, when it was revealed that Chinese military ships visited Hawaii for joint exercises with U.S. military forces. Aside from being unprecedented, the military drills were meant to serve as a foreign policy blunder by Obama which would eventually lead to the Chinese invasion of Hawaii. Then on October 30, 2013, another suspicious incident was reported when China moved as spy ship near Hawaii. Predictably, the Obama administration, whose role is to look weak on foreign policy, said and did nothing in response to the Chinese aggression. Then on December 12, 2013, it was reported that the health director which approved Obama’s birth certificate died in plane crash in Hawaii. The assassination killed two birds with one stone in that the death highlighted Hawaii internationally as well as reignited the whole Obama birth certificate conspiracy. As previously mentioned, President Obama left for a 17-day Hawaiian vacation on December 20, 2013, bringing more than 2 weeks of unprecedented global attention to island of Hawaii and the Pacific theater in general.

2.5: Seattle Nuclear Attack
It’s no secret that Seattle, Washington, is one of the most liberal and progressive cities in the United States and therefore is a top state-sponsored terror target. From marijuana legalization, animal rights, gay rights and recycling, Seattle is not just a city but rather a large community.
“Red Dawn” (2012) is a film (see trailer) in which Washington state is the victim of a red-dawn surprise attack by military aircraft from Asia. At exactly 0:33 seconds into the trailer, a massive, explosion is heard at the same time that a snow globe with Seattle’s Space Needle is shown, potentially foreshadowing an upcoming attack on the city. Since there is a question as to whether nuclear weapons even exist, it’s possible that the Space Needle could be used as a staging ground for a major attack with the use of state of the art explosives. Curiously, on December 3, 2013, it was reported that a ferry theft in Seattle prompted a security review of the Puget Sound surrounding Seattle. Whether or not this “review” has provided the necessary cover for the insertion of explosives into the downtown Seattle area (i.e., the Space Needle) is not known, but it wouldn’t be surprising.  On December 3, 2013, it was revealed that noise from jumping and cheering Seahawks fans registers as earthquake. In the aftermath of a nuclear attack in Seattle, an earthquake of great magnitude would occur, just as they do in the wake of any large explosion.

2.6: San Francisco Nuclear Attack

In the event that San Francisco is targeted in a nuclear attack, ground zero will likely be Coit Tower. As previously mentioned, there is a
question as to whether nuclear weapons even exist. In the event that they do not, a large staging area for explosives would be needed. Coincidentally, on November 18, 2013, it was revealed that the iconic Coit Tower in San Francisco is closing for 5 months. This tower could be packed with tons of the most lethal explosives and detonated via remote control at a later date. In order to document the explosion in HD (high-definition), on November 21, 2013, it was revealed that the city of Oakland is moving forward with plans to build an Orwellian surveillance complex. That way, the world will be inundated with videos and images from the horrific explosion across the bay in San Francisco. Another suspicious incident occurred on December 16, 2013, when the San Jose airport terminal closed after water line allegedly ruptured. In the event of a Chinese attack, it’s possible that a target such as the San Jose airport may be targeted first in order to draw Americans to their television prior to the slated nuclear attacks.

2.7: San Francisco Bay Bridge
The
San Francisco–Oakland Bay Bridge (known locally as the Bay Bridge) is a pair of bridges spanning San Francisco Bay of California. Aside from being partially demolished in the 1989 Loma Prieta Earthquake, on January 7th, 2013, it was reported that an oil tanker had struck a tower in the middle of the San Francisco-Oakland Bay Bridge. According to the report, the 752-foot tanker rammed the bridge tower as it headed out to sea damaging a 30 to 40 foot fender of steel on base of the bridge. Whether or not the suspicious ship accident and subsequent “repair” job will ultimately undermine the structural integrity of the bridge is not known, but the timely construction project could have theoretically provided necessary cover for the installation of demolition explosives in and around the Bay Bridge. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a nuclear attack. Curiously, on July 27, 2013, it was reported that a suspicious device had resulted in another S.F. Bay Bridge closure. Whether of not this closer was used for cover to insert or arm explosives on the bridge is not known, but 3 weeks later on August 15, 2013, officials announced the opening date for San Francisco-Oakland Bay Bridge.

2.8: The Golden Gate Bridge
The Golden Gate Bridge is a suspension bridge spanning the Golden Gate, the opening of the San Francisco Bay into the Pacific Ocean. On February 23rd, 2012, it was reported that the
Golden Gate Bridge in San Francisco would undergo a renovation project that will “take years to complete”. According to the report, the project involves repainting the two main suspension cables which are responsible for holding the bridge in place. Whether or not the suspicious “renovation” project will ultimately undermine the structural integrity of the bridge is not known, but the timely construction could have theoretically provided necessary cover for the installation of demolition explosives in and around the Golden Gate Bridge. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a nuclear attack. Prior to a high-profile terror attack or “natural disaster” resulting in the demolition of the Golden Gate Bridge, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda and government propaganda is a slick way of showing that yes, it can happen. On June 2nd, 2009, the Onion ran a story which openly joked about a “horrific attack on San Francisco’s Golden Gate Bridge, which “left thousands missing and assumed dead”. Three years later, Hollywood released “Rise of the Planet of the Apes” (2012), a film (see trailer) in which a monkey literally destroys the Golden Gate Bridge.

III. ANALYZING THE TRENDS:

original

3.1: Drone Terror Trending

Prior to a high-profile nuclear drone strike, the American public must be psychologically prepared to accept that this is in fact possible. Starting in July of 2013, there has been an unprecedented amount of drone-related headlines which will likely culminate in an unprecedented nuclear drone strike within the United States.

Drone Headlines:


1. March 5, 2013:
Pilot reports mysterious drone that could have caused crash over JFK airport
2. May 8, 2013:
New Terrorist Magazine Targets Obama, Drones
3. May 28, 2013:
American drone crashes amid militant fighting in Somalia
4. July 20, 2013:
FAA warns shooting at drone could result in prosecution similar to shooting at airplane
5. August 29, 2013:
Predator drone now part of battle against Yosemite wildfire
6. September 15, 2013:
Man dies after explosion by fire pit in North Carolina yard
7. September 15, 2013:
China builds fast to trigger drone race with America
8. September 25, 2013:
Look, no pilot! F-16 takes its first flight WITHOUT a human
9. October 3, 2013:
US, Japan to deploy new radar, drones in next year
10. October 8, 2013:
Soon, Drones May Be Able to Make Lethal Decisions on Their Own
11. October 21, 2013: Iran Gives Russia Copy of Downed U.S. Drone
12. October 22, 2013: China warns Japan over reported plan to shoot down drones

13. November 3, 2013: Pakistan reviews US relationship over Taliban drone kill
14. November 5, 2013: Exclusive: The CIA, Not The Pentagon, Will Keep Running Obama’s Drone War
15. November 7, 2013: Invasion: 7,500 drones in U.S. airspace within 5 years, FAA warns
16. November 13, 2013: Russia to Deploy Long-Range Attack Drone by 2016
17. November 17, 2013: Malfunctioned drone hits Navy ship during training
18. November 18, 2013: Advanced system to guard Russia from hi-tech surveillance, drone attacks
19. November 19, 2013: RT special report: US drone strike rips Yemeni community apart
20. November 19, 2013: Drone attacks ‘create more enemies with every innocent person killed’
21. November 19, 2013: Europeans Form ‘Drone Club,’ Want to Compete
22. November 21, 2013: U.S. drone strike kills 5 in Pakistan
23. November 22, 2013: Congress rejects mandatory numbering of drone casualties
24. November 22, 2013: China’s first stealth combat drone takes maiden flight – reports
25. November 26, 2013: Pakistan deploys first home-made drones
26. November 27, 2013:
Drone drops contraband into Georgia prison yard
27. November 27, 2013:
US Army equipping soldiers with fleet of bird-like drones
28. December 2, 2013: Amazon testing delivery by drone, CEO Bezos says
29. December 2, 2013: Underground drone economy takes flight
30. December 2, 2013: Self-Driving Nissan Electric Car Takes to Highway
31. December 2, 2013. Why Drone Delivery Will Be A Nightmare For Law Enforcement
32. December 3, 2013: UN starts drone surveillance in DR Congo
33. December 4, 2013: Anti-drone protests halt US military convoys at Pakistan border
34. December 5, 2013: Navy Launches a Drone from a Submerged Submarine
35. December 6, 2013: US tests classified spy drone with ‘superior stealth, efficiency capabilities’
36. December 6, 2013: Unmasked: Area 51′s Biggest, Stealthiest Spy Drone Yet
37. December 6, 2013: EXCLUSIVE: Secret New UAS Drone Shows Stealth, Efficiency Advances
38. December 8, 2013: Air hogs: Drones secret weapon in hunt for feral pigs
39. December 12, 2013: U.S. seeks spy edge with stealth drone
40. December 12, 2013: Drone strike kills 15 ‘wedding party-goers’ in Yemen
41. December 13, 2013: Pentagon unveils laser capable of shooting down drones, mortars
42. December 13, 2013: Declassified FBI docs detail warrantless drone surveillance
43. December 14, 2013: Agriculture the most promising market for drones
44. December 16, 2013: Yemeni parliament votes to ban drone attacks
45. December 18, 2013: Autonomous drones are the not-too-distant future of war
46. December 18, 2013: Colorado judge rules in favor of holding drone-hunting vote after legal fight
47. December 18, 2013: Search for crashed, missing NY-based military drone suspended until spring

[Does not purport to a complete list of headlines or events]

Medium_and_Intercontinental_Range_Ballistic_Missiles

3.2: Missile Terror Trending
Prior to a high-profile Chinese nuclear missile strike, the American public must be psychologically prepared to accept that this is in fact possible. Starting in July of 2013, there has been an unprecedented amount of missile-related headlines which will likely culminate in an unprecedented nuclear missile strike within the United States.

Missile Headlines:

1. July 6, 2013: Missile designed to intercept nukes fails weapon test
2. July 26, 2013:
Don’t Be Alarmed by the Drone Blimps They’re Here to Stop Cruise Missiles
3. August 13, 2013:
US Air Force unit operating nuclear missiles fails safety and security inspection
4. August 25, 2013:
Military removes nuclear weapons unit commander; decision follows security failure
5. September 15, 2013:
India conducts 2nd test flight of its nuclear- capable ‘Agni-V’ long-range ballistic
6. September 23, 2013:
N. Korea tests long-range rocket engine: US think-tank
7. September 22, 2013:
US Air Force test-launches intercontinental missile from California coast
8. October 16, 2013:
Inside the Ring: Russia to test new missile
9. October 24, 2013: Missile doors left open while Air Force nuclear officer slept
10. November 7, 2013: China Deploys New Bomber with Long-Range Land Attack Missile
11. November 17, 2013:
Russia starts ambitious super-heavy space rocket project
12. November 26, 2013:Iran, North Korea Secretly Developing Long-Range Rocket Booster for ICBMs
13. November 27, 2013:
Iran Announces Development of Ballistic Missile Technology
14. December 17, 2013: Russia plans new ICBM to replace Cold War ‘Satan’ missile
15. December 17, 2013: Iran Reveals New Details of Shoulder-Fired Missiles
16. December 17, 2013: Minuteman 3 test missile launches from central California coast
17. December 18, 2013: Russia Plans Rail-Mounted Missiles to Counter US Global Strike Program
18. December 18, 2013: Bombshell find: Couple discovers military rocket in new apartment

[Does not purport to a complete list of headlines or events]

nuclear_explosion

3.3: Nuclear Terror Trending
Prior to a high-profile nuclear attack, the American public must be psychologically prepared to accept that this is in fact possible. In 2013, there has been an unprecedented amount of nuclear and radiological-related headlines which will likely culminate in an unprecedented nuclear attack within the United States. Although most of the headlines are in respect to Fukushima, Iran and nuclear reactors in general, they invoke the fear of nuclear terror nonetheless.

2013 Nuclear Headlines:

1. January 5, 2013: Nuclear Security Helicopters Testing Radiation Levels Above DC Area
2. January 23, 2013: Weather Service: Nuclear Power Plant Causes Freak Snowstorm
3. January 29, 2013: Watch 5 nuclear power station towers collapse in slow motion
4. February 3, 2013: Security breach at nuke plant a wake-up call
5. February 4, 2013: Wyoming Teen, Builds Nuclear Fusion Reactor in Garage
6. February 7, 2013: San Onofre nuke plant operator disputes safety claim
7. February 9, 2013: Outage Shuts Down Plymouth’s Pilgrim Nuclear Power Plant
8. February 17, 2013: ‘No immediate risk’: Nuclear waste tank leaking in Washington
9. February 21, 2013: Mission to transport 23,000 liters of bomb-grade uranium from Canada to US
10. February 23, 2013: Governor: 6 tanks leaking radioactive waste at Washington nuclear site
11. February 23, 2013: Oregon senator to ask for GAO probe of Hanford nuclear site
12. February 25, 2013: Radiation Panic Grips Mumbai
13. February 26, 2013: Nuclear waste leak in Wash. “scandalous,” expert says
14. March 13, 2013: Iran’s Bushehr nuclear power plant taken off line over generator malfunction
15. March 15, 2013: Dirty bomb material secured in Philadelphia, thousands of sites remain in U.S.
16. March 15, 2013: Feds Swarm Metra Train After Detecting Nuclear Risk
17. March 18, 2013: Power outage at crippled Japanese nuclear plant
18. March 29, 2013: Safety: Jaczko Calls for Phaseout in US, Says Plants Aren’t Safe
19. April 1, 2013: Accident at Arkansas nuclear site kills man
20. April 2, 2013: Nuclear board warns of Washington tank explosion risk
21. April 6, 2013: Japan’s Fukushima nuclear plant leaks contaminated water
22. April 9, 2013: All US nuclear reactors should be replaced, ‘Band-Aids’ won’t help
23. April 10, 2013: Gulf States Fear Nuclear Radiation Leak after Iran Earthquake
24. April 12, 2013: Nuclear waste barrels remain strewn across floor of English Channel – report
25. April 13, 2013: DOE finalizing plans to dump man-made uranium in Nevada
26. April 14, 2013: Small Leak Is Discovered at Plant in Fukushima
27. April 15, 2013: Pilgrim Nuclear Plant forced to shut down
28. April 15, 2013: Emergency declared after fire at U.S. nuclear plant — Lasted almost 30 minutes
29. April 16, 2013: Two US nuke plants tighten security after blasts
30. April 18, 2013: After petition, atomic bomb re-enactment dropped from Ohio air show
31. April 18, 2013: Emergency declared at U.S. nuclear plant after lightning strike
32. April 19, 2013: ‘First terror drill at US nuclear plant a success’
33. April 21, 2013: Shots fired at TVA Watts Bar Nuclear Plant
34. May 6, 2013: Kewaunee to start powering down early Tuesday ahead of permanent closure
35. May 9, 2013: 83-year-old nun convicted of sabotage for breach of US atomic complex
36. May 11, 2013: Utility investigating vibrations that caused shutdown of nuclear reactor
37. May 13, 2013: Indian Point To Become First Nuclear Plant To Operate With Expired License
38. May 16, 2013: North Carolina nuclear plant shut down after crack discovered
39. May 17, 2013: Radioactive leak found at Palisades Nuclear Power Plant
40. May 23, 2013: Twin blasts in Niger hit uranium plant, barracks
41. May 25, 2013: Japanese research lab reports radiation leak
42. May 28, 2013: SKorea halts 2 nuclear plants for using control cables with fabricated test results
43. May 28, 2013: Seaweed causes shut down of multiple nuclear reactors
44. June 4, 2013: Cracks in Iran’s nuclear reactor facility following quakes – diplomats
45. June 7, 2013: U.S. orders new safety upgrades at nuclear plants
46. June 7, 2013: California utility says it will retire nuclear plant
47. June 10, 2013: Bushehr nuclear plant suffered electric generator malfunction
48. June 12, 2013: Obama Appointee Who Heads U.S. Nuclear Security Agency Is Hacked
49. June 23, 2013: U.S. engineers to inspect possible leak at Hanford nuclear site
50. July 15, 2013: Greenpeace activists break into French nuclear plant
51. July 24, 2013: Indian Point supervisor charged with lying to Nuclear Regulatory Commission
52. August 14, 2013: North Dakota terror drill deals with radiation devices stolen by terrorists
53. August 15, 2013:
Report: U.S. nuclear plants remain vulnerable to terrorists
54. August 15, 2013: Are U.S. Nuclear Reactors Protected Against Credible Terrorist Attacks?
55. August 15, 2013: Indian Point nuclear plant is vulnerable to terror attack: report
56. August 17, 2013:  Fukushima apocalypse: Duct tape fixes’ could result in ‘millions of deaths’
57. August 21, 2013: Tank at crippled Fukushima nuclear plant leaks highly radioactive water
58. August 22, 2013: Flier Busted For Iranian Uranium Export Scheme
59. August 28, 2013: Pa. nuclear plant security failings revealed in terror drill
60. September 20, 2013: Report: Nuke that fell on N.C. in 1961 almost exploded  
61. September 28, 2013:
No. 2 U.S. nuke commander suspended amid probe
62. October 1, 2013: Large Swedish nuclear reactor forced to shut after jellyfish clog water pipes
63. October 22, 2013: US nuclear missile launch officers repeatedly compromised bunker safety
64. October 22, 2013: A look at violations by officers in nuclear force
65. October 23, 2013: Air Force officials in charge of nukes left open blast door
66. October 24, 2013: Missile doors left open while Air Force nuclear officer slept
67. October 19, 2013: INTERPOL Exercise Boosts Radiological And Nuclear Terrorism Response
68. November 2, 2013: How a war game brought the world to the brink of nuclear disaster
69. November 12, 2013: US-Israeli computer super-worm hit Russian nuclear plant – Kaspersky
70. November 20, 2013:
Nuke troubles run deep; key officers “burned out”
71. November 20, 2013: Nuclear regulators crack firewalls to access porn
72. November 21, 2013: What’s the nuclear option?
73. December 17, 2013: Chinese rover diorama shows Europe being nuked
74. December 20, 2013: Report: Fired Nuke General Misbehaved in Russia

[Does not purport to a complete list of headlines or events]


About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the 2013 global bio-terror pandemic. To date, Truther.org has identified and exposed over 50 Obama sanctioned terror plots, as well as the Alex Jones’ links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. State-Sponsored Terror Threat Assessments (SSTTA), assertions, and forecasts made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically occur based on the cited date. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl XLV Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

Truther RSS

 

Black Friday

Download & Forward PDF

UPDATE: In yet another example of how terror drills always precede terror events, on December 20, 2013, it was revealed that a major cyber-attack had taken place on Black Friday (November 29, 2013) and that up to 40 million Target shoppers had their credit card information compromised. According to Brian Krebs, a journalist who specializes in computer security, the Target computer breach occurred on or around Black Friday, the busiest shopping day of the year.

David Chase Taylor
November 27, 2013
Truther.org

SWITZERLAND, Zurich — As previously reported in an article entitled, “Thanksgiving and Black Friday Cybergeddon Terror Attacks?”, there is a high probability that the American retail holidays known as Black Friday, and Cyber Monday may be targeted with state-sponsored cyber-terrorism.

As the November 26, 2013, headline “Cyberscammers take aim at Black Friday, Cyber Monday” suggests, cyber foul play appears imminent.

Download & Forward PDF

False-flag cyber-terror attacks, should they occur, would most likely transpire sometime between Thursday, November 28, 2012, and Monday, December 1, 2013. Cyber-attacks would likely target the U.S. electrical grid, financial institutions, credit card companies, retail computers, and travel related entities such as airports, bus stations and train terminals.

Twin reports dated November 23, 2013, entitled, “NSA hacked over 50,000 computer networks worldwide” and “NSA Infected 50,000 Computer Networks Worldwide With Malware”, have provided a timely motive for an impending cyber-terror attack that will predictably be scapegoated onto the state-sponsored terror group known as Anonymous.   

1. NATO’s “Cyber Coalition 2013”
In what appears to be cover for a major cyber-terror attack operation, it was reported on November 26, 2013, that
NATO has launched the “largest ever” cyber-security exercise entitled “Cyber Coalition 2013” which started on Tuesday, November 26, 2013, and runs through Black Friday, November 29, 2013. The stated goal of the operation is to “thwart massive, simultaneous attacks on member states and their allies”. According to reports, the three-day exercise will include participants from over 30 European states as well as 400 IT, government and legal experts from across the NATO alliance. In other words, it’s the largest cyber-terror drill ever, and everybody who is somebody in the field of state-sponsored cyber-terror will likely be in attendance. The obvious rhetorical question in respect to Cyber Coalition 2013 is: Why hold a massive drill on Black Friday unless a cyber-terror attack is already planned?

2. Cyber-Terror Doomsday Imminent
Since June of 2012, numerous propaganda articles have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”; “Former FBI Cyber Cop Worries About A Digital 9/11”; “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”; “Panetta: Cyber Threat Is Pre 9/11 Moment”; “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”; “Threat Of ‘Spectacular’ Cyberattack Looms”; U.S. homeland chief: cyber 9/11 could happen “imminently”; and “FBI: Cyber-attacks surpassing terrorism as major domestic threat”; indicates that an unprecedented act of state-sponsored cyber-terror in the United States is imminent. Exactly how a cyber-Doomsday will manifest itself is unknown, but a Black Friday cyber-terror attack appears to be the working plan at the moment.

3. Foiled Cyber-Terror Attacks
The chances of an unprecedented cyber-terror attack is extremely high considering that the Syrian Electronic Army set-up for a cyber-terror attack on the Minotaur V rocket launch of September 6, 2013. A few months later, the state-sponsored terror group known as “Anonymous” was caught red-handed plotting a November 5, 2013, cyber-terror attack on the Utah NSA Data Spy Center. Most recently, as depicted in the article entitled,
November 19, 2013 Minotaur I Rocket Launch (SSTTA): “Anonymous” Cyber-Terror Attack Set to Activate “GridEx II” Blackout”, another Anonymous cyber-terror attack was evidently foiled targeting the Minotaur I rocket launch in Virginia. Needless to say, cyber-terror is blinking red on every level.

4. “GridEx II” Cyber-Terror Drill:
Considering that on November 13-15, 2013, a massive power grid terror drill entitled “GridEx II” was executed on the East Coast of America, there is a real possibility that a massive cyber-terror attack on Thanksgiving weekend could turn out the lights on communities and retailers. According to the August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”

5. Blackout Déjà Vu
If and when a major cyber-terror attack occurs, it will most likely involve a lengthy blackout of the electrical grid. Predictably, it was reported on April 26, 2013, that the former CIA Director stated that the U.S. electrical grid is vulnerable to attack. Roughly 6 months later on October 17, 2013, it was reported that U.S. utilities are a “soft underbelly” for hackers. Shortly thereafter, “blackouts” have been trending in America. On November 1, 2012, just days prior to the 2012 Presidential Election, Hurricane Sandy allegedly cut off electricity to roughly 600,000 customers, including the New York skyline. Roughly 3 months later on February 3, 2013, Super Bowl XLVII was blackout for 34 minutes due to an alleged power outage. Interestingly, on September 1, 2013, former NFL star Ray Lewis had stated that the Super Bowl blackout was conspiracy against the Baltimore Ravens, his former team. Regardless of the alleged cause, there is a concerted effort to turn the lights off in America for good. One way to achieve this would be to execute a very public cyber-terror attack on Thanksgiving.

Blackouts Trending:

1. August 27, 2013:Man Steals Bucket Truck Causing Power Blackout (Elmont, New York)
2. September 3, 2013:
Venezuela Hit by Blackout, Govt Blames ‘Sabotage’ (Caracas; Venezuela)
3. September 5, 2013:
Nelson Mandela’s Home Hit by Power Cut (Johannesburg, South Africa)
4. October 16, 2013:
Power Outage at Tigers-Red Sox Game (Detroit, Michigan)
5. October 20, 2013:
East Coast Internet Traffic Is Restored (East Coast of U.S.)

6. Anonymous Terror Trending
Although there are likely many non-state actors affiliated with Anonymous, the logo of Anonymous depicts two Roman sheaves just like the United Nations’ logo. Anonymous also receive worldwide press which indicates that they are indeed a state-sponsored cyber-hacking group. After all, government only pimps their own and will not under any circumstance give publicity to their enemy or a cause they do not support. Based on the sheer amount of headlines and events in respect to Anonymous, the next act of cyber-terror will almost undoubtedly be scapegoated onto them.

Anonymous Terror Timeline:

1. July 21, 2013:
Anonymous” vows to hack government websites globally on November 5
2. August 23, 2013: Anonymous trolls FBI, releases contact data for all Fed employees
3. September 12, 2013: Anonymous member sentenced to three years for hacking police sites
4. October 3, 2013:
Anonymous busted: 13 hacktivists indicted over Operation Payback
5. October 8, 2013:
Anonymous plans Million Mask March on Washington
6. October 27, 2013:12yo Canadian boy hacked Govt sites, gave info to Anonymous for video games
7. November 1, 2013:
‘Anonymous’ hack Singapore newspaper’s website
8. November 15, 2013:
‘Anonymous’ big gets 10 years for hacking FBI
9. November 15, 2013:
B.S. ‘Anonymous’ Claim of 9/11 Style Attack in L.A. Today Goes Viral
10. November 16, 2013:
FBI: Anonymous engaged in year-long campaign targeting US Govt
11. November 17, 2013:
Anonymous hacking group targeting government websites, FBI warns

[Does not purport to be a complete list of events or headlines]

7. Obama Cyber-Attacks
In the aftermath of an unprecedented Anonymous cyber-attack, the recent glitches and shutdowns of the ObamaCare website will predictably be cited as Anonymous cyber-attacks. Since October 12, 2013, the infamous ObamaCare website has suffered at least 4 cyber-related outages while Obama’s Facebook and Twitter accounts have also been digitally compromised. These fabricated attacks were evidently executed to create a narrative whereby Obama himself is being targeted by hackers so that he can appear sympathetic to the public in the wake of unprecedented cyber-attacks which his administration sanctioned.

Obama-Related Cyber Attacks:

1. October 12, 2013:Tech experts wary of more Obamacare glitches
2. October 27, 2013: A Hacker Group Just Compromised a Page on Barack Obama’s Website
3. October 28, 2013:
Barack Obama’s social accounts target of Syrian Electronic Army
4. October 28, 2013:
ObamaCare website suffers new outage
5. November 14, 2013:
Official: Hackers tried repeatedly to attack Obamacare website
64 November 22, 2013: State confirms health website security breach

[Does not purport to be a complete list of events or headlines]

8. Cyber-Terror Attack Propaganda

In blatantly naked programming for an impending cyber-terror attack, on September 6, 2013, a USA Today propaganda report entitled “How Prepared Are You for a Cyberattack?” was published. According to the report, most major U.S. companies have been under siege by hackers over the last 18 months. The report depicts a grim post-cyber-attack world: “Imagine waking up one morning with no power. Cellphones can’t connect, banks are closed, the Internet is down and credit cards don’t work. In localized emergencies, workers from other areas help to restore services quickly. A cyber-attack could affect wide regions of the country, overwhelming the available manpower. It could take days, weeks or months for basic services to be fully restored. Not a pretty picture”. As evidenced, cyber-terror is at an all-time high and will likely culminate in an unprecedented cyber-terror attack that will forever change America.

2013 Cyber-Terror Headlines:

1. August 22, 2013:
Nasdaq: ‘Connectivity Issue’ Led To Three-Hour Shutdown
2. August 23, 2013:
Anonymous Trolls FBI, Releases Contact Data for All Fed Employees
3. August 24, 2013:
Mysterious Computer Glitch Hits Gitmo 9/11 Tribunal
4. August 27, 2013:
Napolitano warns large-scale cyber-attack on US is inevitable
5. August 27, 2013:
‘Largest Hack’ In Chinese History Has Beijing Stumped
6. August 27, 2013:
Syrian Electronic Army Takes Down New York Times Website and Twitter
7. August 28, 2013:
‘N.Y. Times’ Blames Hackers in Latest Website Crash
8. September 2, 2013:
Pro-Syrian Group Hacks U.S. Marines Website
9. September 5, 2013:
Romanian Hackers Get Hefty Sentences in New Hampshire
10. September 12, 2013:
Multiple NASA websites hacked
11. September 12, 2013:
Anonymous member sentenced to three years for hacking police sites
12. September 18, 2013:Brazilian hackers confuse NASA with NSA in revenge attack
13. September 22, 2013:China may be hiring hackers to access US drone technology
14. September 20, 2013:
Police nab U.K. cybercrime’s “Mr Big” after bank heist
15. September 21, 2013:
UK charges 4 men over $2.1 million cyber theft from Barclays Bank
16. September 23, 2013:
German group claims to have hacked Apple iPhone fingerprint scanner
17. September 24, 2013:
U.S. military’s battlefield network vulnerable to hackers
18. September 26, 2013:
UK secretly arrested 16-year old boy for world’s ‘biggest’ DDoS-attack
19. September 27, 2013:
71 iPads missing from Los Angeles schools, officials say
20. September 27, 2013:
Arrest made in Miss Teen USA ‘sextortion’ case
21. September 27, 2013:
Iran-backed hackers infiltrated Navy computers – US officials
22. October 3, 2013:
Iran’s cyber warfare commander shot dead in alleged assassination
23. October 3, 2013:Anonymous busted: 13 hacktivists indicted over Operation Payback
24. October 6, 2013:
LA officials seek fix to $1B program after students crack iPad security
25. October 7, 2013:
Anonymous to March on DC on Guy Fawkes Day
26. October 8, 2013:
Anonymous plans Million Mask March on Washington
27. October 12, 2013:
Tech experts wary of more Obamacare glitches
28. October 12, 2013:
Computer Glitch Blamed For Nationwide EBT System Shutdown On Saturday
29. October 17, 2013:
Power Plant Plight: US utilities’ soft underbelly for hackers
30. October 17, 2013:
The Fifth Estate Proves How Hard It Is to Make a Movie About the Internet
31. October 20, 2013:
Cheney feared heart device would be hacked in assassination effort
32. October 20, 2013:
East Coast Internet Traffic Is Restored
33. October 25, 2013:
NSA site went down due to ‘internal error’, not DDoS attack, agency claims
34. October 26, 2013:
Pentagon agency creating digital map of the world
35. October 27, 2013:
12yo Canadian boy hacked Govt sites, gave info to Anonymous
36. October 27, 2013:
A Hacker Group Just Compromised a Page on Barack Obama’s Website
37. October 28, 2013:
US State Department lacks any cyber-security whatsoever – report
38. October 28, 2013:
Barack Obama’s social accounts target of Syrian Electronic Army
39. October 28, 2013:
U.K. phone-hacking trial opens for top Murdoch aides
40. October 28, 2013:
ObamaCare website suffers new outage
41. October 29, 2013:
Nasdaq says “human error” to blame for earlier index data outage
42. October 30, 2013:
L.A. sets up command center to combat cyber-attacks
43. October 31, 2013:
Vandals spray swastikas over lenses of three speed cameras
44. November 1, 2013:
‘Anonymous’ hack Singapore newspaper’s website
45. November 2, 2011:
20 U.S. And Latin American Cities Host “Hackathon’ To Help Migrants
46. November 3, 2013:
Hackers deface dozens of websites in Australia, Philippines
47. November 4, 2013:
Thieves swipe school-issued iPads
48. November 5, 2013:
Govt Agencies Have No Way of Warning Each Other About a Cyber Attack
49. November 6, 2013:
WEEEEEEE?! FOX news website features headlines, ‘tech error’ blamed
50. November 11, 2013:
Anonymous factions threaten cyber-war on one another over anti-NSA hacks
51. November 12, 2013:
US-Israeli computer super-worm hit Russian nuclear plant – Kaspersky
52. November 12, 2013:
Stuxnet virus has infected the International Space Station
53. November 12, 2013:
Is Cyber War Around the Corner?
54. November 14, 2013:
FBI: Cyber-attacks surpassing terrorism as major domestic threat
55. November 14, 2013:
Hackers accessing info via baby monitors
56. November 14, 2013:
Official: Hackers tried repeatedly to attack Obamacare website
57. November 14, 2013:
Anonymous: False Flag attack on Citi Bank Building downtown LA (VIDEO)
58. November 15, 2013:
‘Anonymous’ big gets 10 years for hacking FBI
59. November 15, 2013:
B.S. ‘Anonymous’ Claim of 9/11 Style Attack in L.A. Today Goes Viral
60. November 16, 2013:
FBI: Anonymous engaged in year-long campaign targeting US Govt
61. November 17, 2013: Anonymous hacking group targeting government websites, FBI warns
62. November 19, 2013: Hackers ‘Jumping The Air Gap’ Would ‘Disrupt The World Balance Of Power’
63. November 21, 2013: 6 most dangerous cyberattacks

64. November 22, 2013: State confirms health website security breach
65. November 23, 2013:
NSA hacked over 50,000 computer networks worldwide – report

66. November 23, 2013:
NSA Infected 50,000 Computer Networks Worldwide With Malware: Report
67. November 26, 2013:
Assange might face computer fraud indictment
68. November 26, 2013:
Cyberscammers take aim at Black Friday, Cyber Monday
69. November 26, 2013:
NATO launches ‘largest ever’ cyber-security exercises

[Does not purport to be a complete list of events or headlines]

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the 2013 global bio-terror pandemic. To date, Truther.org has identified and exposed over 50 Obama sanctioned terror plots, as well as the Alex Jones’ links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. State-Sponsored Terror Threat Assessments (SSTTA), assertions, and forecasts made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically occur based on the cited date. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl XLV Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

Truther RSS

Anonymous

Download & Forward PDF

UPDATE II: On Wednesday, November 6, 2013, the Soyuz spacecraft will be launched from the Baikonur Cosmodrome in Kazakhstan to the International Space Station (ISS). The launch is currently scheduled to be shown “live” on the big screen TV in Times Square in New York City. On September 6, 2013, the Minotaur rocket launch was targeted by the Obama administration for a cyber attack, so the notion that the Soyuz launch could also be targeted in an Anonymous-like cyber attack is a real possibility.

UPDATE I: On November 3, 2013, hackers affiliated with “Anonymous” defaced dozens of websites in Australia and the Philippines. The attacks were apparently the opening salvo of an onslaught of upcoming Anonymous cyber terror attacks which will likely climax on November 5, 2013. On November 4, 2013, it was reported that thieves had stolen over 50 laptops and iPads from a school district in San Jose, California. Whether or not these particular computers will be used in Anonymous related cyber-attacks is not known, but the timely reporting of the thefts which have occured over the last 2 years is highly suspicious.


David Chase Taylor

November 3, 2013
Truther.org

SWITZERLAND, Zürich — Just as President Obama’s poll numbers have fallen to all-time low, it appears that an unprecedented cyber-terror attack by the state-sponsored terror group known as “Anonymous” may occur just prior to, during or after November 5, 2013.

An Anonymous cyber-attack, should it happen, will most likely consist of an attack on the NSA’s new “Utah Data Spy Center” which will likely result in the collapse, malfunction and/or explosion of U.S.-related infrastructure on the west coast of America (e.g., the electoral grid, dams, oil, gas, nuclear, water and sewer facilities), including the four “secret” Google Barges.

Download & Forward PDF

Predictably, it was reported on October 17, 2013, that U.S. utilities are a “soft underbelly” for hackers, ultimately creating plausible deniability for the Obama administration. Eleven days later on October 28, 2013, a report stated that the U.S. State Department lacks any cyber-security whatsoever and therefore is completely vulnerable to a cyber-attack.

Aside from the fact that CNN stated on March 13, 2013, that cyber-attacks top the U.S. threats for 2013, it was reported on April 26, 2013, that the former CIA Director stated that the U.S. electrical grid is vulnerable to cyber-attacks. If and when the power goes out, a mass panic will ensue which will inevitably cause a run on the stock market which was predicted on August 8, 2013.

Although a major cyber-attack could be scapegoated onto “The Unknowns”, the SEA (Syrian Electronic Army), or China, as witnessed in Operation Aurora, it will most likely be pinned onto a teenage kid (11 to 17-years old) allegedly associated with the state-sponsored terror group known as Anonymous.

Coincidentally, it was reported on October 30, 2013, that China moved a spy ship off the coast of Hawaii. As is par for the state-sponsored terror course, intelligence agencies often prime more than one scapegoat for any given terror related event in order to give themselves options in the aftermath of the attack.

In order to sell the notion of a cyber-attack to the American public, Google and its parent company the NSA have strategically placed Google Barges in San Francisco Bay as well on the East Coast of America. In a cyber-attack, the Google barges will likely blow up due the attack—likely due to overheating of some other fabricated excuse.

Therefore, a “shock and awe” cyber-terror attack must be executed after 2:00 AM on Sunday, November 3, when the United States turns back the clock one hour, to 1:00 AM due to Daylight Savings Time. This will ensure that it is dark outside when the Google Barges and oil and gas facilities are detonated, providing for vivid explosions in the night sky.

Operation Urban Shield 2013 (San Francisco, California)
As with most state-sponsored terror plots, a massive terror drill is executed just prior. Coincidentally a terror exercise entitled
Operation Urban Shield 2013 was recently executed in San Francisco, California, from October 25 through October 28, 2013. The terror operation is a “full-scale regional preparedness exercise” whose overarching goals include “managing large scale events” as well as “respond[ing] to, and recover[ing] from terrorist incidents or related catastrophic events by providing planning, training, equipment and exercises to the UASI region”. The massive terror drill included: 110 regional fire departments from all over the state of California; 14 national agencies; 56 federal agencies; 7 international agencies; and 158 corporate sponsors. Although not yet confirmed, it would appears that Urban Shield 2013 is the largest terror drill ever conducted.

New Cyber-Terror Command Center (Los Angeles, California)
In order to compliment the aforementioned Operation Urban Shield 2013 terror exercise, the city of Los Angeles has set up a new cyber-terror command center to combat cyber-attacks. According to the report, Los Angeles Mayor Eric Garcetti stated that new command center was built to “minimize the threat that hackers, terrorists or foreign enemies will disrupt computer water, power, transportation and public safety systems”. The “Cyber Intrusion Command Center” was created by an executive directive from the Obama administration in order to fend off computer attacks aimed at critical infrastructure that could cause panic, destruction and effectively paralyze the nation. Garcetti stated that the new command center will be working directly with the FBI and U.S. Secret Service to serve as a “rapid reaction force” to cyber-attacks” and “It will also plan for continuity for recovery in case of a severe attack on our city”.

New NSA “Spy Center” (Salt Lake City, Utah)
In order to create a formidable target prior to an “Anonymous” cyber-terror attack, the NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center“, was completed in September of 2013. The $1.5B data center is located at Camp Williams, Utah, just 25 miles (40 km) south of Salt Lake City. In order to bring unprecedented media attention to the Utah Data Center just prior to a major cyber-terror attack on it, a COINTEL group entitled “Restore the 4th” has begun protesting the NSA Spy Center by taking part in Utah’s Adopt-A-Highway program which predictably granted them the highway adjacent to the new federal spy complexAs recently witnessed in the staged LAX shooting which allegedly resulted in the deaths of two TSA employees, the suspect known as Paul Ciancia believed his constitutional rights were being violated by TSA searches. Paul, who is currently being held on murder charges, shares the name of Ron and Rand Paul, two U.S. politicians who are cheerleaders in the movement to restore the U.S. Constitution. In the aftermath of an NSA cyber-terror attack, it’s highly likely that a Ron or Rand Paul supporter who felt their 4th Amendment was being violated will be scapegoated for the attack.

I. NOVEMBER FIFTH:

Remember, Remember, the Fifth of November
November 5
commemorates Guy Fawkes’ failed 1605 Gunpowder Plot to blow up the Houses of Parliament in London, England. The foiled terror attack which was made popular by the “V for Vendetta” (2005) film (see trailer) which glorified the notion of terrorism and paved the way for the emergence of the state-sponsored terror group known as Anonymous. The movie’s most iconic line is “Remember, remember, the fifth of November”.The subconscious programming of the Guy Fawkes-like Anonymous mask has been recently evident throughout pop culture: Alleged Freemason Kanye West has been inexplicably performing concerts in various masks; Samsung has conducted publicity stunts involving hooded men with Guy Fawkes-like face paint popping up in football stadiums around the world; and the movie “Escape Plan” (2013) staring Schwarzenegger and Stallone which features a villain prison guards in a mask (see trailer). Needless to say, mask-like terror is blinking red on every lever.

November 5: Trafalgar Square (London, England)
Due to the 6-hour time difference between Europe and America, the fist “Anonymous”-like event is scheduled to begin on the afternoon of November 5, 2013 (Guy Fawkes Day) at Trafalgar Square. Attendees are invited “to a friendly gathering of the minds. A tea party, so to speak, as a collective we can trade our ideas and share them with the world”. Considering that Guy Fawkes was from England and squares around the world have recently been home to a number of terror-related incidents (see below), it is highly likely that mayhem and chaos in the form of a riot, fires and violence may erupt in London prior to making its way over to the United States.

Square Terror Timeline:

1. October 17, 2013:
Union Square Briefly Evacuated Over Report (San Francisco, California)
2. October 25, 2013: Fire Breaks out at Iconic Macy’s Herald Square
(New York, New York)
3. October 30, 2013: China police hold five over Tiananmen Square ‘terror attack’
(Beijing, China)
4. November 1, 2013:
4 hurt as scaffolding collapses in Times Square (New York, New York)
5. November 2, 2013:
Man Brain Dead After being found in Union Square (New York, New York)
6. November 3, 2013:
Mother and kids escape shooting in Memorial Square (Springfield, Illinois)
7. November 3, 2013:
6th man arrested in shooting of 13 at Cornell Square Park (Chicago, Illinois)

[Does not purport to be a complete list of events or headlines]

November 5: Anonymous March (Washington, D.C)
Come November 5, 2013, an
Anonymous march will commence in Washington, D.C. According to reports, flyers begun appearing around downtown D.C. advertising the “Million Mask March,” which will take place on Guy Fawkes Day. So-called “Hacktivists” are slated to gather at the National Mall on November 5th to march for a vast number of causes and issues. Washington, D.C. has been recently targeted by the Obama administration for terror and therefore an attack during the march is highly likely. Other November 5th rallies and vents are also slated to occur around the world on Guy Fawkes Day (e.g., Abuja; Nigeria; Athens, Greece; London, England; Zapata, Texas; and Zurich, Switzerland).

November 5: Anonymous Attack?
(Globally)

On July 21, 2013, it was reported that the state-sponsored terror group known as
“Anonymous” has vowed to hack government websites globally on November 5, 2013. According to reports, Anonymous has threatened to target all government facilities across the globe on November 5, 2013, calling on activists to mark the day with protests in support of the Occupy movement, a movement completely unrelated to state-sponsored terror. Anonymous’ post on YouTube reportedly stated, “Now it’s time to occupy everywhere…Anonymous #NOV5TH 2013 – the lion sleeps no more”. Anonymous is calling for “a day of global civil disobedience” and their video urges to ‘relight the flame of protest’, adding that “austerity means war”.

Anonymous Terror Trending
Although there are likely many non-state actors affiliated with Anonymous, the
logo of Anonymous depicts two Roman sheaves just like the United Nations’ logo. Anonymous also receive worldwide press which indicates that they are indeed a state-sponsored cyber-hacking group. After all, government only pimps their own and will not under any circumstance give publicity to their enemy or a cause they do not support.

Anonymous Terror Timeline:

1. July 21, 2013:
Anonymous” vows to hack government websites globally on November 5
2. August 23, 2013: Anonymous trolls FBI, releases contact data for all Fed employees
3. September 12, 2013: Anonymous member sentenced to three years for hacking police sites
4. October 3, 2013: Anonymous busted: 13 hacktivists indicted over Operation Payback
5. October 8, 2013:
Anonymous plans Million Mask March on Washington
6. October 27, 2013: 12yo Canadian boy hacked govt sites, gave info to Anonymous for video games
7. November 1, 2013:
‘Anonymous’ hack Singapore newspaper’s website

[Does not purport to be a complete list of events or headlines]

Capitol Building Attack
In keeping with the spirit of the “V for Vendetta” film (see trailer) which glorifies the failed 1605 Gunpowder Plot by Guy Fawkes to blow up the Houses of Parliament in London, England, a November 5th Anonymous attack would not be complete without an attack on a government building. The most likely targets include but are not limited to: the United States Capitol Building in Washington, D.C.; the California State Capitol Building in Sacramento, California; and the Utah State Capitol Building in Salt Lake City, Utah. Coincidentally, the U.S. Capitol Building and Washington, D.C. have been targeted on multiple occasions by the Obama administration in 2013. Also, on October 22, 2013, a man attempted to attack the Utah State Capitol when he reportedly drove his truck up the steps of the building.  

The Fifth Estate Propaganda Film
In what appears to be pre-November 5 terror programming, the “
The Fifth Estate” film (see trailer) opened on October 18, 2013. The film about Julian Assange and WikiLeaks curiously bears the number and name the “Fifth” it its title, a timely coincidence to be sure. Predictably, the trailer features the U.S. Capitol Building and the actor playing Assange states: “Man is least himself when he talks in his own person. But if you give him a mask he will tell you the truth”. The trailer also features the words “Without crashing the system” in the trailer, potentially foreshadowing that the system will be crashed on the fifth.

II. NSA CYBER-TERROR:

NSA Cyber-Terror Motive

In order to create a “motive” for an unprecedented cyber-terror attack targeting the NSA and the Obama administration, the public must first be fed a steady stream of anti-NSA propaganda prior to the cyber-attack in order to sell the notion that a group like Anonymous would in fact attack the NSA. Starting on October 20, 2013, there has been a number of high-profile incidents including but not limited to the President of Mexico, the Chancellor of Germany Angela Merkel, the Pope, Yahoo and Google which were concocted to show the illegality of the NSA in respect to spying, a violation of the Fourth Amendment of the U.S. Constitution as well as International Law. As evidenced on October 25, 2013, the NSA was reportedly the victim of a cyber-attack, an ominous sign that it will be attacked again in the near future. In order to give the Obama administration plausible deniability in the aftermath of an NSA cyber-attack, it was reported on November 2, 2013, that Kentucky Senator Rand Paul stated that the NSA has gone “too far” and that Obama’s cell could be tapped.

NSA Spying Headlines:

1. October 20, 2013: Fresh Leak on US Spying: NSA Accessed Mexican President’s Email
2. October 25, 2013: NSA site went down due to ‘internal error’, not DDoS attack, agency claims
3. October 27, 2013: Obama ‘knew and approved’ NSA spying on Chancellor Merkel – report
4. October 29, 2013: NSA stores data to target any citizen at any time – Greenwald
5. October 30, 2013: NSA ‘spied on future Pope Francis during Vatican conclave’
6. October 30, 2013: NSA infiltrates links to Yahoo, Google data centers worldwide
7. November 2, 2013: Rand Paul: Obama’s cell could be tapped; NSA gone ‘too far’

[Does not purport to be a complete list of events or headlines]

Obama Cyber-Attacks
In the aftermath of an unprecedented Anonymous cyber-attack, the recent glitches and shutdowns of the ObamaCare website will predictably be cited as cyber-attacks. Since October 12, 2013, the infamous website has suffered at least 2 cyber-related outages while Obama’s Facebook and Twitter accounts have also been digitally compromised. These fabricated attacks were executed to create a narrative whereby Obama himself is being victimized and targeted by hackers.

Obama-Related Cyber Attacks:

1. October 12, 2013: Tech experts wary of more Obamacare glitches
2. October 27, 2013: A Hacker Group Just Compromised a Page on Barack Obama’s Website
3. October 28, 2013: Barack Obama’s social accounts target of Syrian Electronic Army
4. October 28, 2013: ObamaCare website suffers new outage


The Google Barges (U.S. Coast)
In an unprecedented NSA cyber-attack, Google must also be publically attacked in order for the general public to feel the pain of the attack. In order to sell the notion of a Google attack to the public, Google has placed “secret” barges off the shore of the U.S. in at least 4 locations (e.g., San Francisco, California; Portland, Maine; New London, Connecticut; and a second barge in San Francisco, California). In order to bring unprecedented attention to the Google Barges before they are slated to explode in the NSA cyber-terror attack, the U.S. Coast Guard reportedly visited the two San Francisco Google Barges on November 2, 2013. In order to answer the question posed by the Boston Globe as to why Google went to sea, the simple answer is that it’s all part of an elaborate state-sponsored cyber-terror plot. In order to link Google to the NSA as well as create plausible deniability for Google’s  corporate executives in on the cyber-terror plot, it was reported on October 30, 2013, that Google has denied NSA cooperation and that the NSA has infiltrated Yahoo and Google data centers worldwide.

III. CYBER TERORISM:

Cyber-Terror Attack Propaganda

In blatantly naked programming for an impending cyber-terror attack, on September 6, 2013, a USA Today propaganda report entitled “
How Prepared Are You for a Cyberattack?” was published. According to the report, most major U.S. companies have been under siege by hackers over the last 18 months. Only two days after Janet Napolitano’s speech warning of an impending cyber-attack, a hacker group called the Syrian Electronic Army hacked the New York Times’ website and their Twitter, for the second time in 2013. The report depicts a grim post-cyber-attack world: “Imagine waking up one morning with no power. Cellphones can’t connect, banks are closed, the Internet is down and credit cards don’t work. In localized emergencies, workers from other areas help to restore services quickly. A cyber-attack could affect wide regions of the country, overwhelming the available manpower. It could take days, weeks or months for basic services to be fully restored. Not a pretty picture”

Cyber-Terror Headlines:

1. August 22, 2013:
Nasdaq: ‘Connectivity Issue’ Led To Three-Hour Shutdown
2. August 23, 2013:
Anonymous Trolls FBI, Releases Contact Data for All Fed Employees
3. August 24, 2013:
Mysterious Computer Glitch Hits Gitmo 9/11 Tribunal
4. August 27, 2013:
Napolitano warns large-scale cyber-attack on US is inevitable
5. August 27, 2013:
‘Largest Hack’ In Chinese History Has Beijing Stumped
6. August 27, 2013:
Syrian Electronic Army Takes Down New York Times Website and Twitter
7. August 28, 2013:
‘N.Y. Times’ Blames Hackers in Latest Website Crash
8. September 2, 2013:
Pro-Syrian Group Hacks U.S. Marines Website
9. September 5, 2013:
Romanian Hackers Get Hefty Sentences in New Hampshire
10. September 12, 2013:
Multiple NASA websites hacked
11. September 12, 2013:
Anonymous member sentenced to three years for hacking police sites
12. September 18, 2013:Brazilian hackers confuse NASA with NSA in revenge attack
13. September 22, 2013:China may be hiring hackers to access US drone technology
14. September 20, 2013:
Police nab U.K. cybercrime’s “Mr Big” after bank heist
15. September 21, 2013:
UK charges 4 men over $2.1 million cyber theft from Barclays Bank
16. September 23, 2013:
German group claims to have hacked Apple iPhone fingerprint scanner
17. September 24, 2013:
U.S. military’s battlefield network vulnerable to hackers
18. September 26, 2013:
UK secretly arrested 16-year old boy for world’s ‘biggest’ DDoS-attack
19. September 27, 2013:
71 iPads missing from Los Angeles schools, officials say
20. September 27, 2013:
Arrest made in Miss Teen USA ‘sextortion’ case
21. September 27, 2013:
Iran-backed hackers infiltrated Navy computers – US officials
22. October 3, 2013:
Iran’s cyber warfare commander shot dead in alleged assassination
23. October 3, 2013:
Anonymous busted: 13 hacktivists indicted over Operation Payback
24. October 6, 2013:
LA officials seek fix to $1B program after students crack iPad security
25. October 7, 2013:
Anonymous to March on DC on Guy Fawkes Day
26. October 8, 2013:
Anonymous plans Million Mask March on Washington
27. October 12, 2013:
Tech experts wary of more Obamacare glitches
28. October 12, 2013:
Computer Glitch Blamed For Nationwide EBT System Shutdown On Saturday
29. October 17, 2013:
Power Plant Plight: US utilities’ soft underbelly for hackers
30. October 17, 2013:
The Fifth Estate Proves How Hard It Is to Make a Movie About the Internet
31. October 20, 2013: Cheney feared heart device would be hacked in assassination effort
32. October 20, 2013: East Coast Internet Traffic Is Restored
33. October 25, 2013: NSA site went down due to ‘internal error’, not DDoS attack, agency claims
34. October 26, 2013: Pentagon agency creating digital map of the world
35. October 27, 2013: 12yo Canadian boy hacked govt sites, gave info to Anonymous
36. October 27, 2013: A Hacker Group Just Compromised a Page on Barack Obama’s Website
37. October 28, 2013: US State Department lacks any cyber-security whatsoever – report
38. October 28, 2013: Barack Obama’s social accounts target of Syrian Electronic Army
39. October 28, 2013: U.K. phone-hacking trial opens for top Murdoch aides
40. October 28, 2013: ObamaCare website suffers new outage
41. October 29, 2013: Nasdaq says “human error” to blame for earlier index data outage
42. October 30, 2013: L.A. sets up command center to combat cyber-attacks
43. October 31, 2013: Vandals spray swastikas over lenses of three speed cameras

44. November 1, 2013:
‘Anonymous’ hack Singapore newspaper’s website
45. November 2, 2011:20 U.S. And Latin American Cities Host “Hackathon’ To Help Migrants

[Does not purport to be a complete list of events or headlines]

Cyber-Terror Doomsday
Since June of 2012,
numerous propaganda articles have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, “Threat Of ‘Spectacular’ Cyberattack Looms” and “U.S. Homeland Chief: Cyber 9/11 Could Happen “Imminently“, all indicate that an unprecedented act of state-sponsored cyber-terror upon the United States is imminent. Exactly how a cyber-Doomsday will manifest itself is unknown, but “Live TV” cyber-terror attack appears to be the working plan at this given time.

IV. CYBER-TERROR PATSIES:

Teenage Cyber-Attack
Prior to a high profile cyber-terror attack by a teenager affiliated with “
Anonymous”, the public must first be psychologically programed to accept that this is in fact possible. Starting in September of 2013, there has been an unprecedented amount of news and events in respect to teenagers which has been subconsciously programming the masses for teen-related cyber-attack. A preview of this type of pasty programming was reported on September 26, 2013, when England arrested a 16-year old boy for a distributed-denial-of-service (DDoS) attack which was touted as ““biggest cyber-attack in the history of the internet.” Roughly a month later on October 27, 2013, a 12-year old Canadian boy plead guilty to hacking government websites and giving the information to Anonymous. A major teenage cyber-terror attack effectively turn every kid with a computer into a suspected terrorist and would undoubtedly usher in draconian internet regulation—most likely starting with the RFID micro-chip which will be used to identify internet users. As evidenced below, headlines involving underage individuals are trending and will likely culminate in an unprecedented cyber-terror attack on U.S. government related infrastructure such as the NSA.

Teen Terror Timeline:

1. September 26, 2013: UK arrests 16-year old boy for world’s ‘biggest’ DDoS cyber-attack
2. October 6, 2013: 9-Year Old “Street Smart” Boy Hops on Flight to Las Vegas Alone

3. October 23, 2013: Girl, 14, dies after allegedly being gang-raped, burned alive in India

4. October 23, 2013: California Sheriff’s Deputies Shoot, Kill 13-Year-Old

5. October 24, 2013: 14-year-old went to movies after killing teacher

6. October 24, 2013: 11-year old busted with 400 rounds of ammunition, gun, knives: cops
 
7. October 24, 2013: Saudi air force sergeant found guilty of sexually assaulting 13-year-old

8. October 24, 2013: 14-year old uses box cutter used to kill Mass. math teacher
9. October 27, 2013: Miley’s Kid Sis 13-Yr-Old Illegal Driver Tools Around with Billy Ray
10. October 27, 2013: 12yo Canadian boy hacked govt sites, gave info to Anonymous
11. November 1, 2013: Police say teacher raped 16-year-old student in school 
12. November 3, 2013:
Police: 10-year-old’s body found in trash can

[Does not purport to be a complete list of events or headlines]

iPad Cyber Attack?
Recent headlines emanating from Los Angeles, California, suggest that a cyber-attack may come from one of the
71 iPads which went “missing” on September 27, 2013 from the Los Angeles school district. According to a secondary report dated October 6, 2013, Los Angeles officials are seeking to fix a $1B program after students crack iPad security, potentially insinuating that students have mastered government security and therefore are capable of launching a full-scale cyber-terror attack. The stolen iPads essentially give the government plausible deniability in the wake of a major cyber-attack emanating from a public school computer, a government device.

V. POWER GRID BLACKOUT
:

Blackout Deja Vu
If and when a major cyber-terror attack occurs, it will most likely involve a lengthy blackout of the electrical grid. Predictably, it was reported on
April 26, 2013, that the former CIA Director stated that the U.S. electrical grid is vulnerable to attack. Roughly 6 months later on October 17, 2013, that U.S. utilities are a “soft underbelly” for hackers. As evidenced, “blackouts” have been trending starting on November 1, 2012, just days prior to the 2012 Presidential Election, when Hurricane Sandy allegedly cut off electricity to roughly 600,000 customers, including the New York skyline. Roughly 3 months later on February 3, 2013, Super Bowl XLVII was blackout for 34 minutes due to an alleged power outage. Coincidentally, on September 1, 2013, former NFL star Ray Lewis had stated that the Super Bowl blackout was conspiracy against the Baltimore Ravens, his former team. Only 4 day later on September 5, 2013, just prior to the 2013 NFL’s kick-off game between the Denver Broncos and the Baltimore Ravens, the game was postponed by the NFL for roughly 30 minutes due to non-existent lightening.

Blackouts Trending:

1. August 27, 2013: Man Steals Bucket Truck Causing Power Blackout (Elmont, New York)
2. September 3, 2013: Venezuela Hit by Blackout, Govt Blames ‘Sabotage’ (Caracas; Venezuela)
3. September 5, 2013: Nelson Mandela’s Home Hit By Power Cut (Johannesburg, South Africa)
4. October 20, 2013: East Coast Internet Traffic Is Restored (East Coast of U.S.)
5. October 16, 2013:
Power Outage at Tigers-Red Sox Game  (Detroit, Michigan)

[Does not purport to be a complete list of events or headlines]

Cyber-Terror Drill: “GridEx II”

In apparent preparation for a massive cyber-terror attack targeting the U.S. power grid, on August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “…Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”

VI. ECOTERRORISM:

Ecoterrorism
Recent headlines in respect to “Ecoterrorism” suggest that the cyber-terror attack on U.S. infrastructure will result in catastrophic environmental damage due to oil, gas and nuclear facilities being compromised. Coincidentally, on October 10, 2013, an
ecoterrorism suspect plead guilty to aiding arsons in Western states after 7 years on the run. Roughly a month later on November 3, 2013, more than 10,000 French protesters clash with police over ‘ecotax’, further highlighting ecoterrorism just prior to an unprecedented cyber-terror attack. Potentially foreshadowing the notion that oil rigs will be seized by hackers, it was reported on November 1, 2013, that Venezuela seizes US-owned oil rigs in dispute over unpaid bills.

U.S. Oil & Gas Terror
Aside from the6 terror attacks on oil and gas pipelines internationally, there have been 3 oil and gas pipeline terror cases within the U.S. since 9/11. On September 29, 2004, it was reported that two New Caney, Douglas Lloyd Crosby and Dennis Wade Durrenberger Jr., were arrested and charged with criminal mischief, a first degree felony, in connection with a pipeline explosion that caused many to be evacuated from their New Caney homes. Three years later on June 2, 2007, it was reported that four would-be terrorists had hatched a plot to blow up Kennedy Airport and swaths of Queens by attacking fuel tanks and an underground pipeline by igniting a catastrophic explosion that would eclipse 9/11. According to the report, one of the suspects boasted to a federal informant that “he had a vision that would make the World Trade Center attack seem small“. Roughly six weeks later on July 13, 2007, it was reported that a Pennsylvania man, Michael C. Reynolds, was convicted of providing material support to terrorists in trying to help al-Qaida blow up U.S. oil pipelines and refineries.

TSA Pipeline Threat Assessment (2008)
A October 23, 2008, report from the Transportation Security Administration Office of Intelligence and the U.S. Department of Homeland Security entitled “TSA Pipeline Threat Assessment” stated that “Improvised explosive devices have been the preferred method of attack against gas and oil facilities worldwide” and that “the U.S. system and its related infrastructure remain an
attractive target to both terrorists and domestic extremists alike, as long stretches of open unattended pipeline are difficult to protect and the economic impact of attacks would be significant…Al-Qa’ida, in particular, has noted the potentially damaging impact pipeline attacks—both in the United States and abroad—would have on the Homeland’s economy, national security, and public health and psychology. Al-Qa’ida’s demonstrated capability and intent to target oil and gas infrastructure overseas, and the group’s desire to continue attacks in the Homeland, suggest similar attacks could occur inside the United States.

TSA Liquid and Natural Gas Pipeline Threat Assessment (2011)
A January 18, 2011, report from the TSA Office of Intelligence Pipeline Modal Threat Assessment and the U.S. Department of Homeland Security entitled “
TSA Liquid and Natural Gas Pipeline Threat Assessment 2011” stated that “There were 44 suspicious pipelines, and related oil and natural gas SARs reported to TSA-OI from January 2010 to October 2010.21 Suspicious activities near pipelines and related infrastructure may indicate an interest to collect information for a future attack, or the desire to identify vulnerabilities or test a pipeline facility’s security and response operations”. The report further states that “Terrorist groups have discussed attacks on unspecified SCADA systems, but it is uncertain whether al-Qa’ida or any other group has the capability to conduct a successful cyber-attack.19 TSA-OI is not aware of any credible, specific threat reporting targeting U.S. pipelines’ industry control systems or the supervisory control and data acquisition networks.”

Oil & Gas Terror Trending
Prior to a high cyber-terror attack targeting oil and gas facilities, the public must first be psychologically programed to accept that this is in fact possible. Starting in October of 2013, there has been an unprecedented amount of news and events in respect to oil and gas explosions which has been subconsciously programming the masses for impending infrastructure related cyber-terror attacks.
As the October 23, 2013, headline “Rebels blast gas pipeline near Damascus causing southern Syria blackout
” ominously foreshadowed, an attack on gas and oil facilities will inevitably cause a major blackout.

Oil & Gas Terror Timeline:

1. October 1, 2013: Libya Berbers keep gas pipeline cut for third day (Libya)
2. October 9, 2013:
4 killed, 33 injured in gas explosion in China (Beijing, China)
3. October 9, 2013:
Natural Gas Pipeline Explosion under Investigation (Harper County, Oklahoma)
4. October 10, 2013:
Shell-Nigeria: New leaks force another closure of oil pipeline (Nigeria)
5. October 15, 2013: Man hurt in suspected gas blast (Londonderry, Ireland)
6. October 16, 2013: Mexico gas blast death toll rises to six
(Mexico)
7. October 17, 2013: Damaged gas line likely caused fiery explosion (Peoria, Arizona)
8. October 18, 2013: One Killed in Gas Leakage in Refinery (Mathura, India)
9. October 19, 2013: 3 killed in Peshawar gas blast (Peshawar, Pakistan)
10. October 23, 2013: Burglar could have caused gas explosion (Sheraden, Pennsylvania)
11. October 23, 2013: Rebels blast gas pipeline causing southern Syria blackout
(Syria)
12. October 24, 2013:Gas Explosion At Northern Illinois Campgrounds (Sublett, Illinois)
13. October 28, 2013:
St Jude’s Storm: two dead in gas explosion (Hounslow, London)
14. November 1, 2013:
Venezuela seizes US-owned oil rigs in dispute over unpaid bills (Venezuela)

[Does not purport to be a complete list of events or headlines]

The Hoover Dam
The Hoover Dam is a concrete arch-gravity dam in the Black Canyon of the Colorado River, on the border between the U.S. states of Arizona and Nevada. On January 15, 2013, it was reported that the federal Occupational Safety and Health Administration (OSHA) had found 58 violations at Nevada’s Hoover Dam, the hydroelectric power plant east of Las Vegas. According to the report, OSHA found numerous superficial violations but stated that “none of the violations jeopardized the safety of the public or threatened the structural integrity of the dam or its operations”. A month later on February 12, 2013, a 5.2 Magnitude Earthquake struck Tonopah Junction, Nevada, just 215 miles north of Las Vegas. If a man-made earthquake strikes anywhere near the 77 year old Hoover Dam, it will likely “crack” (with a little help from demolition explosives) resulting in a massive local tidal wave and an electrical power blackout blanketing California, Arizona and Nevada. With no power, no airport, no gambling, no air conditioning, no sewage system and no way out, tourists and locals alike would begin looting as riots and mayhem would breakout almost instantaneously. Needless to say, without power, Las Vegas and Los Angeles would turn into an unprecedented biological cesspool almost overnight. Coincidentally, on August 2, 2013, it was reported that police found a body at the Hoover Dam, likely the result of a suicide. Only 11 days later on August 13, 2013, it was reported that 2 people were hurt in an accident on the Arizona side of the Hoover Dam Bridge. Needless to say, the recent death and accident appear to be an ominous sign that the Hoover Dam is doomed.

About the Author

David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the 2013 global bio-terror pandemic. To date, Truther.org has identified and exposed over 50 Obama sanctioned terror plots, as well as the Alex Jones’ links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. State-Sponsored Terror Threat Assessments (SSTTA), assertions, and forecasts made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically occur based on the cited date. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl XLV Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Blessed are the Peacemakers. Namaste


Truther RSS

EMP NY

Download & Forward PDF

UPDATE 2: Within 24 hours of being unable to execute the Syrian Electronic Army cyber-terror attack depicted herein, Obama officially hinted that he may abanodon a strike on Syria altogether.

UPDATE 1: Less than 24 hours after the following Truther.org report was published, the LADEE spacecraft quickly “ran into equipment trouble” after its launch into space. According to the report, the “problem needs to be resolved in the next two to three weeks”, potentially indicating that the mission is doomed and that the spacecraft will eventually self-destruct. 

David Chase Taylor
September 6, 2013
Truther.org

SWITZERLAND, Zürich — Unable to conduct their Al Qaeda/Syrian Rebel chemical terror attack on America soil on August 24, 2013, the Obama administration and it’s rabid Zionist puppeteers have once again had to rewrite the Syrian terror narrative. While Obama waits to receive U.S. Congressional approval for his premeditated attack on Syria, it’s quite clear that the administration lacks both international and domestic support for a new war.

Download & Forward PDF

Therefore, the real terrorists must somehow radically alter public opinion and the best way to do that is by conducting a major false-flag terror operation. A new terror attack would galvanize support for Obama globally while simultaneously giving him the green light to attack American gun owners at home with unmanned drones. Naturally, this type of aggression by Obama would spark a civil war—exactly what it’s intended to do.

The Nuclear “Minotaur V”
Based on breaking news and events, it appears that there is a real possibility of a major state-sponsored cyber-terror attack targeting the Minotaur V rocket launch and the U.S. power grid. According to NASA, on September 6, 11:27 p.m. (EDT), the Minotaur V rocket will launch from the Mid-Atlantic Regional Spaceport Pad 0B at the Wallops Flight Facility in Virginia. Minotaur V will allegedly be carrying the Lunar Atmosphere and Dust Environment Explorer (LADEE) satellite into orbit. The Minotaur V was derived from the Minotaur IV, itself a derivative of the nuclear LGM-118 Peacekeeper ICBM. Minotaur V’s launch will be the first lunar mission to be launched from Virginia and is anticipated to be visible along much of the eastern seaboard from New York to Virginia. Why this particular rocket is being launched from Virginia as opposed to Florida is highly suspicious, especially considering the launch is scheduled for a Friday night in a calculated move to gain the most “live” viewers. Should the rocket be attacked, it is possible that its explosion could have an EMP-like effect as a burst of electromagnetic nuclear radiation causes a blackout of the U.S. electrical grid over New York City and a majority of the East Coast.

Resurrecting Obama
As luck would have it; the eyes of the sporting world will be focused on New York City as it hosts the 2013 U.S. Open until September 9, 2013. Coincidentally, Obama will be in attendance at the G-20 Summit in Saint Petersburg, Russia until at least September 6, 2013, so it would be the perfect opportunity for him to grandstand and act “presidential” in the wake of an unprecedented terror attack. Although numerous cyber-patsies have been primed for such an event, the attack will likely be blamed on Syrian Electronic Army who were conveniently added to the FBI’s wanted list on September 6, 2013. If the Minotaur V rocket launch is suddenly canceled or postponed, it will most likely indicate that the payload had been changed and the terror plot was canceled.

Bent Spear 2013
A Bent Spear refers to incidents involving nuclear weapons, warheads, components or vehicles transporting nuclear material which violate or breach handling or security regulations. For only the second time in history, a “bent spear” was reported on September 3, 2013, when Inforwars/STRATFOR released a propaganda article entitled “Exclusive: High Level Source Confirms Secret US Nuclear Warhead Transfer” which stated that a U.S. nuke was on the loose and was headed to South Carolina. Two days later on September 5, 2013, Infowars/STRATFOR released another report entitled “Sen Graham Warns of Nuke Strike After Missing Warheads Report” in which Lindsay Graham reiterated the fear mongering propaganda report in further collusion between the Obama administration and Alex Jones. In the wake of an EMP-like nuclear blast over the East Coast, it is highly likely that Jones will state that this missing nuke was used in the attack.

Cyber-Terror Drill: “GridEx II”
In apparent preparation for a massive cyber-terror attack targeting the U.S. power grid, on August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “…Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyberattacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”

DHS Warns of Major Cyber-Terror Attack
As is generally par for the false-flag terror course; governmental agency heads tend to foreshadow major terror events in a calculated bid to gain plausible deniability. On August 27, 2013, former U.S. Department of Homeland Security (DHS) Chief Janet Napolitano explicitly warned that the DHS must prepare for an inevitable large-scale cyberattack against the United States and that her new successor should move fast to strengthen the nation’s cyber-defenses. At Napolitano’s farewell speech at the National Press Club, she stated: “Our country will, at some point, face a major cyber-event that will have a serious effect on our lives, our economy and the everyday functioning of our society. While we have built systems, protections and a framework to identify attacks and intrusions, share information with the private sector and across government, and develop plans and capabilities to mitigate the damage, more must be done, and quickly”. Recent headlines in respect to cyber-related terror attacks and hackers indicate that cyber-terrorism is blinking red on every level.

Cyber-Terror Attack Headlines:

1. August 22, 2013: Nasdaq: ‘Connectivity Issue’ Led To Three-Hour Shutdown
2. August 23, 2013: Anonymous Trolls FBI, Releases Contact Data For All Fed Employees
3. August 24, 2013: Mysterious Computer Glitch Hits Gitmo 9/11 Tribunal
4. August 27, 2013: Napolitano warns large-scale cyberattack on US is inevitable
5. August 27, 2013: ‘Largest Hack’ In Chinese History Has Beijing Stumped
6. August 27, 2013: Syrian Electronic Army Takes Down New York Times Website And Twitter
7. August 28, 2013: ‘N.Y. Times’ Blames Hackers In Latest Website Crash
8. September 2, 2013: Pro-Syrian Group Hacks U.S. Marines Website
9. September 5, 2013: Romanian Hackers Get Hefty Sentences In New Hampshire

[Does not purport to be a complete list of events or headlines]

Cyberattack Propaganda Report
In blatantly naked programming for an impending cyber-terror  attack, on September 6, 2013, a USA Today propaganda report entitled “How Prepared Are You For A Cyberattack?” was published. According to the report, most major U.S. companies have been under siege by hackers over the last 18 months. Only two days after Janet Napolitano’s speech warning of an impending cyberattack, a hacker group called the Syrian Electronic Army hacked the New York Times’ website and their Twitter, for the second time in 2013. The report depicts a grim post-cyberattack world: “Imagine waking up one morning with no power. Cellphones can’t connect, banks are closed, the Internet is down and credit cards don’t work. In localized emergencies, workers from other areas help to restore services quickly. A cyberattack could affect wide regions of the country, overwhelming the available manpower. It could take days, weeks or months for basic services to be fully restored. Not a pretty picture”.

Cyber Doomsday
Since June of 2012, numerous propaganda articles have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, “Threat Of ‘Spectacular’ Cyberattack Looms” and “U.S. Homeland Chief: Cyber 9/11 Could Happen “Imminently“, all indicate that an unprecedented act of state-sponsored cyber-terror upon the United States is imminent. Exactly how a cyber-Doomsday will manifest itself is unknown, but “Live TV” cyber-terror attack appears to be the working plan at this given time.

A Potential Motive
In the aftermath of a major cyber-attack on the United States emanating from Syria, a plausible motive for the attack must be floated to the public by the media. Coincidentally, on August 29, 2013, a report entitled “Satellites Over Pakistan Guided Bin Laden Raid, Leaked NSA Documents Say” was published which stated that a fleet of NSA satellites collecting electronic intelligence over Pakistan guided the raid by U.S. Navy SEALs that allegedly killed Osama bin Laden. Regardless of the fact that bin Laden was reported killed on December 26, 2001, the NSA satellites purportedly tracked phone and communications among al Qaeda operatives, ultimately linking them to the Abbottabad, Pakistan compound where bin Laden allegedly was hiding. Whether or not the a future Syrian based cyber-attack will be blamed on the Assad regime or the Syrian Rebels is not known, but sympathy for bin Laden could serve as a potential motive in either case.

I. CYBER-ATTACK PATSIES:

Cyber-Terror Patsies
In the aftermath of major state-sponsored terror attacks, intelligence agencies such as the CIA and the FBI like to have at least three or four different sets of well-groomed patsies. This allows for flexibility when it comes to arrests, propaganda, and an inevitable response. In respect to cyber-terror, Truther.org has identified at least 4 patsies (e.g., the Syrian Electronic Army, Anonymous, the Unknowns, and China) which could ultimately be blamed in the wake of an attack on a NASA ICBM rocket launch.

Syrian Electronic Army (SEA)
As previously mentioned, the Obama administration was unable to conduct the Al Qaeda/Syrian Rebel chemical attack on America soil on August 24, 2013, and therefore they now need a new reason to attack Syria. Coincidentally, on September 6, 2013, a report entitled “FBI Adds Syrian Electronic Army To Wanted List” stated that the Syrian Electronic Army (SEA), an alleged group of hackers sympathetic to Syrian President Bashar Assad, has been added to the FBI‘s most wanted list. According to the report, the SEA is responsible for major cyberattacks on the New York Times, their Twitter, the Huffington Post, the U.S. Marine Corps, the Washington Post, Thomson Reuters and the Associated Press’ Twitter feed. As a result of AP Twitter attack, the Associated Press falsely reported that President Obama had been injured in a surprise attack on the White House, causing a brief panic online. The tweet caused the U.S. stock market to fall by over 150 points.

Syrian Cyber War Trending
Based on breaking news and events, it’s quite likely that the Syrian Electronic Army (SEA) will be implicated in the aftermath of the next major cyber-attack, ultimately giving Obama the reason he so desperately needs to attack Syria. As evidenced below, Syrian hackers have been implicated in at least 7 cyber-related attacks on U.S. based entities within just the last 30 days.

Syrian Electronic Army:

1. August 15, 2013: CNN, Washington Post, Time Hacked By Syrian Electronic Army
2. August 27, 2013: Syrian Electronic Army Takes Down New York Times Website And Twitter
3. August 28, 2013: Obama Hits Pause On U.S. Action In Face Of Crippling Cyber Strikes From Syria
4. August 30, 2013: Syria’s Cyber Retaliation Signals New Era Of Warfare
5. August 31, 2013: Syria Facing U.S. Cyber Attacks In Upcoming Strikes
6. September 2, 2013: Pro-Syrian Group Hacks U.S. Marines Website
7. September 4, 2013: Syrian Electronic Army Denies Being Attacked By Anonymous
8. September 6, 2013:
FBI Adds Syrian Electronic Army To Wanted List
9. September 6, 2013:
FBI Warns Of Syrian Electronic Army Hacking Threat

[Does not purport to be a complete list of events or headlines]

U.S. Domestic Patsies
As depicted in the September 6, 2013, report entitled “FBI Adds Syrian Electronic Army To Wanted List”, the Federal Bureau of Investigation (FBI) has stated that any U.S. citizen found to be aiding the Syrian Electronic Army (SEA)hackers will be investigated as a terrorist. In the wake of a Syrian based cyberattack, it should come as no surprise if Americans are implicated. Linking the Syrian Rebels to American patriots who come from the Rebel South has been the working plan since the U.S. went into Libya a week after the failed nuclear terror attack on Super Bowl XLV on February 6, 2011. Coincidentally, on September 6, 2013, it was reported that SWAT teams in Florida are conducting terror drills against “native-born America-hating terrorists”  further indicating that innocent American citizens will be targeted in the aftermath of a major cyber-related terror attack.

Tri-State Hackers
In the aftermath of a major false-flag cyber-attack targeting a rocket from Virginia flying over New York, hackers would be likely be arrested and implicated in the attack. Recent news stemming from the tri-state region suggests that a number of potential patsies have already been primed for the attack. On August 27, 2013, it was reported a Metropolitan Transportation Authority (MTA) worker stole a bucket truck from its facility in Jamaica, Queens, around 4 a.m. According to the report, the driver extended its boom and drove off, pulling down a dozen utility poles and knocking out power to more than 6,000 customers around Elmont, New York. The bucket truck and several welding machines were reportedly discovered missing at 6 a.m. Although it was unclear whether the incident intentional or accidental, police allegedly arrested the driver and charges are pending. Two days later on August 29, 2013, it was reported that large amounts of copper were stolen from Fort Monroe buildings in Hampton, Virginia. According to the report, the purported theft was bold because Hampton has a police officer who patrols the fort 24 hours a day. Whether or not the two previous cases have anything to do with the Brooklyn Bridge incident (see below) is not known, but any suspicious activity in the target area that have to do with electrical components, communication, military bases and welding machines is highly suspect.

Brooklyn Bridge Mystery Man
If a successful cyber-attack was launched against the Minotaur V rocket, it’s theoretically possible that the hackers would have set-up a homing device to guide the rocket to a particular target location such as the Empire State Building, the Freedom Tower, the U.S. Open, or the Brooklyn Bridge.  Coincidentally, on July 4, 2013, it was reported that witnesses saw a man rappelling down from the Brooklyn Bridge in New York City. Interestingly, the bridge was “under construction” at the time of the incident. Whether or not the construction compromised the structural integrity of the bridge is not known, but the timely closure could have theoretically provided cover for the installation of demolition explosives in and around the Brooklyn Bridge. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a terrorist attack. Prior to a high-profile terror attack on the Brooklyn Bridge, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “The Dark Knight Rises” (2012) is a film (see trailer) which depicts the Brooklyn Bridge as the target of a major terror attack.

“The Unknowns”
Prior to a major domestic cyber-related terror attack, the government must first create trade-specific patsies who will later take the blame. On May 3, 2012, a report entitled, “New ‘Unknowns’ Hacking Group Hits NASA, Air Force, European Space Agency” was published which stated that a group calling itself “The Unknowns” had published a list of passwords and documents reportedly belonging to NASA, the European Space Agency and the U.S. Air Force, among other high-profile government targets. Although no one from the Unknowns has been implicated in the May 2013 attacks, they could be the top suspect in future NASA related cyber-attacks.

“Anonymous”
In more apparent foreshadowing of cyber-related event to come, on July 17, 2013, a report entitled “#Nov5th 2013: Anonymous Pledges To Hack Govt Websites Globally On Guy Fawkes Day” was published which reported that the government hacking group known as “Anonymous” is actively seeking to launch a cyber-attack in the next few months. Whether or not they will stick to the date of November 5, 2013 is not known, but due to their popularity as an anti-government entity, they would be an easy scapegoated for any future cyber-related attack.

“China “
The nation of China has been directly implicated in multiple cyber-related attacks on NASA, U.S. satellites, and the International Space Station. Should future space terror strike America, there is a good possibility that China could be scapegoated for the attacks. On October 28, 2011, it was reported that Chinese hackers may have interfered with two US satellites on four separate occasions. Five months later on March 1, 2012, it was reported that a laptop stolen from NASA last year was unencrypted and contained command and control codes for the International Space Station on it. The particular laptop in question was one of 48 NASA notebooks or mobile devices stolen between April 2009 and April 2011. Although China has not been directly implicated in the thefts, based on their cyber-related crimes against NASA, they are the top suspect. Six days later on March 7, 2012, it was reported that Chinese hackers had gained ‘full access’ to the computer network in one of NASA’s key control centers, the Jet Propulsion Laboratory (JPL). The JPL manages 23 spacecraft on active space missions, including missions to Jupiter, Mars and Saturn.

II. BLACKOUT:

Blackout Deja Vu
In the aftermath of a successful cyber-attack against the Minotaur V rocket, it is highly plausible that the exploding rocket and satellite will emit EMP-like waves which inevitably be blamed for a subsequent blackout. Blackouts are just another form of state-sponsored terrorism and have been trending as of late. For example, on November 1, 2012, just days prior to the 2012 Presidential Election, Hurricane Sandy allegedly cut off electricity to roughly 600,000 customers, including the New York skyline. Roughly 3 months later on February 3, 2013, Super Bowl XLVII was blackout for 34 minutes due to an alleged power outage. Coincidentally, on September 1, 2013, former NFL star Ray Lewis had stated that the Super Bowl blackout was conspiracy against the Baltimore Ravens, his former team. Only 4 day later on September 5, 2013, just prior to the 2013 NFL’s kick-off game between the Denver Broncos and the Baltimore Ravens, the game was postponed by the NFL for roughly 30 minutes due to non-existent lightening. Predictably, the Super Bowl blackout was r discussed at length on the television broadcast, ultimately rehashing the blackout for millions of fans the day before the scheduled rocket launch in Virginia.

What is an EMP?

An electromagnetic pulse (EMP) is a burst of electromagnetic radiation which usually results from a high energy nuclear explosion that suddenly fluctuates the magnetic field. Theoretically, an EMP could wipe out everything electronic (planes, trains, cars, computers, internet, etc.) in a flash. EMP terror has gained popularity of late and has been featured in movies such as “The Matrix” and television shows such as “24” and the #1 show on NBC entitled “Revolution”, which eerily features a post-EMP America with no electricity. Aside from the Hollywood EMP propaganda, there has been recent EMP terror legislation by the U.S. congress, a number of EMP terror conferences, and EMP terror scholarly whitepapers which have all been preparing local, state and federal officials for an upcoming EMP terror attack on America. Based on the 12 major power outages in 2012 alone, it appears that the U.S. government is programming the public for the permanent loss of electricity. Coincidentally, in September of 2012, Alex Jones of Infowars released a new magazine which indicates that the STRATFOR intelligence operation known as Infowars knows that the internet is about to expire and have planned ahead by launching a new propaganda magazine. In the propaganda film entitled “Red Dawn” (2012), (See: Trailer) a group of American youth out partying after a football game, suddenly find themselves in the middle of a major blackout, likely from an EMP attack.

Blackouts Trending:

1. August 27, 2013: Man Steals Bucket Truck Causing Power Blackout (Elmont, New York)
2. September 3, 2013: Venezuela Hit By Blackout, Govt Blames ‘Sabotage’ (Caracas; Venezuela)
3. September 5, 2013: Nelson Mandela’s Home Hit By Power Cut (Johannesburg, South Africa)

Conclusion
To date, Truther.org has thwarted two major state-sponsored nuclear terror attacks by the Obama administration (i.e., “Super Bowl XLV Nuclear Terror Plot” and the “Live TV” Cyber-Hijack With “Live” Nuclear Detonation”). Realistically speaking, the only way to defeat the current establishment is with information, for it kills both terrorists and dictators alike. It is imperative to remember that violence of any kind MUST be avoided at all costs for it plays right into their hand. By educating yourself and those around you, America and the world will inevitably see who is really pulling the strings of terror.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the 2013 global bio-terror pandemic. To date, Taylor has exposed over 50 Obama sanctioned terror plots, as well as Alex Jones’ affiliation to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. Terror related assertions, forecasts and predictions made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically happen based on the cumulative terror related data. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl XLV Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Namaste

Live TV Nuke

Download & Forward PDF

BREAKING NEWS UPDATE: On July 2, 2013, it was reported that China will hold their “largest-ever naval drills” beginning on July 5 through July 12, 2013. Although it has yet to be confirmed, it appears that the sudden inclusion of Russia in the drills is an intelligence PSYOP meant to muddy the waters in respect to the now exposed plot by China to attack the United States around the 4th of July. The article was clear to point out that China and Russia will also participate in another drill on July 27 through August 15, 2013, providing even more cover for the now foiled Chinese attack plot.

David Chase Taylor
June 30, 2013
Truther.org

SWITZERLAND, Zürich As nuclear terror whistleblower David Chase Taylor’s case against the Obama administration for premeditated nuclear terrorism works its way up the court system of Switzerland, a new nuclear terror plot to hijack TV stations worldwide a detonate a nuclear bomb on “Live TV” has been identified.

Due in part to the escalating exposure of Taylor’s case as well as the unprecedented awakening of humanity worldwide, the rabid Zionist establishment, who was caught red-handed attempting to conduct a nuclear holocaust at Super Bowl XLV in Dallas, Texas, on February 6th, 2011, are apparently pulling out all the stops and going for broke in a desperate move to distract the world from their wicked acts of terrorism and usury.

Download & Forward PDF

Based on breaking news and events depicted herein, it now appears that the Zionists have authorized the Chinese government to execute a controlled “surprise” attack against the United States and Japan starting in July of 2013. This unprovoked attack will likely kick-off with a series of escalating Chinese terror attacks against western U.S. cities (i.e., Seattle, Washington, Portland, Oregon, and San Francisco, California) followed by a full-scale invasion of key U.S. military bases in the Pacific theater (i.e., Okinawa, Japan, Iwo Jima, Japan, and Pearl Harbor, Hawaii).

Once America and the world are collectively glued to their respective television sets, TV channels worldwide will be simultaneously held hostage in an unprecedented act of cyber-hijacking as the Chinese attack culminates with “Live TV” nuclear detonation in an American city with a recognizable skyline (i.e., Seattle—Space Needle, San Francisco—Golden Gate Bridge or St. Louis, MissouriGateway Arch).

Depending on how the world reacts to the first ever “Live” nuclear attack, a second nuclear detonation will likely target another city in the United States or Europe, quite possibly Paris, France. In order for a nuclear attack to be the most psychologically terrorizing, a well-known landmark (e.g., the Twin Towers on 9/11) must be destroyed in the attack to serve as a life-long reminder of that horrific day.

The Chinese surprise-attack depicted herein is slated to be eerily reminiscent of the December 7, 1941, Japanese attack on Pearl Harbor, and will undoubtedly spark a nuclear war between the United States and China which recent Truther.org reports such as, “Chinese “Kamikaze” Done Attack On Pearl Harbor Hawaii Imminent” and “Red Dawn Scenario: Chinese Attack On America Imminent” have attempted to thwart.

Make no mistake about it—China is fully under Zionist control and do ONLY do as they are told. Remember, American factories and military technology did not just “accidentally” make its way to China; the transfer of power from the U.S. to China has been a long standing program headed by the likes of Henry Kissinger. By starting World War III, the U.S. government can reinstated the military draft, open FEMA concentration camps nationwide, invoke martial law and initiate the global bio-terror pandemic planned for 2013. Ultimately, it’s a win, win, win, for the Zionists for they get to kill off their political opposition (U.S. military, patriots, gun owners, conservatives, etc.), get rich off war contracts, and their crimes against humanity will once again be hidden in the wake of terrifying nuclear attacks.

July 4th Attack

Although a Chinese attack on America could come at any time, a “Live TV” cyber-hijack and nuclear detonation will most likely occur on
July 4th, 2013, America’s 237th birthday. Prior to a high-profile nuclear detonation on the 4th of July, the American public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. On March 22nd, 2013, a propaganda film entitled “Olympus Has Fallen” (2013) was released (see trailer) in which Washington D.C., America’s capital, was brutally attacked by an ex-North Korean terrorist on the day after the 4th of July. The movie was clear to depict classic Independence Day symbology such as red, white and blue banners, balloons and ribbons. Coincidentally, on May 2nd, 2013, it was reported that the alleged Boston Bombers had initially planned a July 4th attack, giving further credence to the notion that this date has been chosen for terror by the intelligence community. A couple months later on June 28th, 2013, ABC News ran a headline which stated “Feds Worry About July 4 Fireworks Bombs”, the key words being “July 4” and “Bombs”.  According to the report, the FBI has vocalized paramount concern for July 4th, 2013, because masses of revelers are expected to pack city centers and other locations which could be an “an opportunity to perpetuate a mass casualty attack”. Coincidentally, Zionist operative Adam Kokesh, who allegedly works for Obama’s “Revolution Czar”, will be holding an armed protest in Washington D.C. on July 4th, 2013. Should a nuke be detonated on “Live TV”, a bloody riot in America’s capital will likely ensue and spread like a pandemic throughout the United States. 

Hollywood Foreshadowing
As witnessed prior to the 9/11 Attacks, 2011 Super Bowl Nuke Plot (4:12 in video) and the recent Boston Bombings, Hollywood foreshadowing aka predictive programming has become standard operating procedure; the “Live TV” cyber-hijack and nuclear attack is no different. On November 25th, 2012, the hit terror series entitled “Homeland”, aired an episode entitled “Two Hats” (S2E21), which just happened to feature a storyline in which terrorist leader “Abu Nazir” was plotting a terror attack on the U.S.  and planned to film the terror attack on “Live TV” and broadcast it globally. Roughly 7 months later on June 27th, 2013, the hit television show starring Charlie Sheen entitled “Anger Management“, aired an episode entitled “Charlie And The Hot Nerd” (S2E36), in which Charlie’s TV is hijacked by his girlfriend’s x-boyfriend who was an alleged “hacker for the CIA. In short, the x-boyfriend hacks Charlie’s computer, appliances and television and is shown talking to Charlie from inside Charlie’s own TV, eerily similar to the photo depicted right. Watch Anger Management episode here.

Asian/Pacific Surprise “Attack” Propaganda
Prior to a high-profile Asian based Pacific coast attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., America’s capital, is ambushed in a surprise attack by an ex-North Korean terrorist with military aircraft, suicide bombers and cyber-warfare. On July 12th, 2013, the film “Pacific Rim” (2013) (see trailer) will be released which features a story line in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to trailer, their first three attacks target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico. If and when this Hollywood terror programming will manifest in reality is unknown, but it is definitely in the cards.

“Live TV” Nuclear Detonation
Due to the 30-60 second nature of a nuclear explosion, venues such as the NFL Super Bowl, FIFA World Cup, NBA Finals, MLB World Series and the Olympic Games are optimal targets for nuclear terror mainly due to the potentially hundreds of millions watching on “Live TV”. However, since the nuclear attack on Super Bowl XLV was ultimately foiled, a new plot to terrorize humanity with “Live TV” nuclear attack had to be orchestrated. For those who think a Chinese nuclear attack on the U.S. is laughable, consider this: On September 30th, 2012, it was reported that the White House was attacked by hackers allegedly linked to China’s government. The unprecedented cyber-terror attack targeted the U.S. government’s most sensitive computer networks, ultimately breaching a system used by the White House Military Office for nuclear commands. Interestingly, only 9 months later on June 27th, 2013, the U.S. and Japan held war games off the coast of California imitating a Chinese Invasion.

Cyber-Related Nuclear Terror
Prior to a high-profile “Live TV” cyber-hijack and subsequent nuclear detonation, the public must be psychologically prepared to accept that this is in fact possible. Zionist media and Hollywood movie propaganda is a slick way of showing that yes, it can happen. Based purely on research conducted to date, the marriage between cyber-terror and nuclear terror was first made on February 19th, 2013, when a CNN headline entitled “Former CIA Official: Cyber War ‘More Sinister Than Nuclear Age’” first paired the terms “cyber” and “nuclear” together in the same sentence. Roughly a month later on March 22nd, 2013, the propaganda film entitled “Olympus Has Fallen” (2013) was released (see trailer) in which Washington D.C., America’s capital is attacked by an ex-North Korean terrorist who wants to hack the White House computer network and detonate American nuclear warheads while in their respective missile silos. Exactly a month later on April 22nd, 2013, the Wall Street Journal ran a headline entitled “China: Cyberattacks Are Like Nuclear Bombs”, ultimately linking the words “China”, Cyberattacks” and “Nuclear Bombs” in the same sentence. Roughly two months later on June 28th, 2013, another propaganda film entitled  “White House Down” (2013), was released (see trailer) in which Washington D.C., America’s capital, was attacked by hackers attempting to breach the U.S. Department of Defense’s computers to access the “Nuclear Football”, the briefcase used by the President of the United States to initiate nuclear war.

Emergency “Nuclear Terror” Meetings
Just 6 days prior to the planned nuclear attack at Super Bowl XLV, then U.S. Secretary of State Hillary Clinton called an historic first of its kind ambassadors meeting in Washington D.C., which lasted from January 31, 2011, until February 4, 2011. The meeting was so important to matters of state that ambassadors from all 260 U.S. embassies and consulates in more than 180 countries were ordered present. Fast forward roughly 27 months to May 24th, 2013, when 85 nations and four official observers met for the Global Initiative to Combat Nuclear Terrorism (GICNT) in Mexico City, Mexico, to discuss “nuclear terrorism”. Exactly a month later on June 24th, 2013, it was reported that the International Atomic Energy Agency (IAEA) is scheduled to hold an emergency meeting on July 1st through July 5th, 2013, in Vienna, Austria, with members from 112 countries and 20 organizations to again discuss “nuclear terrorism”. Aside from giving government officials plausible deniability in the aftermath of a nuclear attack, these nuclear “prep” meetings are used by the Zionist establishment to instruct their minions on the policies and procedures they will need to adhere to as the world officially enters the terrifying age of nuclear terrorism.

President “O-Bomb-a”
Despite the growing evidence that
nuclear bombs are not exactly what they are cracked up to be, U.S. President Barack “O-bomb-a”, real name Barry Soetoro, is the anointed nuclear president. Therefore, until Obama is ousted from public office, the world will be under the threat of state-sponsored nuclear terrorism. As with any legal matter, a full, independent and open investigation must be conducted prior to filing any legal charges. However, after reviewing the documented evidence in respect to the following nuclear terror cases, it is abundantly clear that the Obama administration is in fact guilty of premeditated nuclear terrorism.

Foiled Obama Nuclear Terror Plots:

1. February 6, 2011: Super Bowl XLV Nuclear Terror Plot (Dallas, Texas)
2. December 31, 2011:
New Year’s Eve Times Square Dirty Bomb Plot (New York City, New York)
3. April 18, 2013:
U.N. Dirty Bomb And U.S. Nuclear Reactor Attack Plot (New York City & Pennsylvania)
4. July ? 2013: “Live TV” Cyber-Hijack And Nuke Attack Plot (Unknown)

Nuclear Scapegoats
A “Live TV”
cyber-hijack may be the moment when the world finds out that the government funded cyber-hacking terror group known as “Anonymous” is in fact the cover for a Chinese military hacking operation. After all, Guy Fawkes masks which are worn by members of Anonymous do appear to have unmistakably Asian features. Other potential nuclear terror scapegoats include Al Qaeda, Pakistan, Chechen terrorists or rough Chinese terrorists who allegedly plotted to bomb the 2008 Beijing Olympics. However, based on the evidence depicted herein, it is most likely a “Live TV” cyber-hijack and subsequent nuclear detonation will be blamed directly on the Chinese government so that World War III between the United States and China can commence.

NASA’s Nuclear Photos
In order to get the most “bang for their buck”, no pun intended, a nuclear detonation must be photographed and videotaped from all different angles in order to be more vividly terrorizing. As seen just prior to the foiled Super Bowl XLV nuclear terror plot on February 6th, 2011, NASA’s “Discovery” shuttle took off on its last mission on February 3rd, 2011, to “document the event”. Just like in 2011, this upcoming “Live TV” cyber-hijack and subsequent nuclear detonation will also be photographed and videotaped from space as NASA just launched a satellite entitled “Interface Imaging Spectrograph” (IRIS) on June 27th, 2013, to study how material heats up and gathers energy as it travels through space. IRIS will also study this energy’s impact on our planet’s climate. In other words, in the after-math of a nuclear attack, the energy released from the nuclear weapons will be used as justification for “Global Warming” legislation and the new taxes that it will bring, irregardless of the cloud-seeding, chemtrails, geo-engineering which is openly admitted and executed on a daily basis.

Singapore Smog Beta-Test?
The horrific smog currently engulfing Singapore and Indonesia is apparently a beta-test for the upcoming nuclear detonation and its subsequent fallout. A major beta-test is needed to see how people respond to a massive change in their environment. Although unprecedented smog is being blamed on “fires”, there doesn’t appear to be any ash falling. Therefore, the deadly smog is most likely the result of heavy-duty chemtrails delivered by aerial drones. After a nuclear detonation in Seattle, for example, expect to see Singapore-type smog all over the Pacific west coast due to “nuclear fallout”.

Texas Revolution?
As witnessed just prior to the Super Bowl XLV nuclear terror plot on February 6th, 2011, both alleged STRATFOR intelligence operative Alex Jones and Texas Governor Rick Perry were caught acting quite suspicious in preparation for the “big event” and the bloody revolution that was  slated to follow. Jones  was routinely beta-testing his listeners and “oiling his guns” in the days prior, Perry actually left Texas for California despite it hosting its first ever Super Bowl. As the world embarks on a new nuclear 9/11, both Jones and Perry are again preparing for the “big event” in their own way. On the June 28th, 2013, episode of the Alex Jones Show, Jones was overshadowed on the air by group of men talking in the background which was clearly heard on-air. Jones quipped,  “We are just doing some “training” in there”. What exactly Jones is training for is unknown, but Perry, who is also located in Austin, Texas, is holding a “Special Session” of the Texas Legislature which will begin at 2 p.m. Monday, July 1st, 2013. Perry stated that, “I am calling the Legislature back into session because too much important work remains undone for the people of Texas.”

UPDATE: In the wake of this Truther.org terror warning, the opening day of the “hotly anticipated” special legislative session lasted only 30 minutes as the Texas Senate inexplicably voted to recess until July 9th, 2013. Curiously, Alex Jones was also a no-show on his radio program of July 1st, 2013.   

Recent Nuclear Terror  Headlines:

1. November 29, 2012:
Nuclear Christmas, False Flag In America To Blame On Iran (Press TV)
2. January 22, 2013:
Indian Police Warn Kashmir Residents Of Possible Nuclear Attack (Fox News)
3. February 19, 2013:
Fmr. CIA Official: Cyber War ‘More Sinister Than Nuclear Age’ (CNN)
4. February 25, 2013:
Radiation Panic Grips Mumbai (WSJ)
5. March 15, 2013:
Dirty Bomb Material Secured In Philadelphia (Fox News)
6. March 15, 2013:
Feds Swarm Metro Train After Detecting Nuclear Risk (CBS News)
7. April 9, 2013:
Russia Conducts Topol Nuclear ICBM Drills (RIAN)
8. April 13, 2013:
DOE Finalizing Plans To Dump Uranium Out West (Fox News
9. April 16, 2013:Era Of Atomic Bombs Over: President Ahmadinejad (Press TV)
10. April 17, 2013:
Zionists Warm Up To Wage Nuclear Wars Across Mideast (Press TV)
11. April 18, 2013:
After Petition, Atomic Bomb Re-Enactment Dropped From Ohio Air Show (Fox News)
12. April 18, 2013:
‘Like A Nuclear Bomb’: Deadly Fertilizer Plant Blast Devastates Texas Town (CNN)
13. April 22, 2013:
China: Cyberattacks Are Like Nuclear Bombs (WSJ)
14. June 3, 2013:
China, India, Pakistan Boost Nuclear Arsenals (France 24)
15. June 24, 2013.
World Worried About Nuclear Terrorism, But Little Action At Talks (Reuters)
16. June 25, 2013:
From Benghazi To Nuclear Terrorism (WND)
17. June 29, 2013:
Survivors Of World War II Atomic Bombings To Be Tested (Fox News)

[Does not purport to be a complete list of headlines]

1. MEDIA CYBER-HIJACKS:

1.1: Media Hacks Trending
Prior to a major “Live TV” cyber-hijack and subsequent nuke detonation, the public must be psychologically programed that this is in fact possible. Starting in February of 2013, there have been at least 3 major instances whereby media and government affiliated network computers were hacked and their security breached. Taken collectively, these events show an unmistakable trend which indicates that a major media cyber-hijack “event” is imminent. 

Media Hack Timeline:

1. February 12, 2013: Zombie Apocalypse Alert Hits Montana’s Emergency Warning System (Montana)
2. April 14, 2013:
‘Belarusian MTV’ Possibly Hijacked, Ran Porn Videos In Daytime (Minsk, Belarus)
3. June 14, 2013:
CBS News Anchorwoman Sharyl Attkisson’s Computer Hacked (New York, New York)

[Does not purport to be a complete list of events]


1.2: TV Cut-Offs Trending
Prior to a numerous TV channels going offline or blank due to an alleged cyber-hijack, the public must be psychologically programed that this is in fact possible. Starting in May of 2013, there have been at least 3 major instances whereby TV stations and providers have cut certain TV broadcasts and channels or the TV station was shut down altogether. Taken collectively, these events show an unmistakable trend which indicates that a future TV shutdown/blackout due to a cyber-hijack “event” is imminent. 

TV Cut Off Timeline:

1. May 19, 2013:  Vietnam Cable TV Drops CNN, BBC Over Translation Decree (Hanoi, Vietnam)
2. May 27, 2013:
Iran Pro-Reform Candidate Says State TV Cuts Off His Broadcast (Tehran, Iran)
3. June 14, 2013:
EU Broadcast Chief: Turn Greek State TV Channel Back On (Geneva, Switzerland)
4. June 18, 2013:
Greek TV Screens Still Blank As Political Dispute Continue (Athens, Greece)

[Does not purport to be a complete list of events]

1.3: Media Terror Trending

Prior to a major terror related attack on a media complex, television studio or TV channel, the public must first be psychologically programed that this is in fact possible. Starting in January of 2012, there has been an unprecedented wave of media related terror attacks, hoaxes and threats which have occurred at in and around various media related entities worldwide. Taken collectively, these events show an unmistakable trend which indicates that a major media related terror “event” is imminent. 

Media Terror Timeline:

1. March 25, 1997:Radio Station Gets Bomb Threat (Miami, Florida)
2. July 12, 2004:
Bomb Threat on TBC Radio station (London, England)
3. September 28, 2004:
Man Makes Radio Station Bomb Threat (Dallas, Texas)
4. December 8, 2007:
Radio Station Gets Bomb Threat (North Cotabato, Philippines)
5. May 30, 2011:
Man Threatens To Bomb TV Station (New York, New York)
6. January 26, 2012:
Radio Station Receives Bomb Threat (Jakarta, Indonesia)
7. September 22, 2012:
Riot Outside MTV Event In Madrid (Madrid, Spain)
8. September 25, 2012:
Radio Stations Evacuated Over Beeping Package (Los Angeles, California)
9. September 30, 2012:
Shots Fired In Parking Lot Of BET Awards (Atlanta, Georgia)
10. October 8, 2012:
FBI Investigating Suspicious Package At CBS TV Studio (Los Angeles, California)
11. October 17, 2012:
NatGeo Bombarded With Terror Threats (Washington D.C.)
12. November 2, 2012:
Chemical Bomb Threat At CNN Center (Atlanta, Georgia)
13. November 30, 2012:
CBS Radio Building Hit By Gunfire (Dallas, Texas)
14. February 12, 2013:
Radio Station Bomb Threat Reported (Melbourne, Australia)
15. March 29, 2013:
Man Arrested For Threat To Blow Up TV Station (Niigata, Japan)
16. March 30, 2013:
Eiffel Tower Radio Tower Receives Bomb Threat (Paris, France)
17. April 14, 2013: ‘Belarusian MTV’ Possibly Hijacked, Ran Porn Videos In Daytime (Minsk, Belarus)
18. May 4, 2013:
CNN Anchor Robbed On Piedmont Avenue (Atlanta, Georgia)
19. May 19, 2013:Man Threatens To Blow Up Studio With Grenade In Live TV Interview (Canes, France)
20. May 27, 2013: Ten NASCAR Fans Injured By Fallen TV Cable (Charlotte, North Carolina)
21. May 27, 2013:
TV Correspondent Killed On TV While Covering War Near Lebanon (Dabaa, Syria)
22. June 5, 2013:
TV Crew Attacked While Reporting On Shooting Story (Providence, Rhode Island)
23. June 11, 2013:Employees Seize Greek State TV And Radio HQ (Athens, Greece)
24. June 14, 2013:
CBS News Anchor Sharyl Attkisson’s Computer Hacked (New York, New York)
25. June 14, 2013: Grenade Hurled At Libyan TV Station In Benghazi (Benghazi., Libya)
26. June 17, 2013:
Government Terror Exercise Broadcast Live On TV (Bangalore, India)
27. June 25, 2013:
Honduran TV Journalist Kidnapped By Armed Men (San Pedro SulaHonduras)
28. June 29, 2013:
Heli TV News Helicopter Crashes, 4 Killed (Bellinzona, Switzerland)

[Does not purport to be a complete list of events]

1.4: Live TV Beta-Tests
In order to properly gage and predict public response in the wake of an unprecedented action such as a “Live TV” hijack and subsequent nuclear detonation, various beta-tests must be conducted prior to the “event” occurring in reality. These beta-tests set the precedent for a copy-cat attack as well as allow the real terrorists to work out any unforeseen problems that may arise. To date, at least three “live TV” beta-tests have been identified:

I. Live TV & EAS Hijack
In what appears to be the first beta-test for a “Live TV” cyber-hijack to gage public reaction to the activation of the EAS, on February 12th, 2013, it was reported that a Montana TV network and the Emergency Alert System (EAS) had been hacked. The fake EAS warning was transmitted on KRTV during the Steve Wilkos Show in several Montana counties. According to the report, the TV station quickly pulled the alert off air and apologized both on air and online, but not before the following statement was read on-air: The bodies of the dead are rising from their graves and attacking the living…Do not attempt to approach or apprehend these bodies as they are considered extremely dangerous…Follow the messages on screen that will be updated as information becomes available.”

II. TV Channel Hijack
In what appears to be the second beta-test for a “Live TV” cyber-hijack to gage social media reaction, on April 14th, 2013, it was reported that a Belarusian music TV channel had been hijacked and pornography had been broadcast. According to the report, on Saturday, April 13th, 2013, at about 3:45pm local time, “BelMuzTV”, which is reportedly seen in public places like shopping malls and restaurants, began airing explicit pornographic images featuring full nudity and sexual intercourse which lasted for approximately 10 to 20 minutes. Reportedly thousands of people throughout the Belarusian capital of Minsk watched the broadcast and began to share their experience on various social networking sites. A rumor then was circulated that a “subversive operation” was executed by the channel’s studio engineer, who entered the control room, loaded the inappropriate content into rotation and then disappeared. In the aftermath of a global “Live TV” cyber-hijack, social networking sites worldwide will be buzzing about having no TV. Eventually, the TV will come back on and billions of people worldwide will collectively witness the nuke attack on “Live TV”. 

III. Live TV Terror Drill
In what appears to be the third beta-test for a “Live TV” cyber-hijack to gage public reaction to “Live” terrorism, on June 17th, 2013, it was reported that an state-sponsored terror drill was broadcast “Live TV” without the police, TV station or its viewers ever being informed that it was fake. According to the report, the televised terror drill caused “scaremongering across the city” when four “terrorists” began hovering around their target, the Taj Vivanta Hotel. The terrorists sparked off a major alert which then tipped off TV reporters and by 11.25pm, multiple TV channels had begun flashing images of four terrorists on the loose in the city.

1.5: Newsrooms Vulnerable to Cyber-Hijack
In an ominous warning sign that news related organizations may be hacked by cyber-terrorists in the near future, on April 23rd, 2013, it was reported that news organizations may have to revisit policies on retweeting breaking news and shore up the security of their social-media accounts due to the fallout from the hacking of the Associated Press’ Twitter account which stated that there had been an explosion at the White House. Stephen Ward, director of the Center for Journalism Ethics at the University of Wisconsin-Madison, stated that, “In light of this, news organizations have to certainly increase security procedures so that they can’t be hacked so easily…(If it was phishing that led to this)…then that is not proper security. They’ve got to review security procedures.” According to Dominic Lasorsa, a journalism professor at the University of Texas, “This is the kind of stuff the media has to deal with today,” he says. “It’s difficult to stay ahead of the hacking community. But our reputation is all we’ve got going for us. News media organizations need to be more savvy about the [security] problem.”

1.6: CBS News Hacked
In a case meant to set the precedent for cyber-hacks against TV stations, on June 14th, 2013, it was reported that CBS News correspondent Sharyl Attkisson’s computer, including her CBS News work computer, was hacked by “an unauthorized, external, unknown party on multiple occasions”, prompting CBS News to hire a firm to look into the hacking. According to the report, CBS News spokeswoman Sonya McNair said that a cyber-security firm hired by CBS News “has determined through forensic analysis” that “evidence suggests this party performed all access remotely using Attkisson’s accounts. While no malicious code was found, forensic analysis revealed an intruder had executed commands that appeared to involve search and exfiltration of data.

1.7: New Israeli 24-Hour TV Channel
Just as the international TV airwaves are about to suffer an unprecedented cyber-hijack, a June 21st, 2013, report states that a new Israel-based 24-hour TV news channel broadcasting in English, French and Arabic will go “Live” on air starting on July 1st, 2013. According to the report, a new TV station based in Tel Aviv named “i24 News” has 150 journalists will be broadcasting Zionist propaganda around the clock in English and French as well as five hours a day in Arabic. With the likes of BBC, CNN, and Fox News likely down due to the TV cyber-hijack, the new Israeli channel will likely be the only television station on the air, due of course to their ability to circumvent the cyber-hijack because of their new state-of-the-art security features. This scenario will allow “i24 News” to have an unabated worldwide audience as well as a timely opportunity to spin the nuclear attacks and the wars which will surly follow to their liking. Naturally, their timing couldn’t be more impeccable.

1.8: New Anchorman Movie Trailer
Anchorman: The Legend of Ron Burgundy” (2004) is a film (see trailer) which was released in 2004 about an eccentric news anchor from San Diego, California. Roughly nine years later, the film is suddenly getting a long overdue sequel entitled, “Anchorman 2: The Legend Continues”. Curiously, the movie trailer was officially released on June 18th, 2013, despite the fact that the film will not be released until December 19th, 2013. Exactly why a movie trailer for a low-budget SNL comedy is being released 6 months too early in the middle of summer is rather suspicious and begs the question: why now? Although it’s impossible to know for certain, it does appear that the Anchorman 2 trailer was released with the sole purpose of bringing as much as attention to television anchors as possible just prior to an unprecedented “Live TV” cyber-hijack.  

2. CYBER WAR:

2.1: United States v. China  
Inflammatory
war propaganda, rising diplomatic tensions between the U.S. and China along with unprecedented U.S. propaganda against China indicates that World War III scenario between the United States and China is on the horizon. On June 4th, 2012, it was reported that the Australian government’s Defense White Paper published in 2009 contained a “secret chapter” that assessed “Australia’s ability to fight an air-sea battle alongside the United States against China”. A few weeks later on June 27th, 2012, Chinese Maj. Gen. Peng Guangqian stated that a future conflict with the United States is coming as a result of U.S. “containment” policy. Guangqian was then quoted as saying, “The United States has been exhausting all its resources to establish a strategic containment system specifically targeting China” and that “The contradictions between China and the United States are structural, not to be changed by any individual, whether it is G.H.W. Bush, G.W. Bush or Barack Obama, it will not make a difference to these contradictions”.

2.2: Cyber Doomsday
Since June of 2012,
numerous propaganda articles have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, “Threat Of ‘Spectacular’ Cyberattack Looms” and “U.S. Homeland Chief: Cyber 9/11 Could Happen “Imminently“, all indicate that an unprecedented act of state-sponsored cyber-terror upon the United States is imminent. Exactly how a cyber-Doomsday will manifest itself is unknown, but a “Live-TV” cyber-hijack and subsequent nuke detonation appears to be the working plan at this given time.

2.3: China & Cyber Terror
As previously, reported, the nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. Based on recent news and events, China, more than any other nation, is sure to be scapegoated in the aftermath of a cataclysmic cyber-terror attack against the United States. On October 5, 2011, U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two U.S. satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyber espionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta recently stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to clamp down on aggressive Chinese cyber-attacks against American companies and the U.S. government.  On October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.

2.4: Obama Cyber Attacks
A Chinese attack highlighted by a massive cyber-attack will allegedly be in response to U.S. hacking and cyber-espionage by the Obama administration. As evidenced, these attacks will be used as the “motive” or justification for an unprovoked attack by China against the United States. According to June 1st, 2013, report by the New York Times,
Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons. Six days later on June 7, 2013, it was reported that Obama has ordered his senior national security and intelligence officials to draw up a list of potential overseas targets for US cyber-attacks, a list which China is surly on. The 18-page Presidential Policy Directive 20, issued in October of 2012 states that Offensive Cyber Effects Operations (OCEO) “can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging”. Three days later, a Foreign Policy report from the Council on Foreign Relations stated that “Deep within the National Security Agency, an elite, rarely discussed team of hackers and spies is targeting America’s enemies abroad”, again highlighting Obama’s offensive cyber-warfare just prior to a retaliatory attack from China.

2.5: Cyber Terror Blinking Red
Cyber-terror related attacks, which are occurring at an unprecedented rate with over 40 high-profile
cyber-attacks in 2013 alone
, are getting more and more diverse with each passing day. As evidenced, the notion that one can attack a jet, bank, stock market, water system, medical device or car via a computer has been floated by the media and brought to the attention of the public over the last few months.

Cyber-Hacking Headlines:

1. April 11, 2013: Crashing Passenger Jet With Android Phone? (RT)
2. April 23, 2013:
 
Stocks Gyrate Wildly After Fake Terror Tweet (USA Today)
3. May 9, 2013:
In Hours, Thieves Took $45 Million In A.T.M. Scheme (NYT)
4. May 9, 2013:
Cyber-Attacks Behind Possibly Record-Breaking Bank Heist (CBS)
5. May 11, 2013:
World Grapples With Rise In Cyber Crime (Fox News)
6. May 25, 2013:
Hackers Tried To Access Haifa’s Water System In Failed Cyberattack (Fox News)
7. June 13, 2013:
US Warns Of Cyber Attacks On Medical Devices (France 24)
8. June 25, 2013:
Bush Advisor: Hastings Crash ‘Consistent With A Car Cyberattack’ (RT)

[Does not purport to be a complete list of headlines]


3. U.S. MILITARY COMPROMISED:

3.1: U.S. Military Vulnerable to Attack
Prior to an unabated attack by China against U.S. military bases in the Pacific (i.e., Okinawa, Japan, Iwo Jima, Japan, and Pearl Harbor, Hawaii), the public must first be led to believe through propaganda and alleged whistleblowers that U.S. military equipment and weapons systems are vulnerable to Chinese cyber-related espionage. That way, in the aftermath of a Chinese invasion whereby U.S. defense systems such as missiles, planes and radars are suddenly rendered useless, the narrative of a Chinese cyber-attack can be floated to the American public and military as the reason for the deadly attack which will surely take America to war. If the following reports are to be believed, Chinese hackers have gained access to U.S. weapons secrets, stole blueprints from Australia’s intelligence agency, stole the latest U.S. weapons, hacked the NSA chairman’s accounts, targeted U.S. missile systems, hacked the Obama campaign, and hacked the head of the Nuclear Security Agency.

Chinese Cyber Espionage Headlines:

1. March 29, 2013:
Report: China Gained U.S. Weapons Secrets Using Cyberespionage (CNN)
2. May 27, 2013:
Chinese Hackers Steal Australian Security Intelligence Blueprints (News.com)
3. May 28, 2013:
Pentagon: The Chinese Stole Our Newest Weapons (RT)
4. May 28, 2013:
Chinese Infiltrated Top U.S. Weapons Systems, Confidential Report Claims (Fox News)
5. May 28, 2013:
Obama Intelligence Agency Chairman Hacked By “Guccifer” (Smoking Gun)
6. May 28, 2013:
Report Lists U.S. Weapons Compromised By Chinese Cyberspies (Washington Post)
7. May 29, 2013:
Pentagon Aircraft, Missile Defense Programs Target Of China Cyber Threat (Fox News)
8. May 29, 2013:
China To Hold Digital War Games (Guardian)
9. May 31, 2013:
Hagel Says Chinese Cyberthreats Pose ‘Stealthy’ Danger To US (Fox News)
10. June 5, 2013:
China Claims ‘Mountains Of Data’ On Cyber Attacks By US (FT)
11. June 6, 2013:
Chinese Hacked Obama, McCain Campaigns, Took Internal Documents (NBC)
12. June 12, 2013:
Head Of U.S. Nuclear Security Agency Is Hacked By “Guccifer” (Smoking Gun)

[Does not purport to be a complete list of headlines]

3.2: U.S. Weapons Compromised by Chinese Hackers
Based on the multiple reports, Chinese hackers have compromised numerous U.S. military weapons system ultimately making U.S. military personal and equipment vulnerable to Chinese attack. According to a May 28th, 2013, report by the Washington Post, the following is an “expanded partial list” of compromised DOD system designs and technologies: 

I. U.S. System Designs
Terminal High Altitude Area Defense, Patriot Advanced Capability-3, Extended Area Protection and Survivability System (EAPS), F-35, V-22, C-17, Hawklink, Advanced Harpoon Weapon Control System, Tanker Conversions, Long-term Mine Reconnaissance System, Global Hawk, Navy antenna mechanisms, Global Freight Management System, Micro Air Vehicle, Brigade Combat Team Modernization, Aegis Ballistic Missile Defense System, USMC Tracked Combat Vehicles, Warfighter Information Network-Tactical (WIN-T), T700 Family of Engines, Full Authority Digital Engine Controller (FADEC), UH-60 Black Hawk, AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile), Affordable Weapons System, Littoral Combat Ship, Navy Standard Missile (SM-2,3,6), P-8A/Multi-Mission Aircraft, F/A and EA-18, RC-135 Detect./Collect, and the Mk54 Light Weight Torpedo.

II. U.S. Technologies
Directed Energy, UAV video system, Specific Emitter identification, Nanotechnology, Dual Use Avionics, Fuze/Munitions safety and development, Electronic Intelligence Processing, Tactical Data Links, Satellite Communications, Electronic Warfare, Advanced Signal Processing Technologies for RadarsNanostructured Metal Matrix Composite for Light Weight Ballistic Armor, Vision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV), Space Surveillance Telescope, Materials/processing technologies, IR Search and Track systems, Electronic Warfare systems, Electromagnetic Aircraft Launch, Rail Gun, Side Scan sonar, Mode 5 IFF, Export Control, ITAR, Distribution Statement B,C,D Technical Information, CAD drawings, 3D models, schematics, Software code, Critical technology, Vendor/supply chain data, Technical manuals, PII (email addresses, SSN, credit card numbers, passwords, etc.), and attendee lists for program reviews and meetings.

3.3: Whistleblower Edward Snowden

The case of
former National Security Agency (NSA) whistleblower Edward Snowden is fascinating for many reasons but mainly because of his role in an upcoming Chinese cyber-related attack. In the aftermath of a Chinese attack, Snowden will be scapegoated as a traitor for giving information to the Chinese which ultimately enables them to circumvent U.S. military programs and weapons systems. This particular narrative first began to form on June 10th, 2013, when CIA officer Bob Baer stated on CNN that Obama officials are speculating that Snowden’s whistleblowing could be considered “potential Chinese espionage”. Four days later on June 14th, 2013, it was reported that a popular Communist Party-backed newspaper was urging China’s leadership to get more information from Snowden rather than send him back to the U.S., because his revelations about secret U.S. surveillance programs were in China’s national interest. Another June 14th, 2013, report stated that Snowden could offer intelligence that would help China update its understanding of cyberspace and improve its position in negotiations with Washington D.C. A week later, on June 21st, 2013, the Obama Administration reportedly charged NSA Whistleblower Snowden with espionage, theft and conversion of government property. These charges were leveled at Snowden in order to give the Obama administration the much needed plausible deniability in the aftermath of a Chinese attack on the U.S. Six day later on June 26th, 2013, it was reported that intelligence agencies in China and Russia had gained access to highly classified U.S. intelligence and military information contained on electronic media held by Snowden. According to the report, the exact compromise of the secret data held on Snowden’s laptop computers remains unknown but the biggest fear is that China gained access to new U.S. nuclear war plans.

3.4: Whistleblower James “Hoss” Cartwright
In the wake of the Edward Snowden case, the Obama administration has presented yet another intelligence patsy who can be scapegoated in the aftermath of a Chinese attack based on U.S. cyber-intelligence failures. On June 28th, 2013, it was reported that retired Marine Gen. James ‘Hoss’ Cartwright, a four-star general, is under a DOJ investigation over leaking details of a classified cyber-terror operation to the press. According to the report, Cartwright, who was deputy chairman of the Joint Chiefs of Staff between 2007 and 2011, was responsible for the ‘Olympic Games’, a massive attack on Iranian uranium enrichment facilities. He allegedly broke details of the top secret operation to the media, including collaboration with Israeli hackers in development of the Stuxnet computer worm. If indicted, Cartwright would join Bradley Manning, Edward Snowden and six others charged under the 1917 Espionage Act by the Obama administration.

4. JAPAN:

4.1: Attack on Japan
The Japanese people are some of the most independent people on earth and therefore have been the focus of numerous wars, nuclear attacks (i.e., Hiroshima, Nagasaki, and Fukushima) tsunamis and earthquakes. The Zionist backed Chinese would love nothing more than to invade and destroy their culture and way of life as much as possible. Unfortunately, as it currently stands, the country of Japan is America’s closest ally in the Pacific and therefore an attack on Japan by China would instantly be seen as an attack on America. The U.S. has numerous military bases in Japan including two very strategic locations in Okinawa, Japan, and Iwo Jima, Japan. In World War II, the Battle of Iwo Jima was made famous by a photo of U.S. soldiers hoisting an American flag atop the island, and therefore, the capture of this island by “Communist” China would undoubtedly serve as an American war cry for revenge. If China were to successfully capture these two islands along with Pearl Harbor, Hawaii, they would have almost conquered most of the Asian-Pacific region.

U.S.-Japan War Headlines:

1. June 21, 2013:
US, Japan Begin Naval Drills Near China (FT)
2. February 7, 2013:
US, Japan, Australia Conduct Military Drills Over Pacific (Fox News)
3. April 5, 2013:
Japan Will Join US Military Drill In California In June (Press TV)
4. June 9, 2013:
Japan Sending Soldiers To US For First Time Amid Tensions With China (Fox News)
5. June 27, 2013:
US-Japan War Games Off The California Coast Imitate Chinese Invasion (RT)
6. June 8, 2013:
‘US Army Chief In Japan Suspended’ (Press TV)

[Does not purport to be a complete list of headlines]

4.2: Head of U.S. Military in Japan Suspended
In a move which clears the way for an unabated Chinese attack on U.S. troops stationed Japan, it was reported on June 7th, 2013, that U.S. Army Major General Michael Harrison, the man directly responsible for responding to an attack on Japan, was suspended for allegedly failing to properly report or investigate a sexual assault complaint. Harrison, who was stationed in Camp Zama, was in charge of U.S. Army-Japan and was suspended four days prior to his completion of his 32-month assignment. It’s no secret that sexual assault and the military are synonymous and therefor the timing of the suspension is highly suspicious to say the least. Harrison’s scheduled replacement is Major General James Boozer, the former deputy commanding general of the US Army in Europe. With Boozer at the helm, plausible deniability due to his greenness on the job and his name “Boozer”, meaning drinker or drunk, will be cited as the reasons he failed to properly respond to a Chinese sneak attack.

4.3: U.S. F-15 Squadron Grounded
Prior to a Chinese invasion in which U.S. military aircraft fail to work properly, there must be an incident whereby U.S. planes can be “updated” with a virus or mechanical tweak so they are rendered useless. On May 28th, 2013, it was reported that U.S. pilot flying an F-15 over the Pacific Ocean identified  an unspecified problem which forced him to eject in mid-flight. A day later on May 29th, 2013, it was reported that the U.S. Air Force had grounded its F-15 fighters on the southern Japan island of Okinawa for a safety review following a crash that forced the aforementioned pilot to eject over the Pacific Ocean. All F-15s attached to the 18th Wing on Okinawa’s Kadena Air Base were scheduled to undergo “inspections” during the reported stand down to ensure that they are “safe” to fly. Although it is not clear whether these planes are still grounded, the so called “inspections” may have allowed for the entire fleet of American planes to be sabotaged.

5. SEATTLE:


5.1: Nuclear Attack on Seattle
It’s no secret that Seattle, Washington, is one of the most liberal and progressive cities in the United States and therefore could  be a target of Zionist terrorism. From marijuana legalization, animal rights, gay rights and recycling, Seattle is not just a city but rather a large community. Curiously, Seattle has experienced an
unprecedented wave of terror and death which has been prepping the city for its impending nuclear destruction. Coincidentally, “Red Dawn” (2012) is a film (see trailer) in which the Washington state is the victim of a red-dawn surprise attack by military aircraft from Asia. At exactly 0:33 seconds into the trailer, a massive, explosion is heard at the same time a snow globe with Seattle’s Space Needle is shown, potentially foreshadowing an upcoming attack on the city.

Seattle Terror Headlines:

1. March 20, 2013:
Seattle Airport Disrupted By Security Breach (Seattle, Washington)
2. March 25, 2013:
Man Gets 18 Years In Seattle Terror Plot (Seattle, Washington)
3. April 1, 2013:
3 Killed After Seattle-Area Tavern Brawl Turns Into Gun Fight (Seattle, Washington)
4. April 8, 2013:
Man In Seattle Terror Case Gets 17-Years For Terror Plot (Seattle, Washington)
5. April 12, 2013:
Authorities Probe Death Of Man On Seattle Escalator (Seattle, Washington)
6. April 14, 2013:
One Dead After Avalanches East Of Seattle (Snoqualmie Pass, Washington)
7. April 22, 2013:
Domestic Dispute Starts Shootout That Kills 5 Near Seattle (Seattle, Washington)
8. June 25, 2013:
FBI’s “Faces Of Global Terror” Ads Pulled Off Buses In Seattle (Seattle, Washington)

[Does not purport to be a complete list of headlines]

6. SAN FRANCISCO:

6.1: San Francisco Bay Bridge
The San Francisco–Oakland Bay Bridge (known locally as the Bay Bridge) is a pair of bridges spanning San Francisco Bay of California, in the United States. Aside from being partially demolished in the 1989 Loma Prieta Earthquake, the Bay Bridge recently underwent an emergency “repair”. On January 7th, 2013, it was reported that an oil tanker had struck a tower in the middle of the San Francisco-Oakland Bay Bridge. According to the report, the 752-foot tanker rammed the bridge tower as it headed out to sea damaging a 30 to 40 foot fender of steel on base of the bridge. Whether or not the suspicious ship accident and subsequent “repair” job will ultimately undermine the structural integrity of the bridge is not known, but the timely construction project could have theoretically provided cover for the installation of demolition explosives in and around the Bay Bridge. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated nuclear terrorist attack.

6.2: The Golden Gate Bridge
In order for a nuclear attack to be even more psychologically terrorizing, a well-known landmark such as the Golden Gate Bridge must be destroyed in the attack to serve as life-long reminder of that horrific day. The Golden Gate Bridge is a suspension bridge spanning the Golden Gate, the opening of the San Francisco Bay into the Pacific Ocean. On February 23rd, 2012, it was reported that the Golden Gate Bridge in San Francisco, California, would undergo a renovation project that will “take years to complete”. According to the report, the project involves repainting the two main suspension cables which are responsible for holding the bridge in place. Whether or not the suspicious “renovation” project will ultimately undermine the structural integrity of the bridge is not known, but the timely construction could have theoretically provided cover for the installation of demolition explosives in and around the Golden Gate Bridge. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated nuclear terrorist attack. Prior to a high-profile terror attack or “natural disaster” resulting in the demolition of the Golden Gate Bridge, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda and government propaganda is a slick way of showing that yes, it can happen. On June 2nd, 2009, the Onion ran a story which openly joked about a “horrific attack on San Francisco’s Golden Gate Bridge, which “left thousands missing and assumed dead”. Three years later, Hollywood released “Rise of the Planet of the Apes” (2012), a film (see trailer) in which a monkey literally destroys the Golden Gate Bridge.

7. PARIS, FRANCE:

7.1: Attack on Paris, France
Paris, France, is one of the most anti-government places in the world. They have absolutely no respect for authority or the political process, and are not shy to voice their anti-government sentiment. Therefore, should the U.S. be hit with a Chinese nuclear attack, depending on how Europe reacts, it’s possible that Paris could be subsequently targeted. In order for a nuclear attack to be even more psychologically terrorizing, a well-known landmark such as the
Eiffel Tower must be destroyed in the attack to serve as life-long reminder of that horrific day. Coincidentally, some very suspicious events have occurred at the Eiffel Tower over the last few months. Whether or not any of these events provided cover for the installation of a nuclear weapon in or around the tower is not known, but the opportunity to do so was available.

Latest Eiffel Tower Headlines:

1. March 30, 2013:Eiffel Tower Evacuated Due To Bomb Threat (Paris, France)
2. June 18, 2013:
Eiffel Tower Evacuated After Suicide Threat (Paris, France)
3. June 25, 2013:
Armed Soldiers Guard Eiffel Tower After 6 Terrorists Arrested In Paris (Paris, France)
4. June 27, 2013:
Eiffel Tower Reopens To Tourists After Rare 2-Day Strike
5. June 28, 2013:
Eiffel Tower Fiasco A Lift For Thieves (Paris, France)

[Does not purport to be a complete list of headlines]

8. WALL STREET:

8.1: Wall Street Terror
A cyber-attack by China against Wall Street would be seen as an act of war and would be a convenient way to both publically bankrupt America and take her to war at the same time. Wall Street is the financial district of New York City and the heart of America’s economy. 93 years ago, the Wall Street bombing occurred at 12:01 pm on September 16th, 1920, in the Financial District of New York City. The terrorist attack killed 38 and seriously injured 14. With the rise of the Occupy Wall Street movement and the ever increasing hatred of banks and their practice of  usury, it is highly likely that Wall Street will once again be targeted for terror. On November 18th, 2008, it was reported that terror suspect Aafia Siddiqui was taken into custody following her capture in Afghanistan on charges of attempted murder following revelations of a “Mass Casualty Attack” that listed various landmarks in New York, including Wall Street. Prior to a high-profile terror attack against Wall Street, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “The Dark Knight Rises” (2012) is a film (see trailer) which depicts a major terror attack and cyber-terror attack against Wall Street in which criminals bilk the NYSE for billions of dollars.

8.2: Wall Street Preparing for Major Cyber Attack
Prior to a major cyber-terror attack by China on the New York Stock Exchange (NYSE), one would expect there to be some stock-market related terror drills to prepare Wall Street insiders for the attack. Case in point: On June 13th, 2013, it was reported that Wall Street executed “Quantum Dawn 2”, a cyber-terror war-game apparently meant to give insiders an opportunity to make financial moves before the market crashes, for good. According to the report, Cyber Strategies oversaw a terror exercise which included Citigroup, Bank of America, the Department of Homeland Security, the Treasury Department, the Federal Reserve, the Securities and Exchange Commission, as well as 40 other firms. The drill, which featured a hacker, possibly from China, operating from a fake trading platform, prompted a response in which the participants facilitated a conference call to “figure out what was going on”. In other words, the drill simulated a real-life scenario in which insider firms received the “heads up” about an impending cyber-attack and shared this information accordingly so that their bank accounts and those of their clients would not be affected. The same sort of thing occurred just prior to 9/11 when “put options” or bets were taken out on United Airlines and American Airlines, the two airline companies involved in the attacks. According to the “9/11 Commission Report”, “some unusual trading did in fact occur”, however, it claimed that, “each such trade proved to have an innocuous explanation”.

Conclusion  
It’s imperative to remember that starting fights between different races, classes and religions is taken word for word from the 3rd Protocol of the Protocols of Zion. The main goal of the Zionist establishment is to get America to destroy herself the same way that Russia was destroyed under Stalin. This is done by dividing and then collapse society upon itself by baiting the gun-owning American public into a violent revolution against their own police and military while the real terrorists sit off-shore and pull the strings.

About the Author
David Chase Taylor, the editor-in-chief of Truther.org, is an American journalist living in Zürich, Switzerland where he has applied for political asylum since the release of The Nuclear Bible, a book credited with subverting a false-flag/state-sponsored nuclear terror attack upon America in Dallas, Texas on February 6, 2011. Taylor has since released The Bio-Terror Bible, a website exposing the coming global bio-terror pandemic likely planned for 2013. Taylor has also exposed numerous terror plots including the 2012 DNC Terror Plot, the “Twilight” Premier Terror Plot, as well as Alex Jones’ links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. Terror related assertions, forecasts and predictions made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically happen based on the cumulative terror related data. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Namaste.

Chinese Drone Attack

Download & Forward PDF

David Chase Taylor
March 31, 2013
Truther.org

Based on recent news and events, it is highly likely that China will launch a “surprise” attack against the United States. For those who think a Chinese attack on the U.S. is laughable, consider the following: On September 30, 2012, it was reported that the White House was attacked by hackers allegedly linked to China’s government.

This unprecedented cyber-terror attack targeted the U.S. government’s most sensitive computer networks, ultimately breaching a system used by the White House Military Office for nuclear commands. The Chinese sneak attack is slated to be eerily reminiscent of the December 7, 1941, Japanese attack on Pearl Harbor, and will undoubtedly be the spark which ignites the World War III scenario between the U.S. and China.

Download & Forward PDF

This multifaceted attack will most likely involve a cyber-attack against U.S. financial interests (stock markets and banks), and an EMP attack targeting U.S. military radar and satellites ultimately leaving the U.S. electronically blind to a Chinese stealth drone attack on U.S. military bases in the Pacific, namely Pearl Harbor in Hawaii, the home state of U.S. President Obama. This sneak attack was first exposed in the November 31, 2012, report entitled “Red Dawn Scenario: Chinese Attack On America Imminent”. Since this watershed report was released, there have been countless accusations by the U.S. against China in respect to cyber espionage and cyber-attacks allegedly stemming from the Chinese military. To add more fuel to the fire, it was reported on March 21, 2013, that China had conducted a massive cyber-terror attack on South Korea, a close U.S. ally in the region.

Since June of 2012, numerous propaganda articles have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, “Threat Of ‘Spectacular’ Cyberattack Looms” and “U.S. Homeland Chief: Cyber 9/11 Could Happen “Imminently“, all indicate that an unprecedented act of state-sponsored cyber-terror upon the United States is imminent.

ENCLOSED CHAPTERS:

1. Chinese Drone Attack
2. Chinese Cyber-Terror Attack
3. Chinese EMP Attack
4. World War III Scenario: U.S. Versus China  

1. Chinese Drone Attack:

1.1: Surprise “Aerial Attack” Propaganda Films

Prior to a high-profile aerial attack on the Pacific Coast of the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are taken by surprise and viciously attacked. If and when this terror programming will manifest in reality is unknown, but it is definitely in the terror cards.

1.2: China’s Cyber/Drone Attack
On March 13, 2013, it was reported that China is building one of the world’s largest drone fleets aimed at attacking the United States in the event of a war. According to the report, “The Chinese military envisions its drone swarms scouting out battlefields, guiding missile strikes and overwhelming opponents through sheer numbers. China’s military-industrial complex has developed homegrown drones to accomplish these goals, according to the report released on March 11, 2013, by the Project 2049 Institute. “The PLA now fields one of the world’s most expansive UAV [unmanned aerial vehicle] fleets,” said Ian Easton and L.C. Russell Hsiao, researchers at the Project 2049 Institute and authors of the new report. The Project 2049 Institute report warned that China could consider “plausibly deniable” drone attacks blamed upon mechanical failure or cyberhackers. The drones could act as decoys, use electronic warfare to jam communications and radar, guide missile strikes on carriers, fire missiles at U.S. Navy ships or dive into ships like kamikaze robots.

1.3: China’s “Stealth” Drones
The report by Project 2049 goes on to state that China is developing drones such as the rumored “Dark Sword” stealth drone that have low radar profiles to escape radar detection and that Chinese engineers have even begun working on drones that have the software brains to fly in formation, do aerial refueling and takeoff and land autonomously. The report goes on to cautions the U.S. military to prepare for the worst-case scenario by hardening its existing air bases in Asia.

1.4: South Korea Developing “Kamikaze” Attack Drones
China is not alone in its quest for kamikaze drones. October 9, 2012, it was reported that a suicide drone capable of striking North Korea is under development in South Korea. According to the report, the “Devil Killer” can reach speeds of approximately 250 mph, carry an explosive payload, automatically identify targets, as well as undertake an automatic strike or a manually executed one. The Devil Killer can theoretically strike a target 25 miles away in about 10 minutes and is expected to be deployed by 2015. This development is an obvious threat and provocation to North Korea and will likely be cited as one of the main justifications for a future North Korean biological and/or chemical attack on South Korea.

1.5: North Korea’s “American-Made” Drones
North Korea is also attempting to secure “kamikaze” like drones. On February 6, 2012, it was reported that North Korea, by way of Syria, had purchased numerous high-speed American-made target drones with the intent of developing new drones based off the technology. According to the report, North Korea has already conducted numerous tests on high-speed drones mounted with high explosives and that the “North appears likely to deploy [the drones] near the inter-Korean border to target South Korean troops stationed on border islands in the Yellow Sea”.

1.6: Chinese Attack on Hawaii?

On November 5, 2012, it was reported in an article entitled “Red Flag Over The Atlantic: China Is Angling To Take Over A U.S. Airbase In The Azores” that “Chinese planes could patrol the northern and central portions of the Atlantic and thereby cut air and sea traffic between the U.S. and Europe” and that “China could target the American homeland…Lajes is less than 2,300 miles from New York, shorter than the distance between Pearl Harbor and Los Angeles”. While the aforementioned scenario is laughable and an obvious decoy, Pearl Harbor in the U.S. state of Hawaii is the most likely target. After all, history has a tendency to repeat itself.

1.7: A New Pearl Harbor
Based on recent military drills and maneuvers, an attack by China on the U.S. island of Hawaii (President Obama home state) is highly likely. A new Pearl Harbor would destroy a key U.S. foothold in the Pacific as well as remind Americans of when the Japanese attacked Pearl Harbor on December 7, 1941. In order to pull this sneak attack off, the Chinese would have to blind America electronically with an EMP/cyber-attack prior to any aerial drone attack. On August 13, 2012, it was reported that China had launched the “Bahai Sea Green Pearl”, a 36,000-ton ferry and cruise  ship commissioned in August of 2012 at Yantai Port in China’s northeastern Shandong Province. The ship is intended to ferry cars and passengers across the Yellow Sea, but when needed by the People’s Liberation Army, the “Green Pearl” can double as a troop carrier. Visually, the “Green Pearl” looks just like any other civilian cruise ship and could easily be used to secretly transport Chinese troops to Hawaii or the U.S. mainland in a surprise attack. Two months later on October 15, 2012, it was reported that one of China’s seven military command groups had held a joint military drill involving infantry, artillery and air forces to improve the ability of paratroops to land on and capture an island.

2. Chinese Cyber-Terror Attack:

2.1: China & Cyber Terror
The nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. Based on recent news and events, China, more than any other nation, is sure to be scapegoated in the aftermath of a cataclysmic cyber-terror attack against the United States. On October 5, 2011, U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two U.S. satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyber espionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta recently stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to clamp down on aggressive Chinese cyber-attacks against American companies and the U.S. government.  On October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.

2.2: Cyber Terror Target: U.S. Economy
Since 2010, there has been literally hundreds of cyber-attacks, a good many of them against the U.S. financial sector. In a 2007 CRS Report for Congress entitled “Terrorist Capabilities For Cyber-Attack: Overview And Policy Issues”, the U.S. government states that, “If terrorists [China] were to launch a widespread cyberattack against the United States, the economy would be the intended target for disruption” and that “…many security experts also agree that a cyber-attack would be most effective if it were used to amplify a conventional bombing or CBRN (chemical, biological, radiological or nuclear attack)”. Authorities have also expressed concerns about terrorists combining physical attacks such as bombings with hacker attacks to disrupt rescue efforts, known as hybrid or “swarming” attacks.

2.3: Financial Cyber Terror Blinking Red
Based on unprecedented financial cyber-terror propaganda and the recent rash of suspects and patsies arrested for financial cyber-terror related crimes, financial cyber-terror is blinking red on every level. On April 24, 2012, it was reported that Osama bin Laden was looking for a follow-up terror attack to doom the American economy, so a cyber-terror attack targeting U.S. banks and Wall Street hijacking trillions of dollars and dooming the American economy is definitely in the cards. To date, individuals have been arrested for numerous cyber-terror related crimes such as credit and debit card PIN theft, theft of proprietary software code from the Federal Reserve Bank of New York, illegal reproduction and distribution of more than 100 copyrighted commercial and financial business software programs, malware SpyEye used to steal and use personal banking and credit card data from unsuspecting victims’ online accounts, and the former head of fraud and security for digital banking at Lloyds Bank admitted to committing £2.5 million fraud. In other words, everything needed to commit the greatest bank heist ever is conveniently in place. Coincidentally, governments around the world have been executing financial cyber-terror drills in which hackers hijack trillions of dollars with no trace.

2.4: The Chase Bank “$0.00” Balance Beta-Test
On March 18, 2013, it was reported that millions of Chase Bank customers across the U.S. who use online and mobile banking saw their checking and savings accounts with a zero balance. Although this unprecedented electronic banking event was chalked up to being an “internal glitch”, it was most likely a beta-test to gage the American public’s reaction to a future cyber terror attack in which they are suddenly faced with the reality of losing their entire life’s saving. The beta-test was then used as a psychological marker of things to come as media operatives worldwide collectively prepped their respective audiences for an upcoming financial related cyber-heist that will most likely be blamed on China. “We have a technology problem regarding customers’ balance information,” Chase said in a statement. “It has nothing to do with cyber threats. It is an internal issue. We are very sorry to our customers for the inconvenience…It is not confined to the West Coast.”

3. Chinese EMP Terror Attack:

3.1: Chinese EMP Terror Attack
If the EMP terror propaganda is to be believed, a single Chinese EMP could destroy America, ultimately causing a nightmare worse than 9/11 and would result in an America with no power, no food, no transportation, no banking and no internet. Based on the recent news and events, it is highly likely that the Chinese EMP attack will target U.S. military radar and satellite installations in the Pacific, ultimately leaving the U.S. electronically blind to a Chinese aerial attack.

3.2: China’s EMP Quest

In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it is stated that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Adm. Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If U.S. propaganda is to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

3.3: Chinese “Mystery Missile” EMP Attack?
On November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. The U.S. government denied that they were responsible for the missile, but a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. or Chinese military attacked the “Carnival Splendor” with an EMP missile and the U.S. sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. fired EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

4. The World War III Scenario:

4.1: United Stated Versus China  
Inflammatory war propaganda, rising diplomatic tensions between the U.S. and China along with unprecedented U.S. propaganda against China indicates that World War III scenario between the United States and China is on the horizon. On June 4, 2012, it was reported that the Australian government’s Defense White Paper published in 2009 contained a “secret chapter” that assessed “Australia’s ability to fight an air-sea battle alongside the United States against China”. A few weeks later on June 27, 2012, Chinese general Peng stated that a future conflict with the United States is coming as a result of U.S. “containment” policy. Peng was then quoted as saying: “The United States has been exhausting all its resources to establish a strategic containment system specifically targeting China” and that “The contradictions between China and the United States are structural, not to be changed by any individual, whether it is G.H.W. Bush, G.W. Bush or Barack Obama, it will not make a difference to these contradictions.”

About the Author
David Chase Taylor, the editor-in-chief of Truther.org, is an American journalist living in Zürich, Switzerland, where he has applied for political asylum after the release of The Nuclear Bible, a book credited with stopping a false-flag/state-sponsored nuclear terror attack upon America. Taylor has also released The Bio-Terror Bible, a book and website exposing the coming global bio-terror pandemic. Taylor has also been credited with exposing the 2012 DNC Terror Plot, the “Twilight” Premier Terror Plot, and the Alex Jones links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. Terror related assertions, forecasts and predictions made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically happen based on the cumulative terror related data. Historically, once a major false-flag terror plot is exposed (see: Super Bowl Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Namaste.

Chinese Red Dawn by December 21, 2012

Chinese Red Dawn Imminent

Truther.org
November 30, 2012
David Chase Taylor

With no major Obama terror attack to date, it appears that the Obama Administration and its Zionist controllers have stuck a deal with China to allow for the “controlled” attack and the potential invasion of sovereign U.S. territory. A Chinese surprise attack is imminent and will most likely come in the form of a combined EMP terror attack, cyber-terror attack, and physical attack via manned aircraft and drones against U.S. military bases, cities and infrastructure in Hawaii and other U.S. coastal cities.

If the EMP terror propaganda is to be believed, a single Chinese EMP could destroy America, ultimately causing a nightmare worse than 9/11 resulting in an America with no power, no food, no transportation, no banking and no internet. To those who think a Chinese attack on the U.S. is laughable, consider this: On September 30, 2012, it was reported that the White House was attacked by hackers allegedly linked to China’s government. The unprecedented cyber-terror attack targeted the U.S. government’s most sensitive computer networks, ultimately breaching a system used by the White House Military Office for nuclear commands.

Download & Forward PDF

Unprecedented war propaganda, rising diplomatic tensions between the U.S. and China along with unprecedented U.S. propaganda against China indicates that World War III scenario between the United States and China is on the horizon. On June 4, 2012, it was reported that the Australian government’s 2009 Defence White Paper contained a “secret chapter” that assessed “Australia’s ability to fight an air-sea battle alongside the United States against China”. Then on June 27, 2012, Chinese general Peng stated that a future conflict with the United States is coming as a result of U.S. “containment” policy. “The United States has been exhausting all its resources to establish a strategic containment system specifically targeting China…The contradictions between China and the United States are structural, not to be changed by any individual, whether it is G.H.W. Bush, G.W. Bush or Barack Obama, it will not make a difference to these contradictions.”

This Truther.org terror warning is complex and interconnected and therefore can only be understood once all the following chapters are reviewed, confirmed and understood:

1. Rise of China
2. China & EMP Warfare
3. China & Cyber Terror
4. China & Space Terror
5. U.S. Landmarks Slated for Demolition

China Can’t Invade America
China, despite its 2.3 million man military, cannot physically occupy the continental Unites States. As General Isoroku Yamamoto, Fleet Admiral and Commander-in-Chief of the Imperial Japanese Navy (IJN) during World War II, once stated, “You cannot invade the mainland United States. There would be a rifle behind every blade of grass”. However, the invasion and occupation of Hawaii and select coastal locations such as New Orleans, Houston, San Diego, Los Angeles, San Francisco or Seattle is theoretically possible. Word about the Zionist occupation of America has reached critical mass and it is clear that Americans in both the police and military will not arrest, detain or execute their fellow American citizens. Therefore, a treacherous backroom deal has been struck between the Zionists and China to execute the dirty work that Americans won’t.

The Patriot Trap
In the aftermath of surprise Chinese attack and subsequent invasion, gun-wielding freedom loving patriots from all over America will flock to the coastal hotspots to fight the Chinese occupation. The will allow for the identification, apprehension, internment and subsequent death of potentially millions of American citizens. In the fog of war, it will be almost impossible to know whether these Americans disappeared at the hands of the Chinese or at the hands of the American government. In the end, it doesn’t really matter as both forces will be working together against the American people.

American Terrorists  
Essentially, a surprise Chinese attack and subsequent invasion would serve as both a psychological operation (PSYOP) and military diversion for the U.S. government in order to a) declare martial and seize total power, b) open FEMA camps for mass arrests and detection , and c) to regain public credibility which has been lost since 9/11. Once the patriot trap has served its purpose, so called American freedom fighters waging war against the Chinese government will be labeled as “terrorists” and treated as such. The Chinese invasion scenario depicted herein is essentially the storyline of two major films (see below), and appears to be the operational plan in place at the moment.

“Tomorrow, When the War Began”
In the propaganda film entitled “Tomorrow, When the War Began” (2010), (See: Trailer) a group of Australian youth out camping awake to find the skies full of invading Asian military aircraft, obviously Chinese. Once home, the group finds their homes abandoned, without power, without internet and without telephone. Eventually, the group finds out that the citizens of their town are being detained in FEMA like concentration camps by the invading military force from Asia. The group eventually decides to fight the foreign occupation and begins attacking and terrorizing them with the hope of regaining their freedom and country.

“Red Dawn”
In the propaganda film entitled “Red Dawn” (2012), (See: Trailer) a group of American youth out partying after a football game, suddenly find themselves in the middle of a major blackout, likely from an EMP attack. After returning home, they awake to find the skies full of invading North Korean military aircraft. The group vacates to a cabin and eventually finds out that their friends are being held in FEMA like prison camps. After debating what to do, the group begins plotting ways to attack and terrorize the occupying North Korean military force with the hope of regaining their freedom and country. The North Korea military strike deals with high ranking Americans and the group of youth known as the “Wolverines” are labeled as terrorists.

Terrorism No Longer Working
To date, there have been at least four Obama terror plots which have been foiled: The Super Bowl XLV nuclear terror plot, the 2012 New Year’s Eve dirty bomb plot, the 2012 Democratic National Convention terror plot, and the foiled Twilight Premier Massacre.  After being caught red-handed on multiple occasions, the Obama Administration and its Zionist controllers were so desperate for fresh new ways to terrorize the American public that in October of 2012, they enlisted the help of New York University. According to reports, NYU students were required to write a 10-15 page paper describing how they would hypothetically attack the United States. According to the class’s syllabus, students “must describe your hypothetical attack and what will happen in the aftermath of the attack,” considering how it’s achieved, funded, manned and responded to. The new terror ideas, whatever they may have been, obviously didn’t work and it appears that the tried and true method of full-scale war is back on the table.

China Planning to Attack U.S. Homeland?
On November 5, 2012, an article entitled “Red Flag Over The Atlantic: China Is Angling To Take Over A U.S. Airbase In The Azores” stated that “Chinese planes could patrol the northern and central portions of the Atlantic and thereby cut air and sea traffic between the U.S. and Europe” and that “China could target the American homeland. Lajes is less than 2,300 miles from New York, shorter than the distance between Pearl Harbor and Los Angeles”. The article concludes that “There are undoubtedly other stopgap solutions that the Pentagon could implement. None of them will be perfect, but all of them would be better than having Beijing’s red flag flying over the Atlantic — and permitting Chinese aircraft to patrol the waters connecting America to Europe”.

New Pearl Harbor: Chinese to Attack Hawaii?
Based on recent military drills and maneuvers, an attack by China on the U.S. island of Hawaii is highly likely. A new Pearl Harbor would destroy a key U.S. foothold in the Pacific as well as remind Americans of when the Japanese attacked Pearl Harbor on December 7, 1941. With state of the art radar and satellites, the Chinese will probably have to blind America electronically with an EMP/cyber-attack prior to an attack, or use unconventional means to transport their troops to Hawaii. On August 13, 2012, it was reported that China launched the “Bahai Sea Green Pearl”, a 36,000-ton ferry and cruise  ship commissioned in August of 2012 at Yantai Port in China’s northeastern Shandong Province. The ship is intended to ferry cars and passengers across the Yellow Sea, but when needed by the People’s Liberation Army, the “Green Pearl” can double as a troop carrier. Visually, the “Green Pearl” looks just like any other civilian cruise ship and could easily be used to secretly transport Chinese troops to Hawaii or the U.S. mainland in a surprise attack. On October 15, 2012, it was reported that one of China’s seven military command groups held a joint military drill involving infantry, artillery and air forces to improve the ability of paratroops to land on and capture an island.

Aircraft Carrier Attack?
If propaganda films like “Battleship” (2012) and “Red Tails” (2012) are any indication, high profile attacks on U.S. warships and aircraft carries may be imminent. On November 22, 2012, it was reported that the U.S. Navy is recalling the USS Dwight D. Eisenhower aircraft carrier back to Naval Station Norfolk, Virginia, for repairs. The USS Dwight D. Eisenhower, named after an American World War II hero, is currently stationed in the Persian Gulf but will be home for Christmas to allegedly “repair its flight deck”. On November 29, 2012, it was reported that the U.S.S. Enterprise, the world’s first nuclear-powered aircraft carrier, will retire after 5 decades of service. As of December 1, 2012, the U.S.S. Enterprise, whose name was made globally famous by the television show Star Trek, will also be stationed at Naval Station Norfolk, Virginia. Come December 21, 2012, both the USS Dwight D. Eisenhower and the USS Enterprise, maybe the two most famous ships in America’s history, will essentially become sitting ducks at Naval Station Norfolk, located just outside Washington D.C. Exactly how and when these ships will be attacked is not known, but they are a prime target or state-sponsored terror.

Pakistani Nuke Attack  
On February 1, 2011, Julian Assange of Wikileaks revealed to the world via leaked classified diplomatic documents that Al-Qaida was on the brink of using a nuclear bomb and that the West was on the verge of a “Nuclear 9/11″. What the diplomatic documents failed to mention was actual target, date and location of the upcoming nuclear terror attack which was previously revealed in The Nuclear Bible as Super Bowl XLV on February 6, 2011, in Dallas, Texas. Pakistan, whether they knew it or not at the time, had been set-up for the nuclear attack as they have been directly linked to every single major terror event including the 1993 World Trade Center Bombing, the USS Cole Bombing, the 9/11 attacks, the 7/7 Bombings in London, the Mumbai terror attacks as well as every major act of nuclear proliferation.

Nuclear Endgame: China
According to Wikipedia, since 1950, both China and Pakistan “have placed considerable importance on the maintenance of an extremely close and supportive relationship” and “each considers the other a close strategic ally”.  Had a nuclear attack transpired on Super Bowl Sunday, it is highly likely that a full scale nuclear war between Pakistan and the United States would have ensued, ultimately drawing China in on the side of Pakistan. During an Oval Office meeting on November 25, 2009, U.S. President Barack Obama was quoted as saying, “We need to make clear to people that the cancer is in Pakistan”. Since the nuclear terror plot was foiled, it appears that the nuclear World War III scenario between the U.S. and China will have to be brought about by unconventional means, namely a surprise attack.

1. RISE OF CHINA

1.1: A Chinese
Coup D’état
On September 11, 2012, the mysterious disappearance of then Chinese Vice-President Xi Jinping made international headlines. Shortly thereafter, Chinese President Hu Jintao was not re-elected as a member of the party’s Central Committee and was forced to step down as Communist Party leader. These timely events eventually cleared the way for now President Xi Jinping, a son of the Communist party whose father was a revolutionary hero. The quick and unprecedented shakeup of China’s leadership has fueled speculation and fears of an internal power struggle over the leadership and direction of Chinese government. A November 9, 2012, report entitled “China’s Hu Jintao Warns Party Of Enemy Within”, echoed those sentiments as outgoing President Hu spoke in front of 2,000 delegates at the opening of the 18th Communist Party Congress in Beijing stating that “Combating corruption and promoting political integrity is a major political issue. If we fail to handle it, it could prove fatal to the party and even cause the collapse of the party and the fall of the state. All those who violate party discipline and state laws, whoever they are and whatever power or official positions they have, must be brought to justice without mercy,” he warned. What direction President Xi Jinping will take China is still unknown, but it appears that World War III is on the horizon.

Potential Chinese Targets:
1. Japan
2. Hawaii
3. Australia
4. Mainland United States (New Orleans, Houston, San Diego, Los Angeles, San Francisco, Seattle)

1.2: U.S. Versus China War Propaganda
War propaganda between the U.S. and China is at an all-time high and escalating. In a May 16, 2012, report entitled “Chinese Official: It’s Us Or America”, quoted Song Xiaojun, a former senior officer of the People’s Liberation Army, who stated that “Australia always has to depend on somebody else, whether it is to be the ‘son’ of the US or ‘son’ of China”, ultimately implying that soon Australia will have to choose sides in an upcoming war between the U.S. and China. On May 18, 2012, it was reported by the Pentagon that China is exploiting Western commercial technology, conducting aggressive cyber espionage and buying more anti-ship missiles as part of a steady military build-up. A month later on June 3, 2012, a report entitled “America Threatens China: Pentagon Prepares For Confrontation In The Asia-Pacific Region” stated that “Having vanquished most all islands of resistance and neutrality in Europe, Africa and the Middle East, the Pentagon is moving its global military machine into the Asia-Pacific for a showdown with China”. A day later on June 4, 2012, it was reported that a newly published book by journalist David Uren had revealed that the Australian government’s 2009 Defence White Paper contained a “secret chapter” that assessed “Australia’s ability to fight an air-sea battle alongside the United States against China”. Two days later on June 6, 2012, it was reported that India declined to participate in a new and aggressive U.S. foreign policy towards Asia entitled ‘Rebalancing of Military Strategy with focus on Asia-Pacific‘ which essentially proposes that at least 60 percent of U.S. Naval assets be deployed in Asia-Pacific to counter China. A few weeks later on June 27, 2012, it was reported that a People’s Liberation Army (PLA) Maj. Gen. Peng Guangqian stated that a future conflict with the United States is coming as a result of U.S. “containment” policies. “The United States has been exhausting all its resources to establish a strategic containment system specifically targeting China,” Gen. Peng said. “The contradictions between China and the United States are structural, not to be changed by any individual, whether it is G.H.W. Bush, G.W. Bush or Barack Obama, it will not make a difference to these contradictions.” A few months later on August 24, 2012, in a report entitled “China Could Penetrate US With New Huge Missile”, it stated that the “Dongfeng-41 (DF-41) intercontinental [nuclear] ballistic missile (ICBM), had been fired in testing last month by the PLA’s Second Artillery Corps” and that “It might be time to sweep the cobwebs out of that old nuclear bunker at the bottom of the garden”.  A month later on September 3, 2012, it was reported that India, after declining an offer from the U.S. to counter China, India has now stepped up military relations and unity with China. On September 21, 2012, in a report entitled “PLA Admiral: China Should Prepare For Conflict With U.S. Over Disputed Islands” it quotes Zhang Zhaozhong, a rear admiral at China’s National Defense University, as stating that, “China has a stronger fighting capability than Japan in a war for the Diaoyu Islands, because China’s coastal areas are close to the islands and the radar and missiles there can cover all the islands.” Zhaozhong then makes it clear what will happen if the U.S. were to become embroiled in the conflict. “The intervention of the U.S. military will change the military strength contrast between China and Japan, so China should prepare for it”, Zhaozhong stated. In an October 8, 2012, report entitled “US: China Bears Malice Towards US”, states that a draft of a report by the U.S. House Intelligence Committee says that China bears malice towards the U.S. and that Chinese corporations pose “a threat to the U.S. national security”.

1.3: Latest Chinese Military Weapons
Complementing the ever growing U.S. versus China war propaganda is unprecedented military growth by China. A quick look at China’s new military might indicates that China is less concerned with self-defense but rather a stab at world dominance. Aside from their latest aircraft carriers, drones and stealth fighters, China boasts the new Type 99 Main battle tank, the HQ-19 missile system which can track up to 100 airborne targets at once, the PGZ-95 anti-aircraft system fires which up to 800 25mm rounds a minute, the Type 22 Houbei Class which is the world’s first attack catamaran, Type 052 destroyers which carry 48 missiles apiece, the Kilo-class submarine which can bring China’s nuclear payload anywhere in the world, and the Dongfeng class of ICBMs can theoretically drop a nuclear missile anywhere in North America.

Latest Chinese Military Advancements:

1. August 13, 2012: China Launches Cruise Ships to Haul Troops and Tanks
2. August 29, 2012: China Deploys Drones to “Conduct Maritime Surveillance”
3. September 17, 2012: China Activates New J-21 Stealth Fighter
4. September 25, 2012: China Unveils First Aircraft Carrier To Enter Service
5. October 16, 2012: China Leads Asia in Military Spending
6. November 1, 2012: China Tests Second Type of Stealth Fighter Prototype
7. November 8, 2012: China Subs to Carry Nuclear Warheads
8. November 9, 2012: China Launches Mystery Space Plane
9. November 10, 2012: China Plans To Launch Manned Spaceship
10. November 18, 2012: China Launches “Disaster-Monitoring Satellite”
11. November 25, 2012: China Lands First Jet on Aircraft Carrier

1.4: Latest Chinese Military Maneuvers  
Based on military maneuvers conducted by both China and the United States in 2012 alone, war between the two nuclear nations is closer than ever. On June 19, 2012, it was reported that China, Iran, Russia and Syria participated in the “largest war game”. Roughly four months later on October 15, 2012, it was reported that one of China’s seven military command groups held a joint military drill involving infantry, artillery and air forces to improve the ability of paratroops to land on and capture an island. On July 30, 2012, it was reported that Chinese naval forces were nearing Europe when their PLAN escort fleet, which included the Type 052 “Qingdao” destroyer, Type 054A “Yantai” missile frigate, and the “Weishanhu” auxiliary oil replenishment ship, crossed the Suez Canal, with Cairo’s permission, on their way to the Mediterranean Sea. On October 23, 2012, it was reported that China had announced a major reshuffle of the PLA with the appointment of a new air force commander and a new head to its General Political Department, which is responsible for army morale, personnel changes and loyalty to the Communist party. On October 24, 2012, it was reported that China has appointed a new army chief of staff and other top officers amid efforts to “further professionalize the world’s largest standing military”. On November 8, 2012, it was reported in a 2012 report by the U.S. Congress that China appears to be within two years of deploying submarine-launched nuclear weapons, but that China remains “the most threatening” in cyberspace. On November 21, 2012, it was reported that China’s military held holding naval exercises near Japan and closed off an area near the nuclear submarine base at Huludao, where China builds its Type 094 ballistic-missile submarines.

1.5: Anti-Chinese U.S. Military Maneuvers
Based on military maneuvers conducted by both China and the United States in 2012 alone, war between the two nuclear nations is closer than ever. On May 11, 2012, the U.S. Navy successfully tested a new anti-ballistic missile over the Pacific. The next month on June 12, 2012, commander of the U.S. Pacific Fleet Admiral Cecil Haney stated that the Navy will be sending its most advanced vessels and aircraft to the Asia-Pacific region. A couple weeks later on June 21, 2012, it was reported that the U.S, Japan and South Korea began joint naval exercises in waters near China. Two days after that on June 23, 2012, it was reported that the U.S. is now rebuilding and refurbishing former military bases in the Asia-Pacific region. Four days later on June 27, 2012, it was reported that the U.S. had tested yet another medium-range, separating ballistic missile off the coast of Hawaii. Three days after that on June 30, 2012, it was reported that a group of Russia’s Pacific Fleet warships arrived at the U.S. Pearl Harbor naval base to take part in the Rim of the Pacific international drills. A week later on July 8, 2012, it was reported that B-1 bombers are being transferred from Afghanistan to the Asia-Pacific region. “The B-1′s capabilities are particularly well-suited to the vast distances and unique challenges of the Pacific region, and we’ll continue to invest in, and rely on, the B-1 in support of the focus on the Pacific” stated Major General Michael Holmes, assistant deputy chief of staff for Air Force Operations. A month later on August 1, 2012, it was reported that Pentagon planners are considering adding bombers and attack submarines to the Pacific fleet as part of a growing U.S. focus on security challenges in the Asia-Pacific, namely China. On October 3, 2012, it was reported that U.S. Stryker Brigade spent the past month training in Hawaii conducting hand-grenade qualification, assault tactics with a focus on platoon-level training. On October 26, 2012, it was reported that the U.S. military had intercepted four out of five targets over the Pacific Ocean in the largest and most complex test of the nation’s ballistic missile defense system.

1.6: U.S. & Chinese Diplomatic Tensions
Diplomatic tensions between the U.S. and China are currently at unprecedented levels. A crisis of any kind could theoretically draw both sides into a violent and bloody conflict. On June 2, 2012, it was reported that a Chinese security official at the Ministry of State Security, China’s main intelligence agency, has been arrested on suspicion of spying for the U.S. after allegedly passing along information to the U.S. regarding China’s espionage activities. A month later on July 6, 2012, it was reported that a Pentagon Contractor was caught illegally selling military technology to China. Six days later on July 12, 2012, it was reported that the FBI had opened a criminal investigation targeting a leading Chinese telecommunications firm that allegedly conspired to illegally ship hardware and software purchased from U.S. tech firms to Iran’s government-controlled telecom company, a violation of several federal laws and a trade embargo imposed on the outlaw Islamic nation. That same day, July 12, 2012, it was also reported that the Chinese government has begun cracking down on GM (General Motors) car manufacturing and sales in China. A few months later on September 4, 2012, it was reported that two Chinese men were detained over an attack on the Japanese ambassador’s car in Beijing. The U.S. has been a long-time ally of Japan, especially in the escalating feud with China over the Senkaku Island. On September 5, 2012, a report entitled “Territorial Tensions Ripple As Clinton Visits Beijing” stated that tensions over territorial disputes have spiked this year between China and Japan and that “the United States has been drawn into the fray.” A month later on October 20, 2012, a report entitled “US Risks Drawing Beijing’s Ire With Military Cruise In Disputed Waters” stated that a U.S. aircraft carrier group cruised through the disputed South China Sea in “a show of American power in waters that are fast becoming a focal point of Washington’s strategic rivalry with Beijing”. On October 25, 2012, it was reported that China rejected sanctions and the use of force against Iran over its nuclear energy program, a direct slap in the face of both the U.S. and Israel. That same day, October 25, 2012, the Chinese government blocked access to the English-language and Chinese-language Web sites of The New York Times from computers in mainland China in response to an article in both languages describing wealth accumulated by the family of the country’s prime minister.

1.7: The Senkaku Islands Dispute
The Senkaku Islands dispute appears to be the powder keg which will eventually ignite the Chinese war machine to attack Japan, Hawaii, mainland United States and potentially even Australia. On September 21, 2012, in a report entitled “PLA Admiral: China Should Prepare For Conflict With U.S. Over Disputed Islands” it quotes Zhang Zhaozhong, a rear admiral at China’s National Defense University, as stating that, “China has a stronger fighting capability than Japan in a war for the Diaoyu Islands, because China’s coastal areas are close to the islands and the radar and missiles there can cover all the islands.” Zhaozhong then makes it clear what will happen if the U.S. were to become embroiled in the conflict. “The intervention of the U.S. military will change the military strength contrast between China and Japan, so China should prepare for it”, Zhaozhong stated. According to Wikipedia, the Senkaku Islands dispute concerns a territorial dispute over a group of uninhabited islands known as the Senkaku Islands in Japan and as the Diaoyu (in China) or Tiaoyutai Islands (in Taiwan). Aside from a 1945 to 1972 period of administration by the United States, the archipelago has been controlled by Japan since 1895.The People’s Republic of China (PRC) disputed the proposed US handover of authority to Japan in 1971and has asserted its claims to the islands since that time.The Republic of China (Taiwan) also claims the islands. The territory is close to key shipping lanes, rich fishing grounds, and there may be oil reserves in the area. Although the United States does not have an official position on the merits of the competing sovereignty claims,the islands are included within the U.S. Japan Security Treaty meaning that a defense of the islands by Japan may compel support from the United States military. In September 2012, the Japanese government purchased the remaining three of the disputed islands that it did not already own from their private owner, prompting large-scale protests in China.

1.8: Escalating War of Words

Historically speaking, prior to any bloody international conflicts, there is usually a verbal sparring of words from both sides prior to any act of war. The situation between the U.S. and China is no different and the rhetoric is getting more heated with each passing day. On May 25, 2012, the People’s Republic of China published a scathing report entitled, “The Human Rights Record of the United States in 2011” and released it via their  Chinese consulate in New York City. In the report, China is very critical of U.S. gun ownership laws: “The United States prioritizes the right to keep and bear arms over the protection of citizens’ lives and personal security and exercises lax firearm possession control, causing rampant gun ownership,” the report claims. On June 5, 2012, it was reported that China told foreign embassies to stop publishing their own reports on air quality in the country, escalating its objections to a popular U.S. Embassy Twitter feed that tracks pollution in smoggy Beijing. On June 25, 2012, a report entitled “Dogs Destined For The Table: Horrific Images Show Animals Being Killed, Cooked And Served Up As A Meal In Chinese Tradition” was published as part of an obvious  and growing propaganda campaign to demonize China and foment hatred prior to a military engagement against the country. On July 12, 2012, it was reported that U.S. Senate Majority Leader Harry Reid slammed the U.S. Olympic Committee over reports that the Team USA uniforms were made in China, saying officials “should burn” them. On August 6, 2012, it was reported that China blasted the U.S. for its recent public criticism and urging of diplomacy to address territorial disputes in the South China Sea, saying the U.S. statement shows “total disregard for the facts” and sends “a seriously wrong message“. On September 3, 2012, it was reported that some 8000 people chanted “No to brainwashing education. Withdraw national education” in an effort to denounce the Hong Kong government-funded booklet entitled “The China Model” they say glorifies China’s single Communist party rule while glossing over more brutal aspects of its rule and political controversies. On October 16, 2012, the Pew Global Attitudes Project released a report which allegedly found that people in China are increasingly worried about corruption, inequality, food safety, and that about half of Chinese like American ideas about democracy. On November 2, 2012, it was reported that China plans to launch a national voluntary organ donation system early next year in a bid to fulfill growing transplant lists and phase out its long-criticized reliance on organs from executed prisoners. The report essentially confirms that China is indeed still harvesting human organs illegally and that although they have plans to change, they still are engaged in potentially the most inhumane and brutal practices known to mankind.

1.9: Chinese Terrorism on the Rise
In an apparent move to menace the West with a new breed of terrorist as well as quell dissent at home once offensive Chinese military operations begin, China is suddenly dealing with an outbreak of homegrown Islamic terrorism. On June 30, 2012, it was reported that passengers and crew members thwarted a 9/11 style hijack attempt to overtake a plane in the western Chinese province of Xinjiang. According to the report, six Chinese terrorists posing as passengers tried to take control of the plane “through violence”. The passengers and crew members managed to subdue the Chinese hijackers, sustaining minor injuries in the struggle. On October 29, 2012, it was reported that Chinese Muslim separatists from the northwest region of Xinjiang were battling Syrian government forces alongside al-Qaida and other extremist groups. The report, citing unidentified Chinese anti-terrorism authorities, states that the groups were funding their activities through drug and gun trafficking, kidnapping and robbery, and providing training for “separatists, criminals and terrorists” who had fled Xinjiang. “After receiving orders from al-Qaida, terrorists from China came to Syria to meet with jihadists already on the ground before forming groups on the front lines,” the report quoted an unidentified official as saying. On October 9, 2012, it was reported that two flights out of Tibet and southern Jiangxi bound for Beijing were grounded on after China’s national carrier, Air China, received terror “threat calls” from unidentified sources, prompting a tightening of security in many airports across the country.

1.10: Chinese Dalai Lama Assassination Plot 
On May 12, 2012, it was reported that the Dalai Lama, a 76-year-old Nobel Peace Prize winner, revealed he was the intended target in a Chinese assassination plot. Lama stated that he had been passed reports from inside Tibet warning that Chinese agents had trained Tibetan women for a mission to poison him while posing as devotees seeking his blessings. The Dalai Lama is a darling of the West, especially the United States and the European Union, so any suspected plot to attack on the world-famous Buddhist monk paints China as an aggressive and brutal regime.

1.11: China Eclipses U.S. as Super-Power
A November 9, 2012, report entitled “China’s Economy To Overtake US In Next Four Years”, states that “The Paris-based Organisation for Economic Co-operation and Development (OECD) says that China’s economy will be larger than the combined economies of the eurozone countries by the end of this year, and will overtake the US by the end of 2016.” On November 21, 2012, it was reported that China is planning to build the tallest skyscraper in the world standing at 2,749ft (838m) high, over 220 floors, and it will only take them 90 days, an obvious slap in the face of America who has yet to finish the “Freedom Tower” which has been under construction since April 27, 2006. On November 29, 2012, a new report by Ernst & Young was published stating that the Chinese film market, the second biggest in the world, will surpass the U.S. by 2020.

1.12: 45 Signs That China Is Colonizing America
On May 23, 2012, a report entitled “45 Signs That China Is Colonizing America” was released. The report albeit true, is intended to make Americans feel insecure about themselves as a nation and as a people, as well as scapegoat China for their current financial situation as opposed to the Zionist who are running America into the ground.

1. It was recently announced that China’s Dalian Wanda Group has bought U.S. movie theater chain AMC Entertainment for a whopping 2.6 billion dollars.  This deal represents China’s biggest corporate takeover of a U.S. firm ever.
2. Earlier this month, the Federal Reserve announced that it has given approval for banks owned by the Chinese government to buy stakes in U.S.-owned banks.
3. A few days ago Reuters reported that China is now able to completely bypass Wall Street and purchase U.S. debt directly from the U.S. Treasury Department.
4. A recent investigation by the U.S. Senate Committee on Armed Services found more than one million counterfeit Chinese parts in the Department of Defense supply chain.  How in the world could we be so stupid?
5. After being bailed out by U.S. taxpayers, General Motors is currently involved in 11 joint ventures with companies owned by the Chinese government.  The price for entering into many of these “joint ventures” was a transfer of “state of the art technology” from General Motors to the communist Chinese.
6. A Chinese company known as “Sino-Michigan Properties LLC” has purchased 200 acres of land near the town of Milan, Michigan.  The goal is to build a “China City” with artificial lakes, a Chinese cultural center and hundreds of housing units for Chinese citizens.
7. As I reported on recently, corporations controlled by the Chinese government have been rapidly buying up U.S. oil and gas deposits worth billions of dollars.
8. Chinese investors have been gobbling up real estate all over New York City.  The following is from a recent Forbes article….“According to a recent report in the New York Times, investors from China are “snapping up luxury apartments” and are planning to spend hundreds of millions of dollars on commercial and residential projects like Atlantic Yards in Brooklyn. Chinese companies also have signed major leases at the Empire State Building and at 1 World Trade Center, the report said.”
9. The Chinese are also doing huge real estate deals in cities in the middle part of the country.  The following example is from an article in the Toledo Blade…“Dashing Pacific Group Ltd., which has already purchased the nearby Docks restaurant complex for $2.15 million, put its $3.8 million offer to buy the southern 69 acres at the Marina District in East Toledo back on the table for approval by Toledo City Council. Additionally, Dashing Pacific Chairman Yuan Xiaohong, in a letter signed in Hangzhou, said the firm wants a two-year option to buy the decommissioned Toledo Edison power plant property on the site.”
10. According to ABC News, major road and bridge projects all over the United States are being built by Chinese companies.  Meanwhile, there are millions upon millions of blue collar American workers that cannot find jobs.  The following is a brief excerpt from a recent ABC News article….”In New York there is a $400 million renovation project on the Alexander Hamilton Bridge…In California, there is a $7.2 billion project to rebuild the Bay Bridge connecting San Francisco and Oakland…In Alaska, there is a proposal for a $190 million bridge project…These projects sound like steps in the right direction, but much of the work is going to Chinese government-owned firms…”When we subsidize jobs in China, we’re not creating any wealth in the United States,” said Scott Paul, executive director for the Alliance for American Manufacturing.
11. The new World Trade Center tower is going to include glass that has been imported from China.
12. The new Martin Luther King memorial on the National Mall was made in China.
13. Check out this incredible photo which contrasts the decline of Detroit over the years with the amazing rise of Shanghai, China.
14. A couple of years ago, a large Chinese company was considering building “a 10,000- to 30,000-acre technology zone for industry, retail centers and homes” just south of Boise, Idaho.
15. Our trade deficit with China in 2011 was $295.5 billion.  That was the largest trade deficit that one country has had with another country in the history of the planet.
16. In 2011, our trade deficit with China was 28 times larger than it was back in 1990 and more than 49,000 times larger than it was back in 1985.
17. Back in 1998, the United States had 25 percent of the world’s high-tech export market and China had just 10 percent. Today, China’s high-tech exports are more than twice the size of U.S. high-tech exports.
18. America has lost more than a quarter of all of its high-tech manufacturing jobs over the past ten years.
19. According to the Economic Policy Institute, America is losing half a million jobs to China every single year.
20. The U.S. spends about 4 dollars on goods and services from China for every one dollar that China spends on goods and services from the United States.  Does that sound like “fair trade” to you?
21. While we allow Chinese goods to freely flood our shores, China just keeps slapping new tariffs on American-made goods.  According to the New York Times, a Jeep Grand Cherokee that costs $27,490 in the United States costs about $85,000 in China thanks to all the tariffs.
22. According to U.S. Representative Betty Sutton, an average of 23 manufacturing facilities a day closed down in the United States during 2010.
23. The United States has lost an average of approximately 50,000 manufacturing jobs a month and more than 56,000 manufacturing facilities in the United States have been shut down since China joined the World Trade Organization in 2001.
24. The United States has lost a staggering 32 percent of its manufacturing jobs since the year 2000.
25. Between December 2000 and December 2010, 38 percent of the manufacturing jobs in Ohio were lost, 42 percent of the manufacturing jobs in North Carolina were lost and 48 percent of the manufacturing jobs in Michigan were lost.
26. In 2010, China produced more than twice as many automobiles as the United States did.
27. In 2010, China produced 627 million metric tons of steel.  The United States only produced 80 million metric tons of steel.
28. In 2010, China produced 7.3 million metric tons of cotton.  The United States only produced 3.4 million metric tons of cotton.
29. Today, China produces nearly twice as much beer as the United States does.
30. 85 percent of all artificial Christmas trees are made in China.
31. China is now the number one producer of wind and solar power on the entire globe.
32. Chinese solar panel production was about 50 times larger in 2010 than it was in 2005.
33. Right now, China is producing more than three times as much coal as the United States does.
34. China is now the number one supplier of components that are critical to the operation of U.S. defense systems.
35. According to author Clyde Prestowitz, China’s number one export to the U.S. is computer equipment.  According to an article in U.S. News & World Report, during 2010 the number one U.S. export to China was “scrap and trash”.
36. According to Professor Alan Blinder of Princeton University, 40 million more U.S. jobs could be sent offshore over the next two decades.
37. The United States had been the leading consumer of energy on the globe for about 100 years, but during the summer of 2010 China took over the number one spot.
38. 15 years ago, China was 14th in the world in published scientific research articles.  But now, China is expected to pass the United States and become number one very shortly.
39. China now awards more doctoral degrees in engineering each year than the United States does.
40. China now possesses the fastest supercomputer on the entire planet.
41. China now has the world’s fastest train and the world’s most extensive high-speed rail network.
42. The Chinese economy has grown 7 times faster than the U.S. economy has over the past decade.
43. The Chinese economy is projected to be larger than the U.S. economy by 2016.
44. One economist is projecting that the Chinese economy will be three times larger than the U.S. economy by the year 2040.
45. China now holds approximately 1.17 trillion dollars of U.S. government debt.  If you were alive back when Jesus was born and you had spent a million dollars every single day since then, you still would not have spent that much money by now.

2. CHINA & EMP WARFARE

2.1: China’s EMP Quest
A January 8, 2011, article entitled “China’s Quest For Dominance In Electro-Magnetic Warfare” stated that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Adm. Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the U.S. propaganda is to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in any future conflict. Aside from China, the U.S. has also publically accused  North Korea of also developing EMP weapons. If and when an EMP terror attack strikes America, there is a high probability that China will ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

2.2: What is an EMP?
An electromagnetic pulse (EMP) is a burst of electromagnetic radiation which usually results from a high energy nuclear explosion that suddenly fluctuates the magnetic field. Theoretically, an EMP could wipe out everything electronic (planes, trains, cars, computers, internet, etc.) in a flash. EMP terror has gained popularity of late and has been featured in movies such as “The Matrix” and television shows such as “24” and the #1 show on NBC entitled “Revolution”, which eerily features a post-EMP America with no electricity. Aside from the Hollywood EMP propaganda, there has been recent EMP terror legislation by the U.S. congress, a number of EMP terror conferences, and EMP terror scholarly whitepapers which have all been preparing local, state and federal officials for an upcoming EMP terror attack on America. Based on the 12 major power outages in 2012 alone, it appears that the U.S. government is programming the public for the permanent loss of electricity. Coincidentally, in September of 2012, Alex Jones of Infowars released a new magazine which indicates that the STRATFOR intelligence operation known as Infowars knows that the internet is about to expire and have planned ahead by launching a new propaganda magazine.

2.3: Chinese “Mystery Missile” EMP Attack?
On November 10, 2010, it was reported that a satellite monitoring the western coastal regions of North America detected an “EMP anomalous event” which occurred on November 8, 2010, when a Chinese sub allegedly fired an EMP weapon. According to the report, the Chinese Navy fired an EMP missile on the U.S. based cruise ship “Carnival Splendor resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that same day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. The U.S. government denied that they were responsible for the missile, but a Russian report stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a US Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the Chinese attacked the “Carnival Splendor” with an EMP weapon and the U.S. sent up a random missile to distract the world from it.

2.4: EMP Terror Drills
To date, there have been only a handful of EMP terror drills, but a recent massive and unprecedented “nuclear terror drill” in Russia has drawn red flags for a number of different reason. First off, the nuclear terror scenario was highly exposed and ultimately foiled in 2011, so chances of another staged nuclear terror plot in 2012 is virtually non-existent. Therefore, the gathering of 58 nations to deal with “a simulated aftermath of a nuclear terrorism attack” is absurd, especially considering that the fallout of a nuclear terror attack would not directly affect 58 nations. It is far more likely that the 58 nations were drilling for the simulated aftermath of an EMP nuclear terror attack because the permanent loss of electricity in one nation would directly affect business, communication, energy media, travel, and a host of other electrical dependent sectors in other nations as well.

2.5: EMP Terror & Planes
On April 1, 2009, it was reported that counterterrorism analysts warned that EMP weapons capable of frying the electronics in civil airliners could be built using information and components available on the net. According to the report, all it would take to bring a plane down would be “a single but highly energetic microwave radio pulse blasted from a device inside a plane, or on the ground and trained at an aircraft coming in to land”. The same exact scenario of planes dropping like flies from the sky originally depicted by counterterrorism analysts in 2009 came to fruition in 2012 and is featured in the EMP terror television show entitled “Revolution”. Interestingly, in October of 2012, American Airlines has pulled 47 planes due to malfunctioning seats and 17 flights were diverted from Manila’s international airport due to an alleged air traffic equipment “glitch”. What role these 64 planes will play in the wake of a cyber-terror attack is unknown, but there is a real possibility that these planes have been remotely “programmed” to lose all power and drop to earth on a future date.

2.6: EMP Terror & Cars
One of the entities which will likely be affected by an EMP terror attack is cars and trucks. In 2012 alone, tens of millions of American cars have been recalled for suspicious reasons. Whether or not these cars, most of which have onboard computers, where uploaded with a virus or computer program to electrically debilitate the vehicle at a future date or by remote control is not known, but the large amount of recalls (partial list below) by almost every single motor company in the world is highly suspicious. The scenario of cars suddenly losing power and becoming useless is a main theme in the #1 show on NBC entitled “Revolution”, which eerily features a post-EMP America with no electricity and no working cars.

Recent Factory Recalls:

1. February 10, 2010: Toyota Vehicle Recall (2.3 Million)
2. May 19, 2010: Nissan Vehicle Recall (48,700)
3. June 30, 2011: Nissan Vehicle Recall (35,000)
4. July 14, 2011: Dodge Vehicle Recall (242,780)
5. December 31, 2011: GMC Vehicle Recall (4,296)
6. June 22, 2012: GMC Vehicle Recall (400,000)
7. July 19, 2012: Ford Vehicle Recall (11,500)
8. July 26, 2012: Ford Vehicle Recall (484,600)
9. July 30, 2012: Hyundai Vehicle Recall (221,631)
10. August 11, 2012: GMC Police Car Recall (38,000)
11. August 18, 2012: GMC & Isuzu Recall (258,000)
12. September 17, 2012: Ford Vehicle Recall (5,500)
13. September 13, 2012: Nissan Vehicle Recall (50,000)
14. September 21, 2012: GMC Vehicle Recall (426,000)
15. October 1, 2012: Honda Vehicle Recall (625,762)
16. October 1, 2012: GMC Vehicle Recall (40,859)
17. October 7, 2012: Honda Vehicle Recall (1.71 Million)
18. October 8, 2012: Dodge Vehicle Recall (44,300)
19. October 10, 2012: Toyota Vehicle Recall (7.43 Million)
20. October 17, 2012: Ford Vehicle Recall (262,000)
21. October 22, 2012: Nissan Vehicle Recall (13,919)
22. October 25, 2012: BMW Vehicle Recall (7,485)
23. October 28, 2012: BMW Vehicle Recall (45,500)
24. October 30, 2012: Nissan Vehicle Recall (11,000)
25. November 8, 2012: Jaguar Vehicle Recall (4,195)
26. November 9, 2012: Chrysler Vehicle Recall (919,000)
27. November 11, 2012: Jeep Vehicle Recalls (775,000)
28. November 12, 2012: Scion Vehicle Recall (11,200)
29. November 14, 2012: Toyota Vehicle Recall (2.77 Million)
30. November 14, 2012: GMC Vehicle Recall (2,949)
31. November 14, 2012: Cadillac Vehicle Recall (12,626)
32. November 15, 2012: Honda Generator Recall (150,600)
33. November 19, 2012: Honda Motorcycle Recall (11,500)
34. November 20, 2012: Volkswagen Vehicle Recall (2,471)
35. November 20, 2012: Mercedes-Benz Vehicle Recall (23)
36. November 21, 2012: Toyota Vehicle Recall (150,000)
37. November 29, 2012: Honda Vehicle Recall (157)

3. CHINA & CYBER TERROR

3.1: China & Cyber Terror
The nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. Based on news and events surrounding, China more than any other nation is sure to be scapegoated in the aftermath of cyber-terror attacks against the United States. On October 5, 2011, U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign and cybercrime against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two US satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyberespionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta, has publically stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to tamp down aggressive Chinese cyber-attacks against American companies and the government.  October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.

3.2: Cyber-Terror Attacks
Since 2011, there have been an epidemic of “cyber-attacks” targeting high-profile government entities such as the Vatican, United Nations, Interpol, NASA, Scotland Yard, FBI, DHS, CIA and the U.S. Federal Trade Commission. Less publicized however have been the cyber-attacks on critical infrastructure such as water plants, nuclear power plants, oil refineries and banks. These alleged cyber-attacks, whether real or not, give the perception that any entity with an internet connection is vulnerable to a future cyber-attack.

3.3: Cyber Terror Drills
Both the Israeli and U.S. government, namely the CIA and the U.S. Department of Homeland Security, have been drilling cyber-terror attacks on a routine basis. Past cyber-terror drills range in duration and targets, generally focus on the financial and infrastructure targets. According to reports, authorities have expressed concerns about terrorists combining physical attacks such as bombings with hacker attacks to disrupt rescue efforts, known as hybrid or “swarming” attacks.”

3.4: Cyber-Terror Hotline
Just as the United States and the Soviet Union had a nuclear hotline to avoid potential nuclear misunderstandings during the Cold War, a new “cyber-war hotline” is being speculated about in order to avoid future misunderstandings in the wake of major cyber-terror attacks. Security expert Bruce Schneier stated that a hotline between the world’s cyber commands would “at least allow governments to talk to each other, rather than guess where an attack came from.” On October 4, 2012, it was reported that Britain has begun tentative talks with China and Russia about setting up a hotline to help prevent cyber-emergencies from spiraling out of control. “At the moment, we don’t really have sufficient information-sharing arrangements with some countries such as China and the Chinese computer emergency response team,” said a senior Foreign Office official.

3.5: Cyber-Terror Plots & Patsies
Since April of 2011, there has been at least 25 major cases in which individuals or groups were charged with committing acts hacking or cyber-terror, while in China, police allegedly arrested 10,000 people in an unprecedented cyber-terror sweep. In most of the cases, finance or bank related hacking or cyber-terror was the motive although major corporate, energy or government institutions such AT&T, Blackberry, British National Party CIA, English Defence League, Facebook, Federal Reserve Bank, NATO, NHI, Nintendo, Sega and Symantec have also been allegedly targeted.

3.6: Cyber-Terror Security Takeover
Under the guise of “cyber security”, the U.S. government has spent billions of dollars mapping and federalizing cyberspace and cyber security throughout America. According to the 2009 CRS Report for Congress entitled “Comprehensive National Cybersecurity Initiative”, the sudden change in policy is to ensure that “U.S. Government cyber security initiatives are appropriately integrated, resourced and coordinated with Congress and the private sector“. This changes essentially ensures that the private sectors of the economy (banks, gas, oil, power, stock markets, etc.) are under the cyber thumb of the U.S. government so that they can be targeted, hijacked and ultimately destroyed in a future cyber terror attack.

3.7: Cyber-Terror Target: Airplanes
According to recent cyber-terror propaganda, drones and planes can be remotely hijacked and then used as weapons, similarly to what happened on September 11, 2001. On June 25, 2012, it was reported that with the right equipment, anyone could take control of a GPS-guided drone and easily turn it into a weapon. Professor Todd Humphreys of the University of Texas at Austin stated that “Each one of these [drones] could be a potential missile used against us.” A month later on July 27, 2012, it was reported that air traffic control software which is used around the world could be exploited by hackers to unleash squadrons of ghost planes. Interestingly, in October of 2012, American Airlines has pulled 47 planes due to malfunctioning seats and 17 flights were diverted from Manila’s international airport due to an alleged air traffic equipment “glitch”. What role these 64 planes will play in the wake of a cyber-terror attack is unknown, but there is a real possibility that these planes have been remotely “programmed” to lose all power at a future date.

3.8: Cyber-Terror Target: Nuclear Reactors
On December 13, 2011, it was reported that U.S. officials were investigating whether Iranian and Venezuelan diplomats in Mexico were involved in planned cyber-attacks against U.S. targets, including nuclear power plants. There have also been approximately 45 nuclear reactor “emergencies”, “closures”, “leaks” and other major incidents clearly setting the stage for nuclear reactor terror on an unimaginable scale. Complementing the unprecedented nuclear reactor emergencies are multiple cases of “terrorists” attempting to breach nuclear reactors, repeated lapses in nuclear reactor security, as well as countless propaganda articles indicating that a Fukushima-level event inside the United States is a foregone conclusion.

3.9: Cyber-Terror Target: Prisons
Since September of 2012, there have been 4 major prison breaks in Iraq Libya Mexico and the U.S. which untimely indicates that more major prison breaks are imminent. On November 10, 2011, it was reported that officials with the Federal Bureau of Prisons have been informed that U.S. penitentiaries could be vulnerable to cyber-terror attacks that would help prisoners escape. According to the report, most American prisons are operated by industrial control systems (ICS) that also are used by power plants, water treatment facilities and other infrastructure operations. ICS’ vulnerability was demonstrated two years in Iran, when hackers sabotaged that country’s nuclear program by exploiting its Siemens programmable logic controllers (PLCs). Almost all of the 117 federal correctional facilities, 1,700 prisons and 3,000 jails in the United States use PLCs to control doors and manage their security systems. Coincidentally, on October 2, 2012, it was reported that the Obama administration plans to buy an Illinois prison which end up being the prison facility that suffers a cyber-terror prison break.

3.10: Cyber-Terror Target: Subways & Trains
On December 29, 2011, it was reported that Professor Stefan Katzenbeisser of Technische Universität Darmstadt had told a security conference in Berlin that new train system was vulnerable to hackers and “Denial of Service”. Future cyber-terror attacks could rhetorically target train switching systems, which enable trains to be guided from one track to another at a railway junction. Although these switching systems have historically been separate from the online world, this is no longer the case.  The Israeli cyber-terror worm entitled the “Duqu virus”, has already wreaked havoc worldwide and could be used to target trains in the U.S. and Europe. Based on recent and inexplicable train crashes, this virus may already be attacking trains worldwide. Acting as a Trojan horse, the Duqu virus has the ability to essentially hijack its victim and then allow for the remote control of whatever entity is hijacked. If the Duqu virus hijacked a train, it could theoretically control train acceleration, braking and track switching.

3.11: Cyber-Terror Target: U.S. Stock Markets
Based on unprecedented financial cyber-terror propaganda and the recent rash of suspects and patsies arrested for financial cyber-terror and financial related crimes, financial cyber-terror is blinking red on every level. An April 24, 2012, report stated that Osama bin Laden was looking for a follow-up terror attack to  doom the American economy, so there is a real possibility that cyber terror attack targeting U.S. banks and Wall Street could hijack trillions of dollars ultimately dooming the American economy. To date, individuals have been arrested for cyber-terror related crimes such as credit and debit card PIN theft, the theft of proprietary software code from the Federal Reserve Bank of New York, the illegal reproduction and distribution of more than 100 copyrighted commercial and financial business software programs, the malware SpyEye used to steal and use personal banking and credit card data from unsuspecting victims’ online accounts, and the former head of fraud and security for digital banking at Lloyds Bank has admitted to committing £2.5 million fraud. Essentially, everything needed to commit the greatest bank heist ever is conveniently in place. Coincidentally, governments around the world have been executing financial cyber-terror drills in which hackers hijack trillions of dollars with no trace.

3.12: Military Computer Thefts
Since 2006, thousands of military laptops have been stolen in the United States and the United Kingdom. Why these thefts are being allowed to occur is not yet clear, but it plays nicely into the narrative of impending cyber-terror attacks. These laptops will have likely made it onto the black market and into the waiting hands of “terrorists” who will allegedly launch cyber-terror attacks against the U.S. and U.K. militaries and governments.

3:13: U.S. & Israeli Sponsored Cyber Terror
When massive cyber-terror attack begins to occur, the prime suspects should be the U.S. and Israeli governments who openly brag about their offensive cyber-attack capabilities.  According to Wikipedia, the Joint Functional Component Command – Network Warfare team (JFCCNW) is “responsible for coordinating offensive computer network operations for the United States Department of Defense” and that the JFCCNW is “the world’s most formidable hacker posse: a super-secret, multimillion-dollar weapons program that may be ready to launch bloodless cyber-war against enemy networks”. Aside from being implemented in both the “Stuxnet” virus and the “Duqu” virus, the Israeli government allegedly ranks  #1 in cyber terrorism.

4. CHINA & SPACE TERROR

4.1: China & Space Warfare
China has been directly implicated in cyber-attacks on NASA, U.S. satellites and the international Space Station. Should future space terror strike America, there is little doubt that China will scapegoated for the attacks.  On October 28, 2011, it was reported that Chinese hackers may have interfered with two US satellites on four separate occasions. On March 1, 2012, it was reported that a laptop stolen from NASA last year was unencrypted and contained command and control codes for the International Space Station on it. The particular laptop in question was one of 48 NASA notebooks or mobile devices stolen between April 2009 and April 2011. Although China has not been directly implicated in the thefts, based on their cyber related crimes against NASA, they are the top suspect. On March 7, 2012, it was reported that Chinese hackers had gained ‘full access’ to the computer network in one of NASA’s key control centers, the Jet Propulsion Laboratory (JPL). The JPL manages 23 spacecraft on active space missions, including missions to Jupiter, Mars and Saturn. On May 3, 2012, it was reported that a new hacking group calling itself “The Unknowns” had published a list of passwords and documents reportedly belonging to NASA, the European Space Agency and the U.S. Air Force, among other high-profile government targets. Although China has not been implicated in the “Unknown” attacks, based on their cyber related crimes against NASA, they are again the top suspect.

4.2: Space Terror Imminent
The threat of space terror, whether natural or man-made, is now imminent. Based on the sudden increase in cases of falling space debris  and the approximately 30 incidents where satellites or man-made spacecraft suddenly and unexpectedly reentered the earth’s atmosphere, the potential for space terror is at an all-time high. Complementing the rash of falling space objects is a plethora of space terror propaganda and space debris propaganda which openly states that the chance that earth will be attacked by asteroids, comets, meteoroids, falling satellites,  solar explosion, space junk and ‘solar flare’ storms is real and increasing by the day. So perilous is the situation, that Federal Emergency Management Agency (FEMA) released a falling satellite memo and a “First Responder Guide For Space Object Re-Entry” which instructs first responders on the dangers and procedures of satellite re-entry response. FEMA’s memos are also supported by a number of different scholarly whitepapers which also address the inherent dangers of falling satellite space terror.

4.3: Satellite & Space Station Cyber Terror
Recent space cyber-terror propaganda states that the international space station and satellites may be targeted for cyber-terror in the near future. On October 28, 2011, it was reported that Chinese hackers may have interfered with two US satellites on four separate occasions in 2007 and 2008. According to the report, the Chinese hackers had enough access to take complete control of one of the satellites but chose not to do.  Then on May 17, 2011, it was reported that a Romanian hacker claimed to have breached a computer server at NASA’s Goddard Space Flight Center and gained access to confidential satellite data. Roughly a year later on March 1, 2012, it was reported that in testimony before a House Science, Space and Technology subcommittee, NASA Inspector General Paul Martin said the notebook computer stolen in March 2011 “resulted in the loss of the algorithms” used to control the space station. This particular laptop, Martin said, was one of 48 NASA notebooks or mobile devices stolen between April 2009 and April 2011. A week later on March 7, 2012, it was reported that Chinese hackers gained ‘full access’ to the computer network in one of NASA’s key control centres, the Jet Propulsion Laboratory (JPL) which manages 23 spacecraft conducting active space missions, including missions to Jupiter, Mars and Saturn. Operating from an internet address in China, the hackers gained full system access allowing them to upload hacking tools to steal user IDs and control NASA systems, as well as copy sensitive files. Should U.S. satellites or spacecraft begin a free-fall to planet earth, China will certainly be scapegoated.

4.4: SpaceX Program
A mysterious new program entitled SpaceX has been launched just as the Chinese space cyber-terror rhetoric and propaganda is at an all-time high. What exactly SpaceX does is unknown, but since its launch it has already drawn red flags for a number of different reasons. When it was first launched, SpaceX was allegedly was allegedly sent into the wrong orbit because of a booster problem during launch. Secondly, SpaceX is actively engaging the international space station which is interesting considering SpaceX is a “private” company which is fully engaging the public international space station without any apparent public consent or permission. Thirdly, once in orbit, the communications satellite flying piggyback aboard a SpaceX’s Falcon 9 rocket allegedly fell out of orbit and burned up in the atmosphere following a problem during liftoff. While all the aforementioned anomalies surrounding SpaceX may in fact be real and harmless, it appears that SpaceX is the private space program set-up to destroy the international space station and numerous satellites in the wake of an alleged Chinese based cyber-terror or EMP terror attack.

5. U.S. LANDMARKS SLATED FOR DEMOLITION

5.1: 9/11 Déjà vu?
As fate would have it, the Brooklyn Bridge, the Gateway Arch, the Golden Gate Bridge, Independence Hall, the Lincoln Memorial Reflecting Pool, Mount Rushmore, the Statue of Liberty, the U.S. Capitol, the U.S. Supreme Court Building, the USS Arizona Memorial at Pearl Harbor and the Washington Monument have all undergone recent renovations or are currently under construction. Timely construction could allow for the undercover placement of explosives which could then be detonated via remote control at a future date. American history shows that the World Trade Center received a timely “elevator renovation” just prior to 9/11, and that the Pentagon also underwent a renovation project in the exact location where it was later hit. Should the Chinese attack America, most if not all of these historic landmarks could be demolished within a matter of minutes, ultimately enraging Americans and causing them to blame the Chinese. These attacks would likely destroy America psychologically, make the U.S. government look sympathetic, and garner unprecedented hatred towards the Chinese.

5.2: Brooklyn Bridge (New York City)
Recently exposed U.S. bridge terror plots and bridge closures due to bomb threats may indicate that American bridges will be targeted for terror in the near future.  According to reports, the Brooklyn Bridge is currently undergoing a four-year, $500 million safety and aesthetic improvement program that will be completed in 2014. Aside from the construction, an April 27, 2011, report stated that a long-standing plot by al-Qaida to take down the Brooklyn Bridge was revealed by classified documents obtained by the New York Times. In 2012 alone, there have been at least 5 rather suspicious closings of the Brooklyn Bridge in New York City which may indicate that the bridge has already been set-up for demolition.

5.3: Federal Building Terror?
The recent terror attacks on U.S. Embassies in Libya, Egypt, Yemen and Tunisia may be a prelude to future terror attacks against U.S. Federal buildings in America on the scale of the Oklahoma City Bombing of 1995. Recent and highly publicized attacks and foiled terror plots against, U.S. Capitol Buildings, U.S. Courthouses, U.S. Federal buildings, the Pentagon as well as attacks against U.S. military bases indicate that terror against U.S. Federal buildings, bases and property is now imminent. Interestingly, the U.S. government is shutting down six courthouses in the southern part of the United States due to “money problems” which may indicate that the south is where future acts of federal false-flag terrorism is be being planned.

5.4: Federal Reserve Terror?
Before terrorist Quazi Mohammad Rezwanul Ahsan Nafis, allegedly attempted to detonate a 1,000-pound bomb in front of the Federal Reserve building in New York City in October of 2012, the U.S. government was conducting terror drills on the Federal Reserve in August of 2012. According to the report, the FED terror exercise was executed by U.S. Special Operations Command, an elite and secretive military unit based in Florida who has done extensive operations in Somalia, an alleged home to Al Shabaab. The elite unit trained for two weeks on the FED terror drills which were scheduled to occur between 7 p.m. and midnight and that reportedly involved three Black Hawks hovering over the Federal Reserve’s parking lot with four smaller helicopters landing on the bank’s roof. Should Federal Reserve terror strike America, it will happen at one or more of the FED’s 12 locations: Boston, New York, Philadelphia, Cleveland, Richmond, Atlanta, Chicago, St. Louis, Minneapolis, Kansas City, Dallas or San Francisco. Coincidentally, in September of 2012, Alex Jones of Infowars released a new magazine whose maiden cover featured the Federal Reserve on fire, further indicating that the STRATFOR intelligence operation known as Infowars knew that Federal Reserve terror was being planned.

5.5: Gateway Arch (St. Louis, Missouri)
On December 15, 2011, it was reported that the Gateway Arch in St. Louis, Missouri, would undergo a facelift renovation with the aid of $20 million from the federal government with the goal to finish improvements to the area by 2015, the 50th anniversary of when the Gateway Arch was completed.

5.6: Golden Gate Bridge (San Francisco)
Recently exposed U.S. bridge terror plots and bridge closures due to bomb threats may indicate that American bridges will be targeted for terror in the near future.  On February 23, 2012, it was reported that the Golden Gate Bridge in San Francisco, California, would undergo a renovation project that will “take years to complete”. According to the report, the project involves repainting the two main suspension cables which are responsible for holding the bridge in place. In what appears to be psychological programming The Onion ran a story in 2009 which joked about a “horrific attack on San Francisco’s Golden Gate Bridge, which left thousands missing and assumed dead”.

5.7: Independence Hall (Philadelphia, Pennsylvania)
On February 15, 2012, it was reported that after 18 months of rehabilitation, the iconic clock tower at Independence Hall will be completed. Independence Hall, where the Declaration of Independence was signed, and the Liberty Bell are two of America’s most famous attractions.

5.8: Lincoln Memorial Reflecting Pool (Washington D.C.)
On September 1, 2012, it was reported that construction workers had finally taken down the construction fence which had marred the view of the Lincoln Memorial Reflecting Pool for nearly two years. According to the report, the renovation costing $34 million gave the pool a new steel reinforced foundation as well as a new filtration system that pumps water from the Potomac Tidal Basin

5.9: Mt. Rushmore (Black Hills, South Dakota)
According to a July 3, 2005, report, Mt. Rushmore has been targeted for terror on multiple occasions. A September 18, 2012, report openly questioned whether Mt. Rushmore was a terrorist target and subsequently released a U.S. government security assessment of the Mount Rushmore National Monument. According to the report, the government conducted a 2008 study on the psychosocial impacts of a terrorist attack on national monuments such as Mr. Rushmore. Curiously, some of the findings in the study have been blacked out.

Mt. Rushmore has been targeted for terror on multiple occasions:
1.
Between 1970 and 1973, members of the American Indian Movement made several attempts to occupy and deface the monument.
2. In 1975, a bomb went off in front of the visitor center prior to visitors’ morning arrival.
3. In 1987, the environmental group Greenpeace climbed the mountain with plans to unfurl a 160-by-50-foot protest banner reading “We the people say no to acid rain” over the presidents’ faces.
4. In 1991, the Park Service received threats to assassinate then-President George H.W. Bush during a celebration marking the monument’s 50th anniversary of completion.
5. In 1999, a Colorado man was arrested for threatening to blow up the mountain.

5.10: Nuclear Reactor Terror
Ever since the Fukushima nuclear reactor disaster in 2011, there have been approximately 45 nuclear reactor “emergencies”, “closures”, “leaks” and other major incidents clearly setting the stage for coming nuclear reactor terror on an unimaginable scale. Complementing the unprecedented nuclear reactor emergencies are multiple cases of “terrorists” attempting to breach nuclear reactors, repeated lapses in nuclear reactor security, as well as countless propaganda articles indicating that a Fukushima-level event inside the United States is a foregone conclusion. Aside from blatant programming of the 2012 Hollywood nuclear reactor disaster film entitled “Chernobyl Diaries”, a recent Nuclear Regulatory Commission (NRC) panel recommended that the U.S. government customize emergency plans for each of America’s 65 nuclear power plants, a change would “expand” the standard 10-mile evacuation zone surrounding nuclear reactors.

5.11: Pearl Harbor USS Arizona Memorial (Pearl Harbor, Hawaii)
On May 30, 2012, it was reported that the USS Arizona Memorial in Pearl Harbor, Hawaii, was in dire need of funds to finish its restoration project which was started back in 2007. The USS Arizona Memorial marks the resting place of 1,102 of the 1,177 sailors killed on the USS Arizona during the attack on Pearl Harbor on December 7, 1941 by Japanese imperial forces.

5.12: Statue of Liberty (New York City)
On April 3, 2012, it was reported that al Qaeda would be “coming soon again” to New York City, according to an alleged jihadi on-line forums. Six months later on October 26, 2012, it was reported that the Statue of Liberty will reopen on the 126th anniversary of its dedication after a year-long renovation.  The $30 million renovation allegedly improved fire alarms, sprinkler systems and exit routes to bring Lady Liberty in line with New York City safety codes.

5.13: U.S. Capitol Building (Washington D.C.)
According to reports, the U.S. Capitol dome will undergo its first major face-lift in more than 50 years, costing $19 million in repairs to the lower portion of the dome. According to the American Institute of Architects, American Society of Civil Engineers and other groups, “The U.S. Capitol is not merely Congress’ work space; it is also an attraction for millions of visitors from around the world…and a potential target for those who wish to do us harm“. Suspiciously, Knesset security and the Jerusalem district police anti-terror squad recently conducted a terror exercise in which a plane crashes into the Knesset, Israel’s congressional building. In the drill, the plane contained “dangerous materials” so it was necessary for Israeli security officers to wear protective clothing for radiation and biological contamination. Aside from the 2011 terror plot targeting the U.S. Capitol building, the U.S. Capitol was also the target of an Israeli suicide bomber  in 1998, but due to faulty wiring the bomb was never detonated.

5.14: U.S. Supreme Court
(Washington D.C.)
On May 22, 2012, it was reported that the U.S. Supreme Court is getting a “facelift” and that workers have now started a two-year Supreme Court renovation project on the building’s marble facade. According to the report, the decision for the 2012 renovation was due to a November 2005 incident, in which 80 pounds of marble fell from the Authority figure of Robert Aitken’s sculpture of “Liberty Enthroned. Why the U.S. government waited 7 years to repair one of its most precious landmarks ultimately leaves more questions than answers.

5.15: Washington D.C.
Recently, historical American artifacts were stolen from the U.S. National Archives in Washington D.C., including the Wright Brothers airplane patent, the bombing maps for the nuclear attack on Japan, and photos allegedly taken by astronauts on the moon.  The shocking news was then complemented by reports that Washington D.C.’s Pennsylvania Avenue, also known as “America’s Main Street,” was now being listed among the nation’s endangered landscapes because of neglect and deferred maintenance, despite the fact that almost every major historical building, landmark or monument in Washington D.C. has either recently undergone renovation or is still currently under construction.  The notion that  Washington D.C. is doomed is complemented by recent government terror drills that are preparing the capital for future acts of terror. On February 22, 2012, it was reported that a new security project to lock down gateways to the U.S. Capitol is being planned, aimed at targeting gang assaults and lone wolf attackers. According to the report, officials are warning lawmakers and Capitol security against a developing type of assault called a “blended attack” that combines a physical attack against a target along with a cyber-attack against the same or different targets. Six months later on August 20, 2012, it was reported that the U.S. Air Force and Coast Guard aircraft would fly “intercept and identification” exercises entitled “Falcon Virgo” over Washington D.C. as part of efforts to prevent suicide aircraft attacks or other threats to the capital.

5:16: Washington Monument (Washington D.C.)
On August 24, 2011, it was reported that due to an earthquake, the Washington Monument had suffered a crack near the pyramid-shaped tip and had monument been permanently tilted. Although this report was later denied by officials, the Washington Monument is currently closed sue to construction and is not scheduled to re-open until 2014.

5.17: White House (Washington D.C.)
On September 12, 2012, it was reported that after nearly two years and $86 million worth of construction, the West Wing of the Obama White House has emerged from its visual seclusion “remarkably unchanged”. According to the report, the construction project began in September of 2010 with the excavation of a huge multistory pit in front of the West Wing. Aside from the suspicious construction, the White House has been the target of a number of high-profile terror plots and threats: On January 18, 2012, it was reported that an Occupy Wall Street protester threw a smoke bomb over the fence of the White House. Two months later on March 8, 2012, it was reported that a top hacker and committed anarchist who worked closely with the LulzSec, openly spoke of burning down the White House. Six months later on September 30, 2012, it was reported that the White House was attacked by hackers allegedly linked to China’s government. The unprecedented cyber-terror attack targeted the U.S. government’s most sensitive computer networks, ultimately breaching a system used by the White House Military Office for nuclear commands. A month later on October 21, 2012, it was reported that a year-long investigation by the Investigative Project on Terrorism (IPT) has found that scores of known radical Islamists made hundreds of visits to the Obama White House, meeting with top administration officials.

CONCLUSION

Starting wars between foreign countries is taken directly out of the 7th Protocols of Zion which states: “In order to display our system of keeping the governments of the goyim in Europe in check, we shall show our strength by committing terrorist attacks against one of them. If the governments of Europe should collectively rise against us, we shall respond using the military might of America, or China, or Japan.” Clearly, the Zionists have lost control of America and are hell bent on starting World War III in order to consolidate power, kill off millions of patriotic Americans, and further bankrupt America into endless debt. That obviously cannot be allowed to happen. Please do your part and spread the word.

About the Author
David Chase Taylor is an American journalist living in Zürich, Switzerland, where he has applied for political asylum after the release of The Nuclear Bible, a book credited with stopping a false-flag/state-sponsored nuclear terror attack upon America. Taylor also released The Bio-Terror Bible, a book and website exposing the coming global bio-terror pandemic. Taylor, the editor-in-chief of Truther.org, has also exposed the 2012 Democratic National Convention Terror PlotNATO’s implementation of the SKYNET Terminator Program, the “Twilight” Premier Terror Plot, as well as the Alex Jones links to STRATFOR.

TRUTHER.ORG LEGAL DISCLAIMER: Terror related assertions, forecasts and predictions made by Truther.org DO NOT necessarily imply that said terror events will transpire in reality, but rather that there is a distinct possibility that said terror events theoretically could happen based on the cumulative terror related data. Historically, once a particular false-flag terror related plot is widely exposed (See: Super Bowl XLV), the terror plot is immediately canceled or postponed. State-sponsored terror attacks must have a prior “paper trail” in order to set-up patsies, create plausible deniability, develop scapegoats, and mislead the public from the true perpetrators of terror. Truther.org’s sole purpose is preventing 9/11 type terror events by drawing unwanted global attention to various terror related “paper trails” prior to their fruition.

Thanksgiving & Black Friday Cybergeddon Terror?

Truther.org
November 21, 2012
David Chase Taylor

Based on the latest terror related arrests, exercises, drills and propaganda, the American holidays known as Thanksgiving Day and Black Friday may be targeted for false-flag terror. These attacks, should they occur, will likely happen sometime between Thursday, November 22, 2012, and Monday, November 26, 2012, and target entertainment, financial, holiday, retail and travel related entities.

Since June of 2012, numerous propaganda articles have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, and “Threat Of ‘Spectacular’ Cyberattack Looms”, all indicate that unprecedented state-sponsored cyber-terror with the United States is imminent.

In a 2007 CRS Report for Congress entitled “Terrorist Capabilities For Cyber-Attack: Overview And Policy Issues”, the U.S. government states that, “If terrorists were to launch a widespread cyberattack against the United States, the economy would be the intended target for disruption” and that “Many security experts also agree that a cyber-attack would be most effective if it were used to amplify a conventional bombing or CBRN (chemical, biological, radiological or nuclear attack). Authorities have expressed concerns about terrorists combining physical attacks such as bombings with hacker attacks to disrupt rescue efforts, known as hybrid or “swarming” attacks.”

TRANSLATION: Cyber-terror attacks will be combined with real bombings, chemical, biological and/or nuclear related terror attacks.

On November 14, 2012, it was reported that President Obama has signed a secret directive that effectively enables the military to act more aggressively to thwart cyber­attacks on the nation’s web of government and private computer networks. James A. Lewis, a cybersecurity expert at the Center for Strategic and International Studies, welcomed the new directive as bolstering the government’s capability to defend against “destructive scenarios,” and stated, It’s clear we’re not going to be a bystander anymore to cyberattacks“.

Thanksgiving weekend is the busiest travel time of the year and therefore real and cyber related terror attacks on American airports, airplanes, malls, NFL stadiums, subways, trains and the Macy’s Day Parade by Israeli Mossad terror agents responsible for 9/11 would likely result in a terror shock-wave that could crash U.S. stock markets come Monday morning, November 26, 2012.

Based on cumulative terror data, the following entities may targeted for false-flag terror:

1. Airplane Terror: United Airlines, American Airlines, & U.S. Airways
2. Airport Terror: Hartsfield–Jackson, JFK, LaGuardia, LAX, Logan, Newark, O’Hare, Pittsburgh
3. Cyber Terror: U.S. Banks, Retailers & U.S. Stock Markets
4. Dirty Bomb Terror: MBTA (Boston, Massachusetts), New York City
5. Mall/Retail/Store Terror: Costco, Ikea, Malls, Target & Wal-Mart
6. NFL Terror: Ford Field (Detroit), Cowboy Stadium (Dallas), MetLife Stadium (New York City)
7. Parade Terror: Macy’s Day Parade
8. Train & Transit Terror: Amtrak, Chicago ‘L’, MBTA, NY Subways, & SEPTA

CITIES: Atlanta, Boston, Chicago, New York & Los Angeles

Thanksgiving Day & Black Friday Madness
Aside from the fact that a mall terror attack occurred on Black Friday in the movie “Mall Cop”, this Thanksgiving Day and Black Friday, Los Angeles International Airport (LAX), Target and Wal-Mart will be in unprecedented chaos due to capacity crowds as well as labor unions and labor organizations who are forcing their employees to walk off the job, protest or strike. These events will obviously create mass confusion, gridlock, mob psychology and a perfect opportunity whereby airports, crowds and/or retail locations can be easily targeted for terror.On October 10, 2012, it was reported that Wal-Mart employees are threatening to strike on Black Friday, the busiest, and most lucrative, retail day of the year. A month later on November 15, 2012, it was reported that Target faces a “backlash” from its employees the decision to open its doors on Thanksgiving evening. That same day, it was also reported that a group of Wal-Mart workers are planning to stage a walkout on Black Friday. According to the report, the walkout builds on an October strike that started at a Wal-Mart in Los Angeles which has now spread to stores in 12 other cities. A day later on November 16, 2012, it was reported that employees at Los Angeles International Airport are considering plans to walk off the job on Black Friday, traditionally the busiest traveling day of the year. According to the report, as many as 1,000 airport workers and union supporters are expected to march on Century Boulevard just as an estimated 1.8 million passengers are expected to travel through LAX over the holiday weekend. On November 20, 2012, it was reported that Los Angeles’ labor unions have decided to protest on Thanksgiving Eve, expecting to jam pre-Thanksgiving traffic in and around Los Angeles International Airport (LAX). That same day, it was also reported that Wal-Mart is taking legal action against its organized labor opponents, filing an unfair labor practice charge over widespread protests and rallies planned for at its stores across the country. According to the report, Wal-Mart is asking the National Labor Relations Board (NLRB) for an injunction against the rallies, pickets and flash mobs which have sprung up at Wal-Mart stores nationwide.

Israeli Cyber Terror
Cyber-terror attacks theoretically have the power to destroy almost every facet of American life, including but not limited to: Airplanes, banks, cars, communication, election results, government functionality, electricity, military defense, nuclear power plants, oil pipelines and refineries, prison systems, trains, satellites and the water supply stations. While China has been publicly scapegoated for cyber-terror, Israel who ranks  # 1 in cyber terrorism, is by far the greatest provocateur of cyber-terror and will most likely be responsible for any future cyber-terror attack on America. A movie played at a retirement party for the head of the Israel Defense Forces (IDF) bragged that Israel was indeed responsible for the Stuxnet cyber-attack. Israel has also been accused of creating the Duqu virus, a cyber-terror worm related to the Israeli Stuxnet virus. The Duqu virus was purposely programmed by Israel to take over, control and crash computer systems at airports, banks, nuclear reactors and stock markets. According to Wikipedia, Duqu looks for information that could be useful in attacking industrial control systems, and based on the modular structure of the virus, it can theoretically be used to destroy any type of industrial computer system.

Batman Movie Foreshadows Doomsday Cyber Terror
The concepts and ideas put forth in the 2012 Batman movie entitled “The Dark Knight Rises” appears to be programming for what will transpire in America near the end of 2012. “The Dark Knight Rises” has implications that America will literally go dark, most likely from a cyber-attack or EMP, and it is filled with numerous acts of terror which ultimately programs viewers for what is planned to later transpire in reality. “The Dark Knight Rises” depicts a bloody attack on the New York Stock Exchange, a cyber-terror attack and heist where criminals make off with millions, a terror attack on the Brooklyn Bridge in New York while children are stranded on a school bus, a free-for-all prison break where criminals terrorize the streets, and a very vivid attack on the a professional football stadium in Gotham (New York).

Obama Weak on Terror

Just as the Obama administration attempts to pick up the pieces of a public intelligence failure in the alleged Al Qaeda attacks on U.S. embassies in Benghazi, Libya, Egypt, Yemen and Tunisia, and the highly publicized sex scandal regarding the resignation of U.S. General David Petraeus, the illegal state of Israel is busy attacking the Gaza Strip in a coordinated effort to enrage Muslims against the West just prior to major terror attacks against the United States. These events are being orchestrated to precipitate a “revenge” type of scenario whereby the U.S. is attacked for its support of Israeli airstrikes on Gaza and because of Obama’s perceived weakness on foreign policy as the U.S. Commander in Chief.

Middle East Scapegoats Primed
Only days before a potential terror attack, both Al Qaeda and the Taliban are front and center in the minds of millions, all thanks to the corporate media and the government of the U.K. In the highly rated Israeli inspired “Homeland” television series, terrorist leader “Abu” Nazir is being sought by the CIA in an effort to stop suicide bombers and other unknown terror attacks on America. In an obvious collusion between the CIA and Hollywood, it was reported on November 13, 2012, that a radical Islamist cleric “Abu” Qatada, described by prosecutors as a key Al Qaeda operative in Europe, was mysteriously freed from prison. According to reports, the preacher was seen smiling as he was driven away from Long Lartin maximum security jail in Worcestershire, central England. “Abu” Qatada is accused by Britain of links with Zacarias Moussaoui, the only person charged in the United States in the 9/11 terrorist attacks. Three days later on November 16, 2012, it was reported that a Taliban spokesperson sent out a routine email last week in which he publicly CC’d the names of everyone on his mailing list. According to the report, the names were disclosed in an email by Qari Yousuf Ahmedi, an official Taliban spokesperson was made up of more than 400 recipients includes an address appearing to belong to a provincial governor, an Afghan legislator, several academics and activists. These incidents, which appear completely contrived, have set the stage for the return of Islamic terror to the United States.

1. POTENTIAL TERROR SCENARIOS

1.1: Active Shooter?
In 2012 alone, there have been over 30 highly publicized shooting and massacres in America, the most deadly being the “Batman Massacre” which occurred on July 20, 2012, in a theater in Aurora, Colorado. In the weeks following the Batman Massacre, there was a rash 9 shooting in August of 2012 including the Sikh Temple Massacre, something unprecedented in American history. Although a majority of the 2012 shootings occurred in public locations fully equipped with working CCTV security cameras, the video footage of almost all the shootings has never been released to the public.

1.2: Airplane Terror?
Aside from recent airplane terror propaganda and the foiled 9/11 style 2012 DNC Terror Plot, there have been numerous airplane bomb threats, airplane crashes, airplane hijacks, and airplane emergencies and scares which indicate that 9/11 style terror involving planes as weapons is imminent. Complementing the airplane madness are a number of government drills and exercises simulating planes and terror which are ultimately training local, state and federal officials for plane related terrorism. Also unprecedented are the major instances of “fake pilots”, stolen aviator uniforms, and the growing list of suspicious incidents involving flight attendants. Needless to say, airplane related terror is blinking red.

1.3: Airport Terror?
Unprecedented and highly publicized incidents of air traffic controllers allegedly sleeping, texting and reading while on duty, and a rash of strange airport attacks, evacuation and outbreaks at airports have raised red-flags concerning airport security. Since September of 2012 alone, there have been at least a dozen major security scares and incidents at American airports which may indicate that airport terror is imminent. Although the Millennium Terror Plot to bomb Los Angeles International Airport (LAX) was allegedly foiled by officials in 2000, a suspect in the case was just sentenced to prison for the act on October 24, 2012, curiously bringing the entire case back to life. According to a May 13, 2012, report, security has been stepped up at airports worldwide as surgically-doctored terrorists plot suicide attacks with implanted bombs that would be undetectable to airport body scanners. Complementing the ever increasing airport terror threat is a number of airport terror drills which have been preparing local, state and federal officials for impending airport terror.

1.4: Bio-Terror Attack?
Based on the cumulative data of bio-terror research, a made-for-TV bio-terror “event” will likely occur in America involving the use of agents known as Anthrax and Smallpox. This future event is most likely being masterminded by the Center for Biosecurity (UPMC), who is responsible for numerous bio-terror related war games. Despite the television theatrics, the true source of the pandemic which is planned for 2012 will be poisonous vaccines issued to the public by the government and medical establishment in the immediate aftermath of a major bio-terror attack. Aside from having the means, the motive and the opportunity to conduct a major bio-terror attack, the government is the only entity with the resources to organize, plan, drill and execute a major bio-terror false-flag operation.

1.5: Chemical Attack?
Unprecedented chemical releases and terror threats suggest that a chemical terror attack may be planned by Zionist terrorists within the U.S government. On October 29, 2012, a train “crash” caused a chemical release in Kentucky which resulted in a hazmat declaration and the evacuation of a one-mile radius. Two days later on November 1, 2012, it was reported that a hazardous materials release had sickened some 200 people in Santa Teresa, New Mexico, near the U.S.-Mexican border.  A day later on November 2, 2012, it was reported that police had closed streets and sidewalks around the CNN Center in downtown Atlanta, Georgia due to the investigation of a chemical bomb threat. A few weeks later on November 17, 2012, it was reported that chemicals commonly used for making bombs and explosive devices have been found at the home of an unemployed northern New Jersey doctor. These chemical events, most likely staged, have no doubt readied the American public for chemical terror.

1.6: Macy’s Day Parade Terror?
On Thanksgiving Day, the Macy’s Day Parade will kick-off in New York City. Based on the recent and deadly history of parade terror, an attack on this event may be planned. Interestingly, the soundtrack of the 2008 Spider-Man movie contained a track entitled “Parade Attack” and since its release, there have been multiple parade terror scares including a threat to attack a Gay Pride march in Belgrade, Serbia, a bomb which was found in Spokane, Washington, on the route of the Martin Luther King Jr. parade “capable” of inflicting multiple casualties, Catholic nationalists in Croatia who planned to petrol bomb on a gay parade, a warning from the president of the Philippines that terrorists might target a Roman Catholic parade Manila, and terror threats against people who sailed on the Turkish boat in Amsterdam’s Gay Pride Canal Parade.

1.7: History of Parade Terror
The history of parade terror indicates that there have been at least 5 incidents in 2012 alone: 

1. July 22, 1916: Preparedness Day Parade Bombing, (San Francisco, California)
2. June 11, 2000: Puerto Rican Day Parade Attack  New York, New York)
3. May 9, 2002: Kaspiysk Parade Bombing (Kaspiysk, Dagestan)
4. April 27, 2008: Military Parade Terror Attack (Kabul, Afghanistan)
5. April 30, 2009: Dutch Royal Parade Attack (Apeldoorn, Netherlands)
6. December 30, 2009: Shiite Parade Attack (Karachi, Pakistan)
7. June 13, 2011: Gay Pride Parade Attack (Split, Croatia)
8. February 24, 2012: Irish Parade Attack (Liverpool City, Ireland)
9. May 21, 2012: Yemen Military Parade Attack (Sanaa, Yemen)
10. June 26, 2012: Chicago Pride Parade Attack (Chicago, Illinois)
11. October 18, 2012: Carlisle Parade Attack (Carlisle, Pennsylvania)
12. November 16, 2012: Texas Veterans Parade Disaster (Midland, Texas)

1.8: Mall/Retail Terror?
Aside from the fact that a terror attack in the movie “Mall Cop” occurred on Black Friday, mall terror propaganda and recent events surrounding malls, stores and markets indicate that major terror attacks on malls and retail outlets in America are imminent. Since 9/11, numerous mall terror plots have been executed and even more thwarted as the alleged suspects were conveniently arrested just prior to their deadly attacks. In 2012 alone, there have been at least 20 incidents in which malls, markets or stores suffered attacks, threats, scares or serious emergencies. Mall terror drills have also prepared local, state and federal officials for impending mall terror. On October 21, 2012, it was reported that Jordanian authorities had foiled an Al Qaeda plot to attack shopping malls and Western diplomatic missions using suicide bombers, booby-trapped cars and rockets. According to the reports, the attacks would come on a date terrorists dub “9/11 the second.”

1.9: Stock Market Terror?
Aside from being featured in the “The Dark Knight Rises” film script, an April 24, 2012, report stated that Osama bin Laden was looking for a follow-up terror attack to  doom the American economy. Alleged British terrorist Saajid Badat recounted his meeting with the Al Qaeda founder  and stated that, “So [bin Laden] said the American economy is like a chain, If you break one — one link of the chain, the whole economy will be brought down.” On February 1, 2012, it was reported that four men admitted to “an al Qaeda-inspired plot” to bomb the London Stock Exchange. Then next month on March 22, 2012, it was reported that the Indian National Security Guards (NSG) conducted a terror exercise at the Bombay Stock Exchange (BSE) further indicating that stock markets terror is being drilled, plotted and practiced.  On April 6, 2012, it was reported that men with black Muslim-like garments covering their heads and bodies proceeded to rob at least 4 banks potentially indicating that banks will be targeted for terror in the near future.

1.10: Train & Transit Terror
Documented train and transit propaganda along with at least 10 major train and transit attacks, crashes and scares in 2012 alone, indicates that train and transit terror in America is now imminent. Since 9/11, there have been multiple train and transit terror plots targeting the train and subway systems of America. Complementing the train and transit terror plots and patsies are numerous train and transit terror drills generally involving bio-terror or suicide bombers conducted on train and transit station across America by  local, state and federal authorities. The terror drills are likely a direct result of train and transit terror scholarly whitepapers which state that train and transit terror by Al Qaeda or homegrown terrorists is not a matter of if but when.

1.11: Train & Transit Terror Plots
On July 22, 2009, it was reported that an American man was charged with giving al-Qaida information on the New York transit system. Two years later on May 6, 2011, it was reported that “al-Qa’ida was allegedly contemplating conducting an operation against trains at an unspecified location in the United States on the 10th anniversary of September 11, 2001,” and that “As one option, al-Qa’ida was looking into trying to tip a train by tampering with the rails so that the train would fall off the track at either a valley or a bridge.” Coincidentally, on September 13, 2012, it was reported that three men were arrested for allegedly stealing train tracks from Leeward Oahu, Hawaii. On May 1, 2012, it was reported that a New York man was convicted of plotting an aborted suicide mission against New York City subways who allegedly stated that, “The goal of this conspiracy was to kill as many people as possible.” A few months later on October 22, 2012, it was reported that three British Muslim men went on trial in London, accused of plotting a bombing campaign that prosecutors say could have been deadlier than the 2005 London transit attacks.

1.12: Suicide Terror Attacks?
Based on recent suicide terror propaganda, the ever increasing amount of suicide terror attacks and the recent high-profile cases of suicide terror plots allegedly thwarted by officials, suicide terror in America is now imminent. Although to date America has remained suicide terror free, in 1998, an Israeli suicide bomber plotted to attack the U.S. Capitol but was not successful due to faulty wiring. Steel street grates in Philadelphia have been “mysteriously disappearing” over the last year, and in Wyoming, numerous horse tails have been clipped and stolen, potentially indicating that suicide bombers dressed as women may be in the false-flag suicide terror script. In the 2012 Hollywood blockbuster entitled “Act of Valor”, suicide bombers target American sports stadiums, a concept which could transpire in reality at an NCAA or NFL game. According to a May 13, 2012, report, security has been stepped up at airports worldwide as surgically-doctored terrorists plot suicide attacks with implanted bombs that would be undetectable to airport body scanners. On August 14, 2012, it was reported that Al Qaeda, under the heading “Area of activity: The planet Earth,” is allegedly seeking jihadists to carry out suicide attacks. Aside from a recent rash of unprecedented suicide terror threats and scares, the U.S. government has also been preparing for suicide terror by conducting multiple suicide terror drills in order to prepare local, state and federal officials for inevitable suicide terror.

2. CYBER TERROR TARGETS

2.1: Airplanes & Cyber-Terror
According to recent cyber-terror propaganda, drones and planes can be remotely hijacked and then used as weapons, similarly to what happened on September 11, 2001. On June 25, 2012, it was reported that with the right equipment, anyone could take control of a GPS-guided drone and easily turn it into a weapon. Professor Todd Humphreys of the University of Texas at Austin stated that “Each one of these [drones] could be a potential missile used against us.” A month later on July 27, 2012, it was reported that air traffic control software which is used around the world could be exploited by hackers to unleash squadrons of ghost planes. Interestingly, in October of 2012, American Airlines has pulled 47 planes due to malfunctioning seats and 17 flights were diverted from Manila’s international airport due to an alleged air traffic equipment “glitch”. What role these 64 planes will play in the wake of a cyber-terror attack is unknown, but there is a real possibility that these planes have been remotely “programmed” to lose all power at a future date.

2.2: Nuclear Reactors & Cyber-Terror
On December 13, 2011, it was reported that U.S. officials were investigating whether Iranian and Venezuelan diplomats in Mexico were involved in planned cyber-attacks against U.S. targets, including nuclear power plants. There have also been approximately 40 nuclear reactor “emergencies”, “closures”, “leaks” and other major incidents clearly setting the stage for nuclear reactor terror on an unimaginable scale. Complementing the unprecedented nuclear reactor emergencies are multiple cases of “terrorists” attempting to breach nuclear reactors, repeated lapses in nuclear reactor security, as well as countless propaganda articles indicating that a Fukushima-level event inside the United States is a foregone conclusion.

2.3: Prisons Breaks & Cyber-Terror
Since September of 2012, there have been 4 major prison breaks in Iraq Libya Mexico and the U.S. which untimely indicates that more major prison breaks are imminent. On November 10, 2011, it was reported that officials with the Federal Bureau of Prisons have been informed that U.S. penitentiaries could be vulnerable to cyber-terror attacks that would help prisoners escape. According to the report, most American prisons are operated by industrial control systems (ICS) that also are used by power plants, water treatment facilities and other infrastructure operations. ICS’ vulnerability was demonstrated two years in Iran, when hackers sabotaged that country’s nuclear program by exploiting its Siemens programmable logic controllers (PLCs). Almost all of the 117 federal correctional facilities, 1,700 prisons and 3,000 jails in the United States use PLCs to control doors and manage their security systems. Coincidentally, on October 2, 2012, it was reported that the Obama administration plans to buy an Illinois prison which end up being the prison facility that suffers a cyber-terror prison break.

2.4: Stock Markets & Cyber-Terror
Based on unprecedented financial cyber-terror propaganda and the recent rash of suspects and patsies arrested for financial cyber-terror and financial related crimes, financial cyber-terror is blinking red on every level. An April 24, 2012, report stated that Osama bin Laden was looking for a follow-up terror attack to  doom the American economy, so there is a real possibility that cyber terror attack targeting U.S. banks and Wall Street could hijack trillions of dollars ultimately dooming the American economy. To date, individuals have been arrested for cyber-terror related crimes such as credit and debit card PIN theft, the theft of proprietary software code from the Federal Reserve Bank of New York, the illegal reproduction and distribution of more than 100 copyrighted commercial and financial business software programs, the malware SpyEye used to steal and use personal banking and credit card data from unsuspecting victims’ online accounts, and the former head of fraud and security for digital banking at Lloyds Bank has admitted to committing £2.5 million fraud. Essentially, everything needed to commit the greatest bank heist ever is conveniently in place. Coincidentally, governments around the world have been executing financial cyber-terror drills in which hackers hijack trillions of dollars with no trace.

2.5: Subways/Trains & Cyber-Terror
On December 29, 2011, it was reported that Professor Stefan Katzenbeisser of Technische Universität Darmstadt had told a security conference in Berlin that new train system was vulnerable to hackers and “Denial of Service”. Future cyber-terror attacks could rhetorically target train switching systems, which enable trains to be guided from one track to another at a railway junction. Although these switching systems have historically been separate from the online world, this is no longer the case.  The Israeli cyber-terror worm entitled the “Duqu virus”, has already wreaked havoc worldwide and could be used to target trains in the U.S. and Europe. Based on recent and inexplicable train crashes, this virus may already be attacking trains worldwide. Acting as a Trojan horse, the Duqu virus has the ability to essentially hijack its victim and then allow for the remote control of whatever entity is hijacked. If the Duqu virus hijacked a train, it could theoretically control train acceleration, braking and track switching.

3. CYBER TERRORISM

3.1: Cyber-Terror Attacks
Since 2011, there have been an epidemic of “cyber-attacks” targeting high-profile government entities such as the Vatican, United Nations, Interpol, NASA, Scotland Yard, FBI, DHS, CIA and the U.S. Federal Trade Commission. Less publicized however have been the cyber-attacks on critical infrastructure such as water plants, nuclear power plants, oil refineries and banks. These alleged cyber-attacks, whether real or not, give the perception that any entity with an internet connection is vulnerable to a future cyber-attack.

3.2: Cyber Terror Drills
Both the Israeli and U.S. government, namely the CIA and the U.S. Department of Homeland Security, have been drilling cyber-terror attacks on a routine basis. Past cyber-terror drills range in duration and targets, generally focus on the financial and infrastructure targets. According to reports, authorities have expressed concerns about terrorists combining physical attacks such as bombings with hacker attacks to disrupt rescue efforts, known as hybrid or “swarming” attacks.”

3.3: Cyber-Terror Hotline
Just as the United States and the Soviet Union had a nuclear hotline to avoid potential nuclear misunderstandings during the Cold War, a new “cyber-war hotline” is being speculated about in order to avoid future misunderstandings in the wake of major cyber-terror attacks. Security expert Bruce Schneier stated that a hotline between the world’s cyber commands would “at least allow governments to talk to each other, rather than guess where an attack came from.” On October 4, 2012, it was reported that Britain has begun tentative talks with China and Russia about setting up a hotline to help prevent cyber-emergencies from spiraling out of control. “At the moment, we don’t really have sufficient information-sharing arrangements with some countries such as China and the Chinese computer emergency response team,” said a senior Foreign Office official.

3.4: Cyber-Terror Plots & Patsies
Since April of 2011, there has been at least 25 major cases in which individuals or groups were charged with committing acts hacking or cyber-terror, while in China, police allegedly arrested 10,000 people in an unprecedented cyber-terror sweep. In most of the cases, finance or bank related hacking or cyber-terror was the motive although major corporate, energy or government institutions such AT&T, Blackberry, British National Party CIA, English Defence League, Facebook, Federal Reserve Bank, NATO, NHI, Nintendo, Sega and Symantec have also been allegedly targeted.

3.5: Cyber-Terror Security Takeover
Under the guise of “cyber security”, the U.S. government has spent billions of dollars mapping and federalizing cyberspace and cyber security throughout America. According to the 2009 CRS Report for Congress entitled “Comprehensive National Cybersecurity Initiative”, the sudden change in policy is to ensure that “U.S. Government cyber security initiatives are appropriately integrated, resourced and coordinated with Congress and the private sector“. This changes essentially ensures that the private sectors of the economy (banks, gas, oil, power, stock markets, etc.) are under the cyber thumb of the U.S. government so that they can be targeted, hijacked and ultimately destroyed in a future cyber terror attack.

3.6: Cyber Terror Scapegoat: China
The nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. Based on news and events surrounding, China more than any other nation is sure to be scapegoated in the aftermath of cyber-terror attacks against the United States. On October 5, 2011, U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign and cybercrime against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two US satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyberespionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta, has publically stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to tamp down aggressive Chinese cyber-attacks against American companies and the government.  October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.

3.7: Military Computer Thefts
Since 2006, thousands of military laptops have been stolen in the United States and the United Kingdom. Why these thefts are being allowed to occur is not yet clear, but it plays nicely into the narrative of impending cyber-terror attacks. These laptops will have likely made it onto the black market and into the waiting hands of “terrorists” who will allegedly launch cyber-terror attacks against the U.S. and U.K. militaries and governments.

3.8: U.S. & Israeli Sponsored Cyber Terror
When massive cyber-terror attack begin to occur, the prime suspects should be the U.S. and Israeli governments who openly brag about their offensive cyber-attack capabilities.  According to Wikipedia, the Joint Functional Component Command – Network Warfare team (JFCCNW) is “responsible for coordinating offensive computer network operations for the United States Department of Defense” and that the JFCCNW is “the world’s most formidable hacker posse: a super-secret, multimillion-dollar weapons program that may be ready to launch bloodless cyber-war against enemy networks”. Aside from being implemented in both the “Stuxnet” virus and the “Duqu” virus, the Israeli government allegedly ranks  #1 in cyber terrorism.

4. NUCLEAR REACTOR TERROR

4.1: Nuclear Reactor Terror Imminent
Ever since the foiled Super Bowl nuclear terror plot on February 6, 2011, there have been at least 45 nuclear reactor “emergencies”, “closures”, “leaks” and other major incidents clearly setting the stage for coming nuclear reactor terror on an unimaginable scale. Complementing the unprecedented nuclear reactor emergencies are multiple cases of “terrorists” attempting to breach nuclear reactors, repeated lapses in nuclear reactor security, as well as countless propaganda articles indicating that a Fukushima-level event inside the United States is a foregone conclusion. It was also reported on December 13, 2011, that U.S. officials were investigating whether Iranian and Venezuelan diplomats in Mexico were involved in planned cyber-attacks against U.S. targets, including nuclear power plants. Aside from blatant programming of the 2012 Hollywood nuclear reactor disaster film entitled “Chernobyl Diaries”, a recent Nuclear Regulatory Commission (NRC) panel recommended that the U.S. government customize emergency plans for each of America’s 65 nuclear power plants, a change that would “expand” the standard 10-mile evacuation zone around U.S. nuclear reactors. The 2011 Fukushima disaster along with high profile cyber-attacks on Iran’s nuclear reactors by the U.S. and Israel has nuclear reactor terror blinking red on every level.

4.2: Target: California Nuclear Plants
California has two main nuclear reactors on its coastline: The Diablo Canyon Power Plant in San Luis Obispo County, and the San Onofre Nuclear Generating Station in San Diego County. Should a Fukushima like “event” transpire off the California coast, both nuclear reactors could be targeted. That being said, there is a far greater likelihood that the San Onofre Nuclear Generating Station will be attacked with state-sponsored terror and/or a man-made tsunami/earthquake simply based on the recent news and events surrounding the troubled nuclear reactor. On June 19, 2012, it was reported that “San Onofre nuclear plant could become California’s Fukushima”, and to date, there have several highly suspicious incidents surrounding the nuclear plant including a radiation leak on February 1, 2012, a radioactive gas escape on April 7, 2012,a hydrogen leak on October 23, 2012, and a 700,000-pound steam generator which was allegedly removed on November 5, 2012. On September 9, 2011, there was a massive power outage in San Diego whereby 1.4 million people lost electricity, exactly the same amount of people which lost electricity on February 1, 2012, when the San Onofre plant was shut down. Whether or not the blackout was a beta-test of the eventual San Onofre nuclear meltdown is unknown, but San Onofre appears fully prepared to go offline.

5. NFL TERROR

5.1: NFL Terror Drills (2001-Present)
The NFL has allowed the U.S. government to conduct numerous terror related drills in their football stadiums throughout America. These terror drills have trained local, state and federal officials for almost every conceivable act of NFL terror including but not limited to active-shooter scenarios, bio-chemical attacks, dirty bomb explosion and suicide terror attacks. In 2001, FEMA officials simulated a terror attack on the Superdome in New Orleans Louisiana, just prior to it hosting the Super Bowl. The Super Bowl terror drill simulated explosions as well as the outbreak of a mysterious bio-terror plague. Coincidentally, the Superdome will also host the 2013 Super Bowl on February 3, 2013.

5.2: NFL Dirty Bomb Terror Plot (October, 2006)
On October 20, 2006, it was reported that Jake J. Brahm, an  alleged 20-year-old grocery store clerk, had posted threats on the internet of a terrorist attacks on NFL stadiums in which radioactive “dirty bombs” would be detonated at seven NFL football stadiums. According to reports, Brahm’s posting on October 18, 2006, targeted stadiums in Miami, Atlanta, Seattle, Houston, Oakland, Cleveland and New York City. Brahm also added that the stadium explosions would be praised by Osama bin Laden as “America’s Hiroshima” and spark global conflicts. The message said that bombs would be delivered by trucks and that “the death toll will approach 100,000 from the initial blasts and countless other fatalities will later occur as result from radioactive fallout.” Although Brahm was arrested on federal charges that could have resulted in five years behind bars, he only received a 6 month prison sentence.

5.3: NFL Bomb Scare (November, 2006)
On November 6, 2006, it was reported that two Carnegie Mellon University students, Sudeep Paul, 21, and Anand Shankar Durvasula, 20, were charged with criminal conspiracy and criminal trespass after they were caught in the middle of the night trying to sneak into Heinz Field, home of the Pittsburg Steelers. Although explosive-sniffing dogs found nothing of interest around the football stadium, an affidavit stated that the dogs registered two separate “positive hits for explosives” in the Lexus sport utility vehicle the men were driving. According to reports, Heinz Field security officers spotted the men on a security camera trying to enter the stadium. The security officers then approached the men who tried to escape, only to be apprehended by Pittsburgh police officers in waiting. The suspects initially told police that they were trying to check out the stadium because they had tickets to the Steelers game against the Denver Broncos, but later changed their story and told investigators they were trying to complete a music video. A video camera and tripod were allegedly found inside the vehicle which police found parked nearby. Even though the suspects were questioned by agents from the Joint Terrorism Task Force, Pittsburgh Police Chief Nate Harper stated that “We don’t know exactly what their intentions were”.

5.4: NFL Exempt from Terror Lawsuits (2008)
Congressional legislation passed in December of 2008, conveniently dismisses any potential lawsuits against the NFL stemming from a future terror attack on any of the NFL’s football stadiums. The new law, entitled the SAFETY Act (Support Anti-terrorism by Fostering Effective Technologies), which was curiously not reported until September of 2009, essentially guarantees that the NFL will not have to pay any claims that terror victims may file in the aftermath of an attack. According to the report, the “protection extends only to companies’ services or equipment that the Homeland Security Department has approved as being effective in anti-terrorism.” The NFL got the protection after the government approved the league’s nine-page stadium-security guidelines. “An attack from a terrorist organization could put us out of business”, stated NFL security chief Milt Ahlerich.

5.5: NFL & DHS Partnership (2011)
The NFL was intimately connected to the foiled Super Bowl XLV nuclear terror plot (see below), so it should come as no surprise that the NFL and DHS have partnered together in the “If You See Something, Say Something” terror program. The NFL and DHS terror partnership was forged just two days prior to Super Bowl XLV, when U.S. Department of Homeland Security Secretary Janet Napolitano stated that: “We are partnering this year with the NFL on our ‘If You See Something, Say Something’ campaign and launching that NFL partnership right here at the Super Bowl…The idea is simple…We are simply asking the American people to be vigilant, recognizing that our security is a shared responsibility that all of us must participate in. If a fan at the Super Bowl or any other American at any other place sees something that is potentially dangerous, then say something about it to local law enforcement or someone in authority”.

5.6: Super Bowl Nuclear Terror Plot (February, 2011)
The Pittsburg Steelers along with the Green Bay Packers were featured as the two teams which planed in Super Bowl XLV on February 6, 2011. Unbeknown to many, a state-sponsored false-flag terrorist plot to detonate a nuclear bomb at Super Bowl XLV in Dallas, Texas, was foiled. Five days before on February 1, 2011, Julian Assange of Wikileaks revealed to the world via leaked classified diplomatic documents that Al-Qaida was on the brink of using a nuclear bomb and that the West was on the verge of a “Nuclear 9/11″. What the diplomatic documents failed to mention was actual target, date and location of the upcoming nuclear terror attack. Published 4 days prior on January 28, 2011, a free ebook, entitled The Nuclear Bible that went viral on the internet, specifically named Super Bowl XLV  as the target, date and location of the impending nuclear terror attack. Pakistan, the alleged greatest purveyor of terrorism and nuclear proliferation, was scheduled to be scapegoated for the nuclear attack that would kick off a nuclear World War III.

5.7: New NFL Security Protocols (2011-2012)
Shortly after the failed Super Bowl terror plot, the NFL drastically changed their security protocols, a clear move to give the NFL plausible deniability in the aftermath of a terror attack. The first phase came in September of 2011, when it was reported that under the new “enhanced” pat-down procedures, the NFL had ordered all 32 clubs to search fans from the ankles to the knees as well as the waist up. Previously, security guards only patted down fans from the waist up while looking for booze, weapons or other banned items. The second phase came in August of 2012 when it was reported that even newer security protocols were being implemented at all NFL stadiums. According to the NFL, the new procedures involved “using handheld metal detectors” to “ensure a safe game day environment for all fans”. Football fans are now asked to hold their keys, cell phones and other metal items in their hands during the new security process, a new measure implemented to eliminate the need for “pat-downs” before games. It appears that the NFL is fully anticipating a terror attack and has gone through the necessary procedure to ensure that they are not held accountable in the aftermath.

5.8: NFL Attacks & Scares (2011-2012)
Sports stadium terror propaganda is all-time high and there have been at least 10 stadium deaths, shootings, stabbings, scares and threats in 2012 alone. Ever since the foiled Super Bowl XLV nuclear terror plot, there have been numerous incidents which foreshadow that NFL terror is on the horizon. On August 21, 2011, it was reported that two men were shot and a third man was beaten unconscious inside the stadium in the parking lot of Candlestick Park after a preseason game between the San Francisco 49ers and the Oakland Raiders. Roughly three weeks later on September 13, 2011, a man was arrested after allegedly using an illegal Taser in a fight with other fans during the Dallas Cowboys and New York Jets game. About a month later on November 10, 2011, a man was stabbed during a fight in the Qualcomm Stadium parking lot during a San Diego Chargers and Oakland Raiders game. A month later on December 20, 2011, the start of Monday Night Football at Candlestick Park in San Francisco was delayed when a transformer exploded just outside the stadium. The unprecedented explosion delayed the start of the game for about 30 minutes. After being allegedly fixed, the power and lights went out for a second time around 6:45 p.m. causing a second delay of game that lasted 16 minutes in the second quarter. Roughly eight months later, on August 18, 2012, it was reported that a man was police responded to a call from a man who said he had “accidentally shot” another man in a parking lot near the University of Phoenix stadium during the Oakland Raiders and Arizona Cardinals game. Roughly a month later on September 15, 2012, a man shot and wounded a female parking lot employee before killing himself between the stadiums that are home to the Kansas City Chiefs and Royals. A month later on October 15, 2012, a man suffered non-fatal injuries when he was stabbed outside Candlestick Park, shortly after the start of Sunday’s game between the San Francisco 49ers and the New York Giants. Based on the sheer amount of events involving NFL teams from Oakland and San Francisco, a terror event may transpire in the Bay Area sometime in the near future. During an October 28, 2012, NFL game in Pittsburgh, Pennsylvania between the Steelers and the Washington Redskins, visiting Redskins coach Mike Shanahan allegedly had money and his passport stolen from the locker room. According to the report, Redskins director of security Ed Burke released a statement stating that officers in Pittsburgh insisted on filing a police report and that the investigation is ongoing. On November 16, 2012, it was reported that officials had found the dead body of a 26-year-old man who was reported missing after attending Thursday night’s NFL game between the Buffalo Bills and the Miami Dolphins.

5.9: NFL Bomb Threat (January, 2012)
On June 2, 2012, it was reported that a Detroit Lions fan, Shawn Payton, 34, had called in two bomb threats during Detroit’s playoff loss to the New Orleans Saints at the Superdome in January of 2012. According to reports, Payton called in the hoax threats from his home in Jackson, Michigan, in an attempt to halt the January 7, 2012, game, which the Saints went on to win. According to the indictment, he told the receptionist, “I will blow up your building.” In the second message, which was recorded by police after the first threat was reported, he ordered, “I want you to relay a message to the sideline: If your stupid Southern team keeps winning, there will be … severe consequences, OK?” FBI agents allegedly traced phone records to nab Payton, who eventually pleaded guilty to a felony charge of using interstate communications to transmit a threat. Although Payton faced a maximum of five years’ imprisonment and a $250,000 fine, it was reported on September 7, 2012, that he was only sentenced to three years probation and two months of home confinement.

5.10: NFL Bio-Terror Foreshadowing? (August, 2012)

On August 23, 2012, it was reported that potentially rabid bats had swooped down fans during a game between the Baltimore Ravens and the Detroit Lions and that the Maryland’s Department of Health and Mental Hygiene (DHMH) has warned people sitting in section 500 that they could be at risk for rabies. Curiously, the Pittsburgh Steelers play the Baltimore Ravens in Pittsburgh on November 18, 2012. Will chemical laden jets, missiles or bombs be waiting for NFL fans come Sunday night?

5.11: NFL’s ‘Salute to Service’ (November, 2012)
The NFL is dedicating the entire month of November to the U.S. military in what is being called ‘Salute to Service’, a pro-war propaganda campaign started in 2011.  According to reports, “The National Football League will continue its long history of honoring veterans and active duty members of the military with its annual ‘Salute to Service’ campaign” which is “designed to unify and elevate the extensive military appreciation work of the NFL and its clubs”. All 32 NFL teams have designated one home game to honor the U.S. military in which teams will be forced to display a number of ‘Salute To Service’-branded elements in their stadiums including goal post wraps, pylons with camouflage ribbon decals, wall banners with the words ‘Salute To   in the back of the end zone, camouflage ribbon lapel pins, camouflage Gatorade towels, camouflage Nike and Under Armour gloves for players, camouflage captain’s patches and camouflage ribbon footballs used on every play.

6. POTENTIAL TERROR LOCATIONS

6.1: Atlanta, Georgia (CDC, CNN?)
Violent and suspicious events occurring around Atlanta, Georgia, may indicate that future terror attack may be planned for the city. On October 25, 2012, a gunman went into an Atlanta mega-church and opened fire killing one volunteer. A few days later on November 2, 2012, it was reported that police had closed streets and sidewalks around the CNN Center in downtown Atlanta, due to the investigation of a chemical bomb threat. Two days later on November 4, 2012, it was reported that according to authorities, a police helicopter crashed in Atlanta, Georgia, instantly killing the two officers aboard. Whether this alleged crash was an accident or these police officers knew something they shouldn’t is unknown, but their deaths are suspicious nonetheless because there are no photos of the crashed helicopter. That same day, Georgia police were searching for at least one gunman who wounded seven people, mostly teenagers, after opening fire amid the rides at a crowded fair in Georgia. Coincidentally, Atlanta is home to CDC, a city has been conveniently set-up for bio-terror.

6.2: Chicago, Illinois (O’Hare International Airport?)
Obama’s hometown Chicago has a rich history of bio-terror and its Mayor Rahm Emanuel, is the son of a Zionist terrorist. Chicago was also recently depicted in the bio-terror propaganda film entitled Contagion as the first American city hit with a bio-terror outbreak in a fictitious global pandemic that kills millions. Chicago is also one of 21 cities NOT at risk for elimination from the Cities Readiness Initiative, meaning that Chicago is “ready” for bio-terrorism.

6.3: LA Terror Threat (LAX?)
On October 24, 2012, it was reported that Algerian terrorist Ahmed Ressam, who in December of 1999, drove off a ferry from Canada into Washington state with a trunk full of explosives, was sentenced to 37 years in prison for plotting to LAX airport bombing plot. On November 19, 2012, it was reported that 4 California men of Arab decent were charged with plotting to kill Americans and destroy U.S. targets by joining Al Qaeda and the Taliban in Afghanistan. The defendants, including a man who served in the U.S. Air Force, were arrested for plotting to bomb military bases and government facilities, and for planning to engage in “violent jihad,” according to the FBI. Aside from being ground zero in the Rodney King riots which started on April 29, 1992, the city of Los Angeles appears to be getting ready for major attacks of terror and mayhem. On February 8, 2012, it was reported that the Los Angeles Police Department (LAPD) opened a new high-tech war room which “gives it eyes all over the city”. LAPD Chief Charlie Beck stated that “We are targets on our own soil…We have to be ready.” Located in the heart of downtown Los Angeles, the new intelligence hub is interestingly called RACR. Should any acts of terror be committed at the “Twilight” premier in Los Angeles, the LAPD will be ready.

6.4: Massachusetts Terror (MBTA, Gillette Stadium?)
On May 17, 2011, it was reported that there was a radiation scare at the Tip O’Neill Federal Building in Boston. According to reports the radiation leak triggering a massive emergency response in the heart of Boston shortly before the Boston Bruins playoff game. Six months later on November 16, 2011, it was reported that The FBI was enlisting the public’s help to locate a domestic terror suspect on its “most wanted terrorists list,” who they say may be hiding in Massachusetts. The suspect, Daniel Andreas San Diego, is wanted for his alleged involvement in two bombings in the San Francisco, California area. According to the report, the bombings date back to August 2003, where two bombs exploded an hour apart on the grounds of a biotechnology corporation, and September 2003, when a bomb strapped with nails exploded at a beauty products corporation. A couple weeks later on November 29, 2011, it was reported that a second radiation scare had occurred in Boston after a cargo truck carrying thought to be carrying unlicensed radioactive material was stopped, resulting in the temporary shutdown of nearby Haymarket’s MTSB subway station. Roughly a year later on October 3, 3012, it was reported that the FBI was offering another award for Ahmad Abousamra, a Massachusetts “terrorist” wanted indicted in 2009 for taking multiple trips to Pakistan and Yemen to seek jihad training and has been charged with conspiracy to provide material support to Al Qaeda.

6.5: Pennsylvania (Pittsburgh & Philadelphia)
False-flag related terror in Pennsylvania is blinking red on every level. Aside from the fact that Pennsylvania was intimately tied to “Jihad Jane” and was allegedly targeted by a Scottish terrorist group, and a Uzbek terrorist organization, Pennsylvania has been the subject of recent terror propaganda and home to numerous terror attacks, terror drills, terror scares, terror threats, terror plots, as well as multiple Pennsylvanian suspects who were arrested for terror related crimes. Also, on November 14, 2012, it was reported that a federal lawsuit had been filed stating that Pittsburgh failed to train its undercover police officers on how to properly identify themselves, potentially foreshadowing the means by which “terrorists” will gain future access to restricted areas within the city of Pittsburgh.

CONCLUSION

An unprecedented “2012 Doomsday” type cyber-terror “event” post-election would give Obama the national and global tragedy that his administration has yet been unable to pull off. To date, there have been at least three Obama terror plots which have been foiled: The Super Bowl XLV nuclear terror plot, the 2012 New Year’s Eve dirty bomb plot, and the 2012 Democratic National Convention terror plot. After being caught red-handed on multiple occasions, the Obama Administration and its Zionist controllers are more desperate than ever to conduct major false-flag operations with the United States.

The U.S. economy is at an all-time low and dissent for Obama and the U.S. government is at an all-time high. According to a Financial Times article, Obama’s has a “growing credibility crisis” and there are fears that the Democrats could lose the White House and the Senate to the Republicans. White House adviser Robert Shapiro made it crystal clear that Obama is relying on a terror attack to rescue his presidency: “The bottom line here is that Americans don’t believe in President Obama’s leadership,” said Shapiro, “He has to find some way between now and November of demonstrating that he is a leader who can command confidence and, short of a 9/11 event or an Oklahoma City bombing, I can’t think of how he could do that. The November election Shapiro spoke of came and went, so it’s even more clear that an Obama false-flag attack is imminent.

About the Author
David Chase Taylor is an American journalist living in Zürich, Switzerland, where he has applied for political asylum after the release of The Nuclear Bible, a book credited with stopping a false-flag nuclear terror attack upon America. Taylor has also released The Bio-Terror Bible, a book and website exposing the coming global bio-terror pandemic. Taylor, the editor-in-chief of Truther.org, has also exposed the 2012 Democratic National Convention Terror PlotNATO’s implementation of the SKYNET Terminator Program, as well as the Alex Jones links to STRATFOR.

TRUTHER.ORG LEGAL DISCLAIMER: Terror related assertions, forecasts and predictions by Truther.org DO NOT necessarily imply that said terror events will transpire in reality, but rather that there is a distinct possibility that said terror events could theoretically happen based on the cumulative terror related data. Once a particular false-flag terror related plot is widely exposed (See: Super Bowl XLV), terror plots are immediately canceled or postponed. State-sponsored terror attacks must have a prior “paper trail” in order to set-up patsies, create plausible deniability, develop scapegoats, and to mislead the public from the true perpetrators of terror. Truther.org’s sole purpose is preventing 9/11 type terror events by drawing unwanted global attention to various terror related “paper trails” prior to their fruition.