Archive for the ‘Cyber-Terror’ Category

gaelx_-_anonymous

Download & Forward PDF

David Chase Taylor
December 12, 2014
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA) will premeditatively attack and crash the U.S. stock markets along with the U.S. dollar by December 19, 2014. The attacks will most likely target the New York Stock Exchange (NYSE), the US Security and Exchange Commission (SEC), and/or the Federal Reserve Bank (FED).

In order to keep the notion of hacking in the headlines until a financial-related cyber-attack can commence, the ongoing story of the Sony hack and hackers has permeated the media. The latest twist was revealed on December 12, 2014, Bloomberg News published a report entitled “Sony’s Hacking Nightmare Gets Worse: Employees Medical Records Revealed”, further highlighting the depth of the attack.

Back on November 30, 2014, it was reported that Sony Pictures’ new movies were leaked online following a hack attack. Needless to say, the unprecedented security breach has set the precedent for an unprecedented cyber-related attack on the U.S. economy.

In order to highlight the U.S. Treasury just prior to a financial-related cyber-attack that bankrupts the United States, CNS News published a report on November 28, 2014, entitled “Ponzi: Treasury Issues $1T in New Debt in 8 Weeks—To Pay Old Debt”. The article equated the Federal Reserve to a Ponzi scheme just prior to its slated collapse.

In what appears to be pre-Wall Street cyber-attack conditioning, it was reported on November 27, 2014, that websites around the globe were hacked by the Syrian Electronic Army (SEA). Since SEA is a state-sponsored terror group, the attack has set the precedent for an even more spectacular cyber-attack, most likely in New York City.

Anonymous Cyber-Hijack of U.S. Economy
Although an unprecedented cyber-terror attack on the U.S. economy could be blamed on China, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack, funneling the stolen money into allegedly untraceable Bitcoin accounts. Coincidentally, on October 2, 2014, it was revealed that an FBI informant admittedly organized Anonymous attacks on government websites in 30 countries, further confirming that the group known as Anonymous is in fact state-sponsored. The timely report was designed to set the precedent for an Anonymous attack on government-related websites such as the FED, NYSE, SEC, etc. An Anonymous-based cyber-attack will enable the progenitors of terror (i.e., the CIA) to steal billions if not trillions of dollars from the U.S. economy without a trace. Should a sovereign country be deemed responsible for the heist, defrauded investors worldwide would collectively demand compensation from that particular country, something the CIA does not want to deal with. In what appears to be pre-Wall Street cyber-attack logistics, it was revealed back on July 8, 2014, that Wall Street has now hired a former NSA chief to help create a “cyber war council”. Translation: Wall Street and the NSA are teaming up together to execute a Wall Street cyber-hijack which will likely disappear trillions of dollars, bankrupting the U.S. economy. In the wake of the attack, the NSA chief will likely be scapegoated for the attack.

Anonymous Stock Market Attack
In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely an alleged member of Anonymous.

reign-malware-1000x520

Regin Malware
In what appears to be pre-financial cyber-attack hardware, on November 23, 2014. CNN published a report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure has been hijacked by the Regin malware and therefore any type of cyber-related attack on America’s financial infrastructure is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

Federal Security Breaches
If reports are to be believed, the U.S. federal government is highly susceptible to cyber-attacks, making the likelihood of a major financial cyber-hijack all the more believable. For example, on November 4, 2014, it was reported that a cyber-attack on a federal security contractor wasn’t noticed for months. Therefore, if the FED, NYSE or SEC is hacked in 2014, it won’t be noticed days or even weeks. This in essence allows the CIA to stage a financial-related attack whenever they want without any forewarning. Six days later on November 10, 2014, it was reported that federal firewalls are struggling against the increasing number of cyber-attacks. The timely report was designed to give the U.S. government plausible deniability in the wake of a financial-related terror attacks that bankrupt the U.S. economy. Also on November 10, 2014, the U.S, Postal Service was reportedly hacked, resulting in employee and customer information being compromised. Needless to say, the incident was designed to set the precedent for a far worse cyber-attack on the U.S. federal government, most likely the FED or SEC.

Financial Cyber-Attacks Trending
A preview of financial related cyber-terror recently occurred on July 10, 2014, when it was reported that Norwegian banks suffered the largest-ever DDoS attack in their history, an act which the state-sponsored terror group known as Anonymous predictably took credit for. Because all 206 countries are under the command and control of the CIA, events tend to happen in other countries before transpire in America on a much larger scale. Roughly 2-weeks later on July 25, 2014, the European Central Bank was allegedly hacked and personal data stolen. Roughly a month later on August 27, 2014, it was revealed that the FBI is now investigating a cyber-attack on JPMorgan. Roughly 3-weeks later on September 17, 2014, members from Anonymous and an Occupy Wall Street group reportedly abolishes nearly $4 million in student loan debt on September 17, 2014, foreshadowing the notion of Anonymous vanishing millions into thin air. Roughly 3-weeks alter on October 3, 2014, the New York Times published a report entitled “Hackers’ Attack Cracked 10 Financial Firms in Major Assault”, further foreshadowing financial-related cyber-terror. Also on October 3, 2014, it was reported that the JP Morgan data breach affected 76 million households, a laughable notion considering that the population of the U.S. is only 300 million people. A few weeks later on October 20, 2014, U.S. officials warned 500 million financial records may have been hacked. The timely propaganda report was evidently published in order to show that financial-related cyber-terror is imminent just prior to an unprecedented attack on the U.S. financial system. Taken collectively, these timely reports have set the precedent for future bank-related cyber-terror attacks, most likely targeting the FED, NYSE, or SEC.

Ukraine’s-Election-Commission-Denies-Cyber-Attack

NYSE Cyber-Attack
The latest New York Stock Exchange (NYSE) cyber-terror plot appears to be a redux of two previously foiled terror plots as depicted in the March 20, 2014 Truther.org report entitled “Impending Wall Street Banking Cyber-Heist to Transfer Billions to Bitcoin”, and the April 15, 2014 Truther.org report entitled “Feds Planning High Frequency Trading Cyber-Attack via “Heartbleed” Bug”. In short, hackers will cause a “High Frequency Trading” sell-off (which they will short-sell), the profits of which will be deposited in untraceable Bitcoin accounts. In order to provide a motive for a Bitcoin-related cyber-terror attack, the IRS declared that Bitcoin was not an official currency on March 25, 2014. Roughly 3-months later on June 13, 2014, it was revealed that the FBI will auction off seized Bitcoins worth $18m on June 27, 2014, the impending date of the attack. In order to raise the profile of banks prior to a debilitating cyber-terror attack that will likely bankrupt millions of investors, Vice President Joe Biden stated on June 23, 2014 that “I don’t have a savings account”. Two days later on June 25, 2014, the U.S. Federal Reserve warned that banks face “tougher tests” ahead, an ominous sign that a so-called “test” (i.e., attack) is imminent. Although impossible to prove, it appears that Bitcoin was specifically created to be an untraceable depository for stolen funds from a Wall Street cyber-attack. In other words, the hackers play the role of Robin Hood by stealing from the rich (i.e., Wall Street) and giving to the poor (i.e., Bitcoin)—the only catch being that Robin Hood is invisible.

Bank Terror Drills
In what appears to be cover drills for the controlled demolition of the U.S. economy, it was reported on October 10, 2014, that the U.S. and the UK will execute a “big bank collapse” simulation. According to reports, officials will “get together in a war room next week to see if they can cope with any possible fall-out when the next big bank topples over”. The banking collapse drill will reportedly involve Federal Reserve Chair Janet Yellen and Bank of England Governor Mark Carney, and be hosted by the U.S. Federal Deposit Insurance Corporation (FDIC). The drill will involve the hypothetical failure of U.S. banks, most likely the Federal Reserve. Needless to say, key term such as “collapse” and “topples over” are designed to foreshadow that a controlled demolition of the U.S. economy is indeed planned. Roughly 2-weeks late on October 26, 2014, it was reported that four in five Eurozone banks pass European Central Bank health test. Interestedly, the very next day, October 27, 2014, it was reported that 25 European Union banks failed a “stress test” exposing a $31billion shortfall. The bi-polar reporting was evidently designed to insinuate that banks are on the verge stressed to the point of collapse.

DHS Banking Continuity
In the wake of a major U.S. bank or stock market, a global financial panic in respect to the U.S. dollar will likely ensure. According to a December 10, 2004, CRS Report for Congress entitled “Homeland Security: Banking and Financial: Infrastructure Continuity”, bank terror and financial collapse have been planned for accordingly. According to the report, “H.R. 2043 sought to address bank risks under terrorism” and the Terrorism Risk Insurance Act of 2002 (TRIA) “provides a federal backstop for insurers willing to provide terrorism insurance”, ultimately protecting insurance banks against “catastrophic payouts in case of terrorist attacks”.  In other words, if and when a bank related terror attacks occur resulting in financial panic, private banks will not have to foot the bill for their losses because the U.S. government has assumed all the risk and liability. This convenient set-up essentially guarantees that the U.S. government, not the banks, will go bankrupt in the aftermath of bank related terror attacks.

The “Contagion Effect”
In the aftermath of U.S. bank failures (a bi-product of an irreversible U.S. stock market crash), other banks will begin to panic, setting off a chain reaction of banking collapses around the world. The aforementioned CRS Report for Congress found that when one bank goes, the rest will follow:  “Financial institutions face two categories of emergencies that could impair their functioning. The first is directly financial: danger of a sudden drop in the value of financial assets, whether originating domestically or elsewhere in the world, such that a global financial crisis might follow. The second is operational: failure of physical support structures that underlie the financial system. Either could disrupt the nation’s ability to supply goods and services and alter the behavior of individuals in fear of the disruption (or fear of greater disruption). They could reduce the pace of economic activity, or at an extreme, cause an actual contraction of economic activity”. The report went on to state that “Collapse of one prominent entity could evoke a contagion effect, in which sound financial institutions become viewed as weak — today’s equivalents of a bank run, in which panicked customers withdraw funds from many entities, causing others to fail as well”.

“Quantum Dawn II″ Terror Drill
Prior to a major cyber-terror attack on the New York Stock Exchange (NYSE), one would expect there to be some stock-market related terror drills to prepare Wall Street insiders for the attack. Coincidentally, on June 13th, 2013, it was reported that Wall Street executed “Quantum Dawn 2”, a cyber-terror war-game apparently meant to give insiders an opportunity to make financial moves before the market crashes—for good. According to the report, Cyber Strategies oversaw a terror exercise which included Citigroup, Bank of America, the Department of Homeland Security, the Treasury Department, the Federal Reserve, the Securities and Exchange Commission, as well as 40 other firms. The drill, which featured a hacker, possibly from China, operating from a fake trading platform, prompted a response in which the participants facilitated a conference call to “figure out what was going on”. In other words, the drill simulated a real-life scenario in which insider firms received the “heads up” about an impending cyber-attack and subsequently shared this information accordingly so that their bank accounts and those of their clients would not be affected. The same sort of thing occurred just prior to 9/11 when “put options” or bets were taken out on United Airlines and American Airlines, the two airline companies involved in the attacks. According to the “9/11 Commission Report”, “some unusual trading did in fact occur”, however, it claimed that, “each such trade proved to have an innocuous explanation”.

“Quantum Dawn II” Fallout
In the October 23, 2013, Fox Business report entitled “‘White Hat’ Hackers Expose Flaws of U.S. Stock Market”, the details of the “Quantum Dawn 2”  cyber-attack exercise were revealed. According to the report, ethical “white hat” hackers intentionally “looking to expose the cyber vulnerabilities of U.S. equity markets”, were able to directly impact market performance by “forcing a mock market close”. According to the report, more than 50 entities and 500 people in the financial services sector participated in the cyber-attack which was executed by the Securities Industry and Financial Markets Association (SIFMA) on July 18, 2013. So called “ethical hackers” were told to give everything they had to try and cripple the U.S. stock market during the 6-hour exercise. “Quantum Dawn 2 demonstrated the industry’s resiliency when faced with serious cyber-attacks that aimed to steal money, crash systems and disrupt equity market trading,” SIFMA CEO Judd Gregg stated. According to Cedric Leighton, a former U.S. intelligence officer, “The more realistic the exercise the better prepared they’ll be if and when attacks from a cyber standpoint occur”.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

chinainvadesamerica

Download & Forward PDF

David Chase Taylor
December 7, 2014
Truther.org

SWITZERLAND, Zurich — As originally depicted in the June 30, 2014, Truther.org report entitled “China Plans to Cyber-Hijack U.S. Drones for Attack on America”, the CIA (which is in command and control of all 206 counties) is plotting a surprise drone attack on the United States, most likely using American drones which were allegedly hijacked by the Chinese government.

Considering that December 7, 2014, is the 73rd anniversary of the Japanese Attack on the United States at Pearl Harbor, Hawaii, it’s the perfect time to execute the Chinese cyber-hijack of U.S. drones which the CIA has been desperately trying to execute this year.

In order to make the United States vulnerable just prior to the slated Chinese attack, U.S. President Obama fired Secretary of Defense Chuck Hagel a day prior on November 25, 2014, making a spectacle of it while doing so. The timely firing was designed to make America look weak, thus inviting a surprise attack by China.

Back on November 9, 2014, the Financial Times of London published a report entitled “Beijing Sees the U.S. President as a Weak Leader in the Autumn of His Presidency”. The firing of the Secretary of Defense with no replacement will predictably be touted as the straw which broke the camel’s back.

It is imperative to note that once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will likely become the norm. This futuristic drone war scenario essentially allows the CIA to attack whomever and whatever they want—whenever they want.

The notion that the CIA is actively trying to trigger World War III between the U.S. and China has been exposed ad nauseam by Truther.org. To date, at least 6 different of Chinese “surprise” attack plots have been identified and exposed, the cyber-hijack of drones being the latest.

In the wake of these “surprise” Chinese attack plots being exposed, roughly 60 Chinese officials suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots.

System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

reign-malware-1000x520

Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

Chinese Drone Attack

Chinese Naval Superiority
In what appears to be pre-Chinese attack propaganda, it was revealed on December 3, 2014, that a new reported has found that the Chinese Navy’s fleet will outnumber the U.S. by 2020. According to the timely report, China has plans to grow its navy to 351 ships by 2020 as the Chinese continue to develop their military’s ability to strike global targets. Interestingly, the report went on to state that the 2014 U.S.-China Economic and Security Review Commission recommended to Congress that the U.S. Navy respond by building more ships and increase its presence in the Pacific region – a strategy they U.S. military has already started. In other words, the Chinese are one step ahead of the U.S., making the likelihood of a Chinese attack all the more plausible.

U.S. Navy Security Breach
In order to covey the notion that the U.S. Navy is vulnerable to insider threats, making the notion of a drone hijacking all the more plausible, it was reported on December 5, 2014, that a U.S. Navy engineer tried to steal schematics of aircraft carrier. According to reports, Mostafa Ahmed Awwad was arrested Friday on two counts of attempted exportation of defense articles and technical data after he allegedly tried to steal schematics of an aircraft carrier under construction and have them sent to Egypt. Needless to say, the incident was fabricated in order to set the precedent for a far greater breach of U.S. technical data, most likely in respect to the U.S. Navy’s drone fleet.

Chines Attack Locations
Although this modern Pearl Harbor-like attack scenario has been exposed in the past, breaking news and events suggests that a redux attack is imminent. Although a drone-related attack by China could theoretically transpire in any U.S. city, the following are most likely due to their proximity to the Pacific Ocean.

Potential Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California

Chinese Cyber Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Revenge Drone Attack
In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

“Sting of the Drone”
The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

Asian “Surprise” Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

??????????????????

Vice Admiral Jan E. Tighe

In what appears to be pre-Chinese cyber-attack personal logistics by the U.S. Navy, it was revealed on April 3, 2014, that Vice Admiral Jan E. Tighe has been appointed head of the U.S. Fleet Cyber Command and the U.S. 10th Fleet, making her “the first female commander of a numbered fleet in U.S. Navy history”. The U.S. Fleet Cyber Command is an operating force of the United States Navy responsible for the Navy’s cyber warfare programs, while the United States Tenth Fleet executes the full spectrum of cyber, electronic warfare, information operations and signal intelligence capabilities across the cyber, electromagnetic and space domains. In the wake of a successful Chinese cyber-attack against the U.S. Navy, Vice Admiral Tighe, a woman, will be publically scapegoated for the unprecedented attack. The U.S. government and the media will predictably state that Tighe was over her head and not qualified for the position, making the issue about a woman serving in the military rather than the fact that the entire Chinese attack was a false-flag courtesy of the CIA.

I: DRONE CYBER-HIJHACK:

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2 China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

drone

1.3 Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

II: CALIFORNIA:

2.1 Chinese Attack on California
In order to make China’s drone attack on San Francisco be more explosive in nature, the CIA ordered three former U.S. Navy fleet oilers to be moved to Mare Island, just outside San Francisco Bay. Although the USS Hassayampa, the USS Kawishiwi, and the USS Ponchatoula were allegedly moved to the island for “cleaning”, it’s highly likely that they were actually filled with gasoline and/or explosives. That way, when they are struck with a drone missile, a massive explosion will erupt, creating a made-for-TV moment reminiscent of the December 7, 1941 Japanese attack on Pearl Harbor. California also has two nuclear reactors that may come under Chinese drone attack: The Diablo Canyon Power Plant located in San Luis Obispo County (just 231 miles from San Francisco), and the San Onofre Nuclear Generating Station in San Diego County. In the event that China is able to hijack U.S. drones, one or more of these nuclear reactors may be attacked, causing a Fukushima-like disaster in America. Interestingly, a similar nuclear reactor disaster if featured in the recent Hollywood propaganda film entitled “Godzilla” (2014), which also features an attack on San Francisco by an Asian-based monster.

Kaiju_Attack_SF_Aftermath_01

2.2 Golden Gate Bridge Attack
To make a Chinese attack on the U.S. even more psychologically terrorizing, a well-known landmark such as the Golden Gate Bridge in San Francisco must be destroyed in order to serve as life-long reminder of that horrific day (e.g., Twin Towers on 9/11). Back on February 23, 2012, it was reported that the Golden Gate Bridge will undergo a renovation project that will “take years to complete”. According to reports, the project involves the repainting of the two main suspension cables which are responsible for holding the bridge in place. Whether the lengthy “renovation” project has undermined the structural integrity of the bridge is not known, but the timely construction project may have provided the necessary cover for the installation of demolition explosives in and around the Golden Gate Bridge. Said explosives could be detonated at a later date via remote control in order to give the appearance of a successful Chinese attack on the bridge using drone missiles. In other words, the bridge would be demolished with shaped explosives while the government and media publicly blame China.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

Neuron-Syndicate

Download & Forward PDF

David Chase Taylor
November 24, 2014
Truther.org

SWITZERLAND, Basel — Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA) is looking to execute a wave of cyber-related terror attacks in the United States surrounding the official and unofficial holidays of Thanksgiving, Black Friday, and Cyber Monday.

Potential cyber-targets include but are not limited to: the NSA Data Center Utah in Bluffdale, Utah; the U.S. power grid; U.S. nuclear reactors; U.S. oil and gas facilities; U.S. airports and train stations; the International Space Station (ISS); national retailers (Target, Wal-Mart, etc.), Google Inc. (California); and the Hoover Dam in Clark County, Nevada.

In what appears to be pre-holiday cyber-terror programming, it was reported on November 20, 2014, that hackers accessed 500 webcams in the UK and thousands worldwide. Less than a day later on November 21, 2014, hundreds of web cams within the Tri-State Area were hacked. The latter incident was evidently staged in order to show that U.S. government computer networks are vulnerable to attack.

That same day, November 21, 2014, America’s Admiral Michael Rogers, director of the National Security Agency and commander of the U.S. Cyber Command, stated that adversaries of the U.S. conduct regular electronic reconnaissance to reveal weaknesses in America’s industrial control systems, ranging from power plants to sewage facilities

Two days later on November 23, 2014., CNN published a report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus.

“Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks?

In other words, the entire internet infrastructure has been hijacked by the Regin malware and therefore any type of cyber-related attack on America’s infrastructure is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

Although a wave of unprecedented cyber-terror attacks could be scapegoated onto China, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack. This will essentially make anyone with a computer a potential suspect.

State-Sponsored Cyber-Terror Targets:

1. NSA Data Center Utah (Bluffdale, Utah)
2. U.S. Power Grid
3. Nuclear Reactors (U.S.)
4. Oil & Gas Facilities (U.S.)
5. Mass Transit (U.S. Airports, Bus and Train Stations)
6. International Space Station (ISS)
7. National Retailers (U.S.)
8. Google Inc. (California)
9. Hoover Dam (Clark County, Nevada)

[Does not purport to be a complete list of cyber-related targets]

APTOPIX-NSA-Phone-Rec_Horo

Cyber Doomsday
The notion of a Cybergeddon has been promulgated in the media since 2012 via numerous propaganda articles which have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, and “Threat Of ‘Spectacular’ Cyberattack Looms”, all indicate that unprecedented state-sponsored cyber-terror with the United States is imminent.

Cyber-Attack Warning

In a 2007 CRS Report for Congress entitled “Terrorist Capabilities For Cyber-Attack: Overview And Policy Issues”, the U.S. government states that, “If terrorists were to launch a widespread cyberattack against the United States, the economy would be the intended target for disruption” and that “Many security experts also agree that a cyber-attack would be most effective if it were used to amplify a conventional bombing or CBRN (chemical, biological, radiological or nuclear attack). Authorities have expressed concerns about terrorists combining physical attacks such as bombings with hacker attacks to disrupt rescue efforts, known as hybrid or “swarming” attacks”. Therefore, cyber-attack will likely be executed along with real-world attacks.

Teenage Cyber-Attack
If and when Cybergeddon occurs, a teenager affiliated with “Anonymous” will likely be scapegoated. However, prior to this occurring, the public must first be psychologically programed to accept that this is in fact possible. Starting in September of 2013, there has been an unprecedented amount of news and events in respect to teenagers which has been subconsciously programming the masses for teen-related cyber-attack. A preview of this type of pasty programming was reported on September 26, 2013, when England arrested a 16-year old boy for a distributed-denial-of-service (DDoS) attack which was touted as ““biggest cyber-attack in the history of the internet.” Roughly a month later on October 27, 2013, a 12-year old Canadian boy plead guilty to hacking government websites and giving the information to Anonymous. A major teenage cyber-terror attack effectively turn every kid with a computer into a suspected terrorist and would undoubtedly usher in draconian internet regulation—most likely starting with the RFID micro-chip which will be used to identify internet users.

1. NSA DATA CENTER ATTACK:

ap132411996867

1.1: Utah Data Center Cyber-Attack
In order to create a formidable target prior to an “Anonymous”-related cyber-terror attack, the NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center“, was completed in September of 2013. The $1.5B data center is located at Camp Williams, Utah, just 25 miles (40 km) south of Salt Lake City. In order to bring unprecedented media attention to the Utah Data Center just prior to a major cyber-terror attack on it, it was reported on November 14, 2014, that Utah Considers cutting off water to the NSA’s Utah Data Center. The timely report was designed to show that the NSA center is a target as well as foreshadow that fact that U.S. utilities are about to be cut off.

2. POWER GRID ATTACK:

20130605_EMP_attack_large

2. 1: Power Grid Cyber-Attack
If and when a major state-sponsored cyber-terror attack targets the U.S. power grid, it will most likely involve a lengthy blackout that may never be restored. Back on April 26, 2013, it was revealed that former CIA Director stated that the U.S. electrical grid is vulnerable to attack. Roughly 6 months later on October 17, 2013, it was reported that U.S. utilities are a “soft underbelly” for hackers. Most recently, on November 20, 2014, it was reported that the U.S. government thinks that China could take down the power grid. That same day, November 20, 2014, the NSA admitted that China and other unnamed entitled can cripple US power grid. Three days later on November 23, 2014, “Business Insider” published a report entitled “Here’s What Chinese Hackers Can Actually Do To The US Power Grid”. Although China could be scapegoated in a high-profile cyber-terror attack, Anonymous is the most likely culprit.

2.2: Cyber-Terror Drill: “GridEx II”
In apparent preparation for a massive cyber-terror attack targeting the U.S. power grid, on August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “…Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”

3. NUCLEAR REACTOR ATTACK:

3.1: Nuclear Reactor Cyber-Attack
Back on December 13, 2011, it was reported that U.S. officials were investigating whether Iranian and Venezuelan diplomats in Mexico were involved in planned cyber-attacks against U.S. targets, including nuclear power plants. Needless to say, the report confirms that a cyber-attack on U.S. nuclear facilities is indeed planned. Aside from blatant programming of the 2012 Hollywood nuclear reactor disaster film entitled “Chernobyl Diaries”, a recent Nuclear Regulatory Commission (NRC) panel recommended that the U.S. government customize emergency plans for each of America’s 65 nuclear power plants, a change that would “expand” the standard 10-mile evacuation zone around U.S. nuclear reactors. In what appears to be pre-nuclear reactor attack logistics, it was revealed on July 11, 2014, via the headline “Response to ‘Attack’ on Nuclear Reactor Is Praised” that the U.S. government is holding terror drills on nuclear reactors. According to the report, “Other mock attacks have been conducted at a handful of the nation’s 62 nuclear power plants”. Evidently, the U.S. federal government is perfecting their nuclear terror attack scenarios. When and where they will strike is not known, but practice makes perfect. Roughly a month later on August 20, 2014, it was revealed that hackers attacked Nuclear Regulatory Commission 3 times in 3 years, a report designed to show that cyber-terrorists are actively targeting nuclear reactors. Most recently, on November 21, 2014, it was reported that a radioactive leak occurred at a Scottish nuclear plant. Whether the alleged leak caused by a cyber-terror attack is not known, but it will likely be stated as such after a high-profile nuclear reactor cyber-terror attack.

3.2: Target: California Nuclear Plants
California has two main nuclear reactors on its coastline: The Diablo Canyon Power Plant in San Luis Obispo County, and the San Onofre Nuclear Generating Station in San Diego County. Should a state—sponsored cyber-terror attack be executed, both nuclear reactors may be targeted. The notion that these plants ae slated for disaster was revealed back on June 19, 2012, it was reported that “San Onofre nuclear plant could become California’s Fukushima”. To date, there have several highly suspicious incidents surrounding the nuclear plant including a radiation leak on February 1, 2012, a radioactive gas escape on April 7, 2012,a hydrogen leak on October 23, 2012, and a 700,000-pound steam generator which was allegedly removed on November 5, 2012. Back on September 9, 2011, there was a massive power outage in San Diego whereby 1.4 million people lost electricity, exactly the same amount of people which lost electricity on February 1, 2012, when the San Onofre plant was shut down. Whether or not the blackout was a beta-test of the eventual San Onofre nuclear cyber-attack is not known, but San Onofre appears fully prepared to go offline.

4. OIL & GAS ATTACK:

4.1: Oil & Gas Terror Cyber-Attack
Aside from the 6 terror attacks on oil and gas pipelines internationally, there have been 3 oil and gas pipeline terror cases within the U.S. since 9/11. Needless to say, a cyber-related terror attack would predictably cause an ecological disaster. The notion that terrorists are targeting oil and gas facilities in America was witnessed back on September 29, 2004, when it was reported that two New Caney, Douglas Lloyd Crosby and Dennis Wade Durrenberger Jr., were arrested and charged with criminal mischief, a first degree felony, in connection with a pipeline explosion that caused many to be evacuated from their New Caney homes. Three years later on June 2, 2007, it was reported that four would-be terrorists had hatched a plot to blow up Kennedy Airport and swaths of Queens by attacking fuel tanks and an underground pipeline by igniting a catastrophic explosion that would eclipse 9/11. According to the report, one of the suspects boasted to a federal informant that “he had a vision that would make the World Trade Center attack seem small“. Roughly six weeks later on July 13, 2007, it was reported that a Pennsylvania man, Michael C. Reynolds, was convicted of providing material support to terrorists in trying to help al-Qaida blow up U.S. oil pipelines and refineries.

4.2: TSA Pipeline Threat Assessment (2008)
An October 23, 2008, report from the Transportation Security Administration Office of Intelligence and the U.S. Department of Homeland Security entitled “TSA Pipeline Threat Assessment” stated that “Improvised explosive devices have been the preferred method of attack against gas and oil facilities worldwide” and that “the U.S. system and its related infrastructure remain an attractive target to both terrorists and domestic extremists alike, as long stretches of open unattended pipeline are difficult to protect and the economic impact of attacks would be significant…Al-Qa’ida, in particular, has noted the potentially damaging impact pipeline attacks—both in the United States and abroad—would have on the Homeland’s economy, national security, and public health and psychology. Al-Qa’ida’s demonstrated capability and intent to target oil and gas infrastructure overseas, and the group’s desire to continue attacks in the Homeland, suggest similar attacks could occur inside the United States.

4.3: TSA Liquid and Natural Gas Pipeline Threat Assessment (2011)
A January 18, 2011, report from the TSA Office of Intelligence Pipeline Modal Threat Assessment and the U.S. Department of Homeland Security entitled “TSA Liquid and Natural Gas Pipeline Threat Assessment 2011” stated that “There were 44 suspicious pipelines, and related oil and natural gas SARs reported to TSA-OI from January 2010 to October 2010.21 Suspicious activities near pipelines and related infrastructure may indicate an interest to collect information for a future attack, or the desire to identify vulnerabilities or test a pipeline facility’s security and response operations”. The report further states that “Terrorist groups have discussed attacks on unspecified SCADA systems, but it is uncertain whether al-Qa’ida or any other group has the capability to conduct a successful cyber-attack.19 TSA-OI is not aware of any credible, specific threat reporting targeting U.S. pipelines’ industry control systems or the supervisory control and data acquisition networks.

5. U.S: MASS TRANSIT ATTACK
:

can

5.1: Mass Transit Cyber-Attack
Since Thanksgiving weekend is the busiest travel time of the year, U.S. airports, bus stations and train station terminals will be packed with people, a very lucrative state-sponsored terror target. The notion of airport-related cyber terror was witnessed back on November 9, 2012, when 17 flights were diverted from Manila’s international airport due to an alleged air traffic equipment “glitch”. What role these 64 planes were slated to play in the wake of a cyber-terror attack is unknown, but they were likely remotely “programmed” to lose all power at a future date. Since the TSA has now expanded their duties beyond airport security to train terminals, there is even a greater chance that Amtrak trains will be targeted by the Obama administration in the near future. Back on December 29, 2011, it was reported that Professor Stefan Katzenbeisser of Technische Universität Darmstadt had told a security conference in Berlin that new train systems are vulnerable to hackers and “Denial of Service”. Future cyber-terror attacks could rhetorically target train switching systems, which enable trains to be guided from one track to another at a railway junction. Although these switching systems have historically been separate from the online world, this is no longer the case.  The Israeli cyber-terror worm entitled the “Duqu virus”, has already wreaked havoc worldwide and could be used to target trains in the U.S. and Europe. Based on recent and inexplicable train crashes, this virus may already be attacking trains worldwide. Acting as a Trojan horse, the Duqu virus has the ability to essentially hijack its victim and then allow for the remote control of whatever entity is hijacked. If the Duqu virus hijacked a train, it could theoretically control train acceleration, braking and track switching.

6. SPACE STATION ATTACK:

6.1: Space Station Cyber-Attack
Back on March 1, 2012, it was reported that the laptop which was stolen from NASA last year was unencrypted and contained command and control codes for the International Space Station (ISS) on it. The laptop in question was one of 48 NASA notebooks or mobile devices stolen between April 2009 and April 2011. Needless to say, one or more of these stolen laptops could be used to crash the ISS. In an ominous sign that space-related cyber-terror is imminent, it was reported on November 12, 2013, that the Israeli made Stuxnet virus has now infected the ISS. In order to bring unprecedented media attention to ISS just prior to an attack, it was reported on November 12, 2014, that the International Space Station allegedly dodged Chinese space junk, a laughable notion to be sure. Nevertheless, roughly 2-weeks later on November 24, 2014, it was reported that a new crew arrived at International Space Station. In the event that the ISS is hacked, it will predictably fall from orbit onto a major city, most likely within the United States.

7. RETAIL CYBER-ATTACK:

960-fccb3cdc9acc14a6e70a12f74560c026-cyber-hacking-is-your-money-safe

7.1: Retail Cyber-Attack
Based on the 2013 Back Friday Attack, an attack on Black Friday in 2014 is all but expected. In yet another example of how state-sponsored terror drills always precede real-life terror events, back on November 27, 2013, Truther.org published a report entitled, “Black Friday-Cyber Monday 2013 (SSTTA): NATO Executing “Largest Ever” Cyber-Terror Drill on Black Friday—Attack Imminent”. As revealed in the report, NATO was executing their largest cyber-terror drill ever and therefore the likelihood of state-sponsored cyber terror was extremely high. Predictably, it was later revealed that a major cyber-attack did in fact take place on “Black Friday” and that up to 40 million Target shoppers had their credit card information compromised. According to Brian Krebs, a journalist who specializes in computer security, the Target computer breach occurred on or around Black Friday, the busiest shopping day of the year. Needless to say, another attack on U.S. retailers this Black Friday is expected.

8. GOOGLE CYBER-ATTACK:

8.1: Google Cyber-Attack
Back on June 26, 2014, Truther.org published a report entitled “CIA Likely Planning “Anonymous” Cyber-Terror Attacks on June 27-28, 2014” which listed Google’s corporate headquarters (i.e., Googleplex) in Mountain View, California as one of three primary targets. Low and behold, less than 24-hours later on June 27, 2014, it was reported that 4 people were found dead in Turlock, California home, less than 100 miles away from Googleplex in Mountain View. Evidently, once the cyber-terror attack was exposed, the would-be terrorists (i.e., Special Forces, Blackwater, Mossad, etc.) where subsequently executed.

8.2: Moffett Airfield Attack
Back on November 11, 2014, it was reported that Google has now taken control of Moffett Airfield in California from NASA. Therefore, an explosive attack on Google computer equipment inside the airport buildings may be used to sell the notion of a real-life cyber-attack. In other words, if and when a cyber-terror attack is executed, Google’s real-world facilities will suffer a real-world attack, selling the notion that a real cyber-attack was executed. This particular angle was attempted once before with the Google barges. In order to sell the notion of a Google attack to the public, Google previously placed “secret” barges off the shore of the U.S. in at least 4 locations (e.g., San Francisco, California; Portland, Maine; New London, Connecticut; and a second barge in San Francisco, California). In order to bring unprecedented attention to the Google Barges prior to their slated during a cyber-terror attack, the U.S. Coast Guard reportedly visited the two San Francisco Google Barges on November 2, 2013. In order to answer the question posed by the Boston Globe as to why Google went to sea, the simple answer is that it’s all part of an elaborate state-sponsored cyber-terror plot. Although the Google Barges were never attacked, their sheer existence confirmed that Google is indeed a target.

9. HOOVER DAM CYBER-ATTACK:

9.1: Hoover Dam Attack
The Hoover Dam is a concrete arch-gravity dam in the Black Canyon of the Colorado River, on the border between the U.S. states of Arizona and Nevada. Back on January 15, 2013, it was reported that the federal Occupational Safety and Health Administration (OSHA) had found 58 violations at Nevada’s Hoover Dam, the hydroelectric power plant east of Las Vegas. According to the report, OSHA found numerous superficial violations but stated that “none of the violations jeopardized the safety of the public or threatened the structural integrity of the dam or its operations”. Therefore, if and when the 79-year old year Hoover Dam is hit by a state-sponsored cyber-attack, it will likely “crack” (with a little help from demolition explosives) resulting in a massive local tidal wave and an electrical power blackout blanketing California, Arizona and Nevada. With no power, no airport, no gambling, no air conditioning, no sewage system and no way out, tourists and locals alike would begin looting as riots and mayhem would breakout almost instantaneously.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Basel, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

960-fccb3cdc9acc14a6e70a12f74560c026-cyber-hacking-is-your-money-safe

Download & Forward PDF

David Chase Taylor
November 21, 2014
Truther.org

SWITZERLAND, Basel — Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA) will premeditatively crash the U.S. stock market along with the U.S. dollar via a staged “cyber-attack” or “hack”, most likely prior to Thanksgiving, November 27, 2014. Needless to say, the attacks will bankrupt the U.S. economy.

The impending attacks will predictably be scapegoated onto the state-sponsored cyber-terror group known as Anonymous who will strike at the heart of America’s financial system, namely the Federal Reserve Bank (FED), the New York Stock Exchange (NYSE) and/or the U.S. Securities and Exchange Commission (SEC).

In what appears to be pre-financial cyber-attack foreshadowing, “Doomsday” Jesuit Pope Francis warned on November 20, 2014, that man’s greed will destroy the world. In the wake of an attack which bankrupts the U.S. economy, the Pope will look like a prophet.

Interestingly, it was reported on November 4, 2014, that a cyber-attack on a federal security contractor wasn’t noticed for months. Therefore, if the FED, NYSE or SEC is hacked on November 15-16, 2014, it won’t be noticed days or even weeks. This in essence allows the CIA to stage a financial-related attack whenever they want without any forewarning.

Six days later on November 10, 2014, it was reported that federal firewalls are struggling against the increasing number of cyber-attacks. The timely report was designed to give the U.S. government plausible deniability in the wake of a financial-related terror attacks that bankrupt the U.S. economy.

Also on November 10, 2014, the U.S, Postal Service was reportedly hacked, resulting in employee and customer information being compromised. Needless to say, the incident was designed to set the precedent for a far worse cyber-attack on the U.S. federal government, most likely the FED or SEC.

In order to highlight both the Federal Reserve and anti-Federal Reserve activists just prior to a financial-related cyber-attack on the FED, it was reported on November 15, 2014, that FED Chief Janet Yellen met with “activists” seeking FED reforms. The publicity stunt was likely the first time in history that a banker sat down with activists seeking political change.

In what appears to be pre-NYSE cyber-terror programming, it was reported on November 18, 2014, that a new cybersecurity ETF whose ticker is entitled “HACK” gives investors “a fresh way to profit from the need to protect U.S. businesses from cyber-attacks and data breaches”.

Lastly, on November 20, 2014, it was reported that hackers accessed 500 UK webcams and thousands of other worldwide. The timely attacks were designed to show that hackers have global reach and what was once thought of secure is now vulnerable to attack.

gaelx_-_anonymous

Anonymous Stock Market Attack
In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely an alleged member of Anonymous.

Bank Terror Drills
In what appears to be cover drills for the controlled demolition of the U.S. economy, it was reported on October 10, 2014, that the U.S. and the UK will execute a “big bank collapse” simulation. According to reports, officials will “get together in a war room next week to see if they can cope with any possible fall-out when the next big bank topples over”. The banking collapse drill will reportedly involve Federal Reserve Chair Janet Yellen and Bank of England Governor Mark Carney, and be hosted by the U.S. Federal Deposit Insurance Corporation (FDIC). The drill will involve the hypothetical failure of U.S. banks, most likely the Federal Reserve. Needless to say, key term such as “collapse” and “topples over” are designed to foreshadow that a controlled demolition of the U.S. economy is indeed planned. Roughly 2-weeks late on October 26, 2014, it was reported that four in five Eurozone banks pass European Central Bank health test. Interestedly, the very next day, October 27, 2014, it was reported that 25 European Union banks failed a “stress test” exposing a $31billion shortfall. The bi-polar reporting was evidently designed to insinuate that banks are on the verge stressed to the point of collapse.

DHS Banking Continuity
In the wake of a major U.S. bank or stock market, a global financial panic in respect to the U.S. dollar will likely ensure. According to a December 10, 2004, CRS Report for Congress entitled “Homeland Security: Banking and Financial: Infrastructure Continuity”, bank terror and financial collapse have been planned for accordingly. According to the report, “H.R. 2043 sought to address bank risks under terrorism” and the Terrorism Risk Insurance Act of 2002 (TRIA) “provides a federal backstop for insurers willing to provide terrorism insurance”, ultimately protecting insurance banks against “catastrophic payouts in case of terrorist attacks”.  In other words, if and when a bank related terror attacks occur resulting in financial panic, private banks will not have to foot the bill for their losses because the U.S. government has assumed all the risk and liability. This convenient set-up essentially guarantees that the U.S. government, not the banks, will go bankrupt in the aftermath of bank related terror attacks.

The “Contagion Effect”
In the aftermath of U.S. bank failures (a bi-product of an irreversible U.S. stock market crash), other banks will begin to panic, setting off a chain reaction of banking collapses around the world. The aforementioned CRS Report for Congress found that when one bank goes, the rest will follow:  “Financial institutions face two categories of emergencies that could impair their functioning. The first is directly financial: danger of a sudden drop in the value of financial assets, whether originating domestically or elsewhere in the world, such that a global financial crisis might follow. The second is operational: failure of physical support structures that underlie the financial system. Either could disrupt the nation’s ability to supply goods and services and alter the behavior of individuals in fear of the disruption (or fear of greater disruption). They could reduce the pace of economic activity, or at an extreme, cause an actual contraction of economic activity”. The report went on to state that “Collapse of one prominent entity could evoke a contagion effect, in which sound financial institutions become viewed as weak — today’s equivalents of a bank run, in which panicked customers withdraw funds from many entities, causing others to fail as well”.

CYBER TERROR:

Ukraine’s-Election-Commission-Denies-Cyber-Attack

Cyber-Attack
Although an unprecedented cyber-terror attack on the U.S. economy could be blamed on China, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack, funneling the stolen money into allegedly untraceable Bitcoin accounts. Coincidentally, on October 2, 2014, it was revealed that an FBI informant admittedly organized Anonymous attacks on government websites in 30 countries, further confirming that the group known as Anonymous is in fact state-sponsored. The timely report was designed to set the precedent for an Anonymous attack on government-related websites such as the FED, NYSE, SEC, etc. An Anonymous-based cyber-attack will enable the progenitors of terror (i.e., the CIA) to steal billions if not trillions of dollars from the U.S. economy without a trace. Should a sovereign country be deemed responsible for the heist, defrauded investors worldwide would collectively demand compensation from that particular country, something the CIA does not want to deal with. In order to provide a timely motive for an Anonymous and/or Bitcoin-related cyber-attack on the U.S. financial system, it was reported on October 5, 2014, that the price of Bitcoin has fallen drastically. In the wake of an attack on the U.S. economy, it will likely be said that the greed of Bitcoin users was the motivating factor in the attack. In what appears to be pre-Wall Street cyber-attack logistics, it was revealed back on July 8, 2014, that Wall Street has now hired a former NSA chief to help create a “cyber war council”. Translation: Wall Street and the NSA are teaming up together to execute a Wall Street cyber-hijack which will likely disappear trillions of dollars, bankrupting the U.S. economy. In the wake of the attack, the NSA chief will likely be scapegoated for the attack.

Cyber-Attacks Trending
Starting with the unprecedented hack of Jennifer Lawrence and other Hollywood celebrities’ nude photos on September 3, 2014, the world has suffered a wave of state-sponsored attacks that have set the scene for a massive financial-related attack on America’s economy. A week later on September 10, 2014, 5 million Gmail usernames and passwords were allegedly stolen. Another week later on September 17, 2014, the biggest ever cyber-attack on Russia Today’s website allegedly took place. Less than 24-hours later on September 18, 2014, it was reported that the Home Depot hack exposed 56M cards to financial risk, further highlighting financial-related hacks. That same day, September 18, 2014, it was also reported that the Chinese hacked U.S. military contractors and a Senate panel. Nine days later on September 27, 2014, more photos of Jennifer Lawrence and other nude celebrity were leaked online, raising the notion of hacking to a crescendo. Lastly, a day later on September 28, 2014, Instagram was reported down in China, possibly due to a cyber-attack.

Financial Cyber-Attacks Trending
A preview of financial related cyber-terror recently occurred on July 10, 2014, when it was reported that Norwegian banks suffered the largest-ever DDoS attack in their history, an act which the state-sponsored terror group known as Anonymous predictably took credit for. Because all 206 countries are under the command and control of the CIA, events tend to happen in other countries before transpire in America on a much larger scale. Roughly 2-weeks later on July 25, 2014, the European Central Bank was allegedly hacked and personal data stolen. Roughly a month later on August 27, 2014, it was revealed that the FBI is now investigating a cyber-attack on JPMorgan. Roughly 3-weeks later on September 17, 2014, members from Anonymous and an Occupy Wall Street group reportedly abolishes nearly $4 million in student loan debt on September 17, 2014, foreshadowing the notion of Anonymous vanishing millions into thin air. Roughly 3-weeks alter on October 3, 2014, the New York Times published a report entitled “Hackers’ Attack Cracked 10 Financial Firms in Major Assault”, further foreshadowing financial-related cyber-terror. Also on October 3, 2014, it was reported that the JP Morgan data breach affected 76 million households, a laughable notion considering that the population of the U.S. is only 300 million people. A few weeks later on October 20, 2014, U.S. officials warned 500 million financial records may have been hacked. The timely propaganda report was evidently published in order to show that financial-related cyber-terror is imminent just prior to an unprecedented attack on the U.S. financial system. Taken collectively, these timely reports have set the precedent for future bank-related cyber-terror attacks, most likely targeting the FED, NYSE, or SEC.

NYSE Cyber-Attack
The latest New York Stock Exchange (NYSE) cyber-terror plot appears to be a redux of two previously foiled terror plots as depicted in the March 20, 2014 Truther.org report entitled “Impending Wall Street Banking Cyber-Heist to Transfer Billions to Bitcoin”, and the April 15, 2014 Truther.org report entitled “Feds Planning High Frequency Trading Cyber-Attack via “Heartbleed” Bug”. In short, hackers will cause a “High Frequency Trading” sell-off (which they will short-sell), the profits of which will be deposited in untraceable Bitcoin accounts. In order to provide a motive for a Bitcoin-related cyber-terror attack, the IRS declared that Bitcoin was not an official currency on March 25, 2014. Roughly 3-months later on June 13, 2014, it was revealed that the FBI will auction off seized Bitcoins worth $18m on June 27, 2014, the impending date of the attack. In order to raise the profile of banks prior to a debilitating cyber-terror attack that will likely bankrupt millions of investors, Vice President Joe Biden stated on June 23, 2014 that “I don’t have a savings account”. Two days later on June 25, 2014, the U.S. Federal Reserve warned that banks face “tougher tests” ahead, an ominous sign that a so-called “test” (i.e., attack) is imminent. Although impossible to prove, it appears that Bitcoin was specifically created to be an untraceable depository for stolen funds from a Wall Street cyber-attack. In other words, the hackers play the role of Robin Hood by stealing from the rich (i.e., Wall Street) and giving to the poor (i.e., Bitcoin)—the only catch being that Robin Hood is invisible

“Quantum Dawn II″ Terror Drill
Prior to a major cyber-terror attack on the New York Stock Exchange (NYSE), one would expect there to be some stock-market related terror drills to prepare Wall Street insiders for the attack. Coincidentally, on June 13th, 2013, it was reported that Wall Street executed “Quantum Dawn 2”, a cyber-terror war-game apparently meant to give insiders an opportunity to make financial moves before the market crashes—for good. According to the report, Cyber Strategies oversaw a terror exercise which included Citigroup, Bank of America, the Department of Homeland Security, the Treasury Department, the Federal Reserve, the Securities and Exchange Commission, as well as 40 other firms. The drill, which featured a hacker, possibly from China, operating from a fake trading platform, prompted a response in which the participants facilitated a conference call to “figure out what was going on”. In other words, the drill simulated a real-life scenario in which insider firms received the “heads up” about an impending cyber-attack and subsequently shared this information accordingly so that their bank accounts and those of their clients would not be affected. The same sort of thing occurred just prior to 9/11 when “put options” or bets were taken out on United Airlines and American Airlines, the two airline companies involved in the attacks. According to the “9/11 Commission Report”, “some unusual trading did in fact occur”, however, it claimed that, “each such trade proved to have an innocuous explanation”.

“Quantum Dawn II” Fallout
In the October 23, 2013, Fox Business report entitled “‘White Hat’ Hackers Expose Flaws of U.S. Stock Market”, the details of the “Quantum Dawn 2”  cyber-attack exercise were revealed. According to the report, ethical “white hat” hackers intentionally “looking to expose the cyber vulnerabilities of U.S. equity markets”, were able to directly impact market performance by “forcing a mock market close”. According to the report, more than 50 entities and 500 people in the financial services sector participated in the cyber-attack which was executed by the Securities Industry and Financial Markets Association (SIFMA) on July 18, 2013. So called “ethical hackers” were told to give everything they had to try and cripple the U.S. stock market during the 6-hour exercise. “Quantum Dawn 2 demonstrated the industry’s resiliency when faced with serious cyber-attacks that aimed to steal money, crash systems and disrupt equity market trading,” SIFMA CEO Judd Gregg stated. According to Cedric Leighton, a former U.S. intelligence officer, “The more realistic the exercise the better prepared they’ll be if and when attacks from a cyber standpoint occur”.

FLASHBACK: “Black Friday” Cyber-Attack
In yet another example of how state-sponsored terror drills always precede real-life terror events, on November 27, 2013, Truther.org published a report entitled, “Black Friday-Cyber Monday 2013 (SSTTA): NATO Executing “Largest Ever” Cyber-Terror Drill on Black Friday—Attack Imminent”. As revealed in the report, NATO was executing their largest cyber-terror drill ever and therefore the likelihood of state-sponsored cyber terror was extremely high. Predictably, it was later revealed that a major cyber-attack did in fact take place on “Black Friday” and that up to 40 million Target shoppers had their credit card information compromised. According to Brian Krebs, a journalist who specializes in computer security, the Target computer breach occurred on or around Black Friday, the busiest shopping day of the year. Evidently, the “Black Friday” cyber-attack was executed in order to set the precedent for greater acts of bank-related state-sponsored cyber-terror, namely an attack on U.S. stock markets and banks.

FLASHBACK: Googleplex Attack

Back on June 26, 2014, Truther.org published a report entitled “CIA Likely Planning “Anonymous” Cyber-Terror Attacks on June 27-28, 2014” which listed Google’s corporate headquarters (i.e., Googleplex) in Mountain View, California as one of three primary targets. Low and behold, less than 24-hours later on June 27, 2014, it was reported that 4 people were found dead in Turlock, California home, less than 100 miles away from Googleplex in Mountain View. Evidently, once the cyber-terror attack was exposed, the would-be terrorists (i.e., Special Forces, Blackwater, Mossad, etc.) where subsequently executed.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Basel, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax,” and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

gaelx_-_anonymous

Download & Forward PDF

David Chase Taylor
November 15, 2014
Truther.org

SWITZERLAND, Basel — Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA) will attempt to stage a wave of cyber-related terror attacks during a state-sponsored “hackathon” on November 15-16, 2014. The impending attacks will predictably be scapegoated onto the state-sponsored cyber-terror group known as Anonymous.

According to reports, so-called internet hacktivists are holding a global “hackathon” in honor of the later Aaron Swartz’s birthday. Considering that hacking is illegal, the provocative event will be allowed to commence on November 15-16, 2014, showing, albeit in a de facto manner, that it is in fact state-sponsored in nature.

While the impending Anonymous cyber-attacks could theoretically target airports, retailers or various factions within the intelligence and military communities (e.g., CIA, MI5, NASA, NSA, etc.), they will likely strike the heart of America’s financial system, namely the New York Stock Exchange (NYSE) and/or the Federal Reserve Bank (FED).

Interestingly, it was reported on November 4, 2014, that a cyber-attack on a federal security contractor wasn’t noticed for months. Therefore, if the FED, NYSE or SEC is hacked on November 15-16, 2014, it won’t be noticed days or even weeks. This in essence allows the CIA to stage a financial-related attack whenever they want without any forewarning.

Six days later on November 10, 2014, it was reported that federal firewalls are struggling against the increasing number of cyber-attacks. The timely report was designed to give the U.S. government plausible deniability in the wake of a financial-related terror attacks that bankrupt the U.S. economy.

Also on November 10, 2014, the U.S, Postal Service was reportedly hacked, resulting in employee and customer information being compromised. Needless to say, the incident was designed to set the precedent for a far worse cyber-attack on the U.S. federal government, most likely the FED or SEC.

Considering that it was reported on November 11, 2014, that Google has now taken control of Moffett Airfield in California from NASA, an explosive attack on computer equipment inside the airport buildings may be used to sell the notion of a real-life cyber-attack. This particular angle was attempted once before with the Google barges.

In order to highlight both the Federal Reserve and anti-Federal Reserve activists just prior to a financial-related cyber-attack on the FED, it was reported on November 15, 2014, that FED Chief Janet Yellen met with “activists” seeking FED reforms. The publicity stunt was likely the first time in history that a banker sat down with activists seeking political change.

Anonymous Stock Market Attack
In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely an alleged member of Anonymous.

stock-crash

Bank Terror Drills
In what appears to be cover drills for the controlled demolition of the U.S. economy, it was reported on October 10, 2014, that the U.S. and the UK will execute a “big bank collapse” simulation. According to reports, officials will “get together in a war room next week to see if they can cope with any possible fall-out when the next big bank topples over”. The banking collapse drill will reportedly involve Federal Reserve Chair Janet Yellen and Bank of England Governor Mark Carney, and be hosted by the U.S. Federal Deposit Insurance Corporation (FDIC). The drill will involve the hypothetical failure of U.S. banks, most likely the Federal Reserve. Needless to say, key term such as “collapse” and “topples over” are designed to foreshadow that a controlled demolition of the U.S. economy is indeed planned. Roughly 2-weeks late on October 26, 2014, it was reported that four in five Eurozone banks pass European Central Bank health test. Interestedly, the very next day, October 27, 2014, it was reported that 25 European Union banks failed a “stress test” exposing a $31billion shortfall. The bi-polar reporting was evidently designed to insinuate that banks are on the verge stressed to the point of collapse.

DHS Banking Continuity
In the wake of a major U.S. bank or stock market, a global financial panic in respect to the U.S. dollar will likely ensure. According to a December 10, 2004, CRS Report for Congress entitled “Homeland Security: Banking and Financial: Infrastructure Continuity”, bank terror and financial collapse have been planned for accordingly. According to the report, “H.R. 2043 sought to address bank risks under terrorism” and the Terrorism Risk Insurance Act of 2002 (TRIA) “provides a federal backstop for insurers willing to provide terrorism insurance”, ultimately protecting insurance banks against “catastrophic payouts in case of terrorist attacks”.  In other words, if and when a bank related terror attacks occur resulting in financial panic, private banks will not have to foot the bill for their losses because the U.S. government has assumed all the risk and liability. This convenient set-up essentially guarantees that the U.S. government, not the banks, will go bankrupt in the aftermath of bank related terror attacks.

The “Contagion Effect”
In the aftermath of U.S. bank failures (a bi-product of an irreversible U.S. stock market crash), other banks will begin to panic, setting off a chain reaction of banking collapses around the world. The aforementioned CRS Report for Congress found that when one bank goes, the rest will follow:  “Financial institutions face two categories of emergencies that could impair their functioning. The first is directly financial: danger of a sudden drop in the value of financial assets, whether originating domestically or elsewhere in the world, such that a global financial crisis might follow. The second is operational: failure of physical support structures that underlie the financial system. Either could disrupt the nation’s ability to supply goods and services and alter the behavior of individuals in fear of the disruption (or fear of greater disruption). They could reduce the pace of economic activity, or at an extreme, cause an actual contraction of economic activity”. The report went on to state that “Collapse of one prominent entity could evoke a contagion effect, in which sound financial institutions become viewed as weak — today’s equivalents of a bank run, in which panicked customers withdraw funds from many entities, causing others to fail as well”.

Cyber Attack

CYBER TERROR:

Cyber-Attack
Although an unprecedented cyber-terror attack on the U.S. economy could be blamed on China, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack, funneling the stolen money into allegedly untraceable Bitcoin accounts. Coincidentally, on October 2, 2014, it was revealed that an FBI informant admittedly organized Anonymous attacks on government websites in 30 countries, further confirming that the group known as Anonymous is in fact state-sponsored. The timely report was designed to set the precedent for an Anonymous attack on government-related websites such as the FED, NYSE, SEC, etc. An Anonymous-based cyber-attack will enable the progenitors of terror (i.e., the CIA) to steal billions if not trillions of dollars from the U.S. economy without a trace. Should a sovereign country be deemed responsible for the heist, defrauded investors worldwide would collectively demand compensation from that particular country, something the CIA does not want to deal with. In order to provide a timely motive for an Anonymous and/or Bitcoin-related cyber-attack on the U.S. financial system, it was reported on October 5, 2014, that the price of Bitcoin has fallen drastically. In the wake of an attack on the U.S. economy, it will likely be said that the greed of Bitcoin users was the motivating factor in the attack. In what appears to be pre-Wall Street cyber-attack logistics, it was revealed back on July 8, 2014, that Wall Street has now hired a former NSA chief to help create a “cyber war council”. Translation: Wall Street and the NSA are teaming up together to execute a Wall Street cyber-hijack which will likely disappear trillions of dollars, bankrupting the U.S. economy. In the wake of the attack, the NSA chief will likely be scapegoated for the attack.

Cyber-Attacks Trending
Starting with the unprecedented hack of Jennifer Lawrence and other Hollywood celebrities’ nude photos on September 3, 2014, the world has suffered a wave of state-sponsored attacks that have set the scene for a massive financial-related attack on America’s economy. A week later on September 10, 2014, 5 million Gmail usernames and passwords were allegedly stolen. Another week later on September 17, 2014, the biggest ever cyber-attack on Russia Today’s website allegedly took place. Less than 24-hours later on September 18, 2014, it was reported that the Home Depot hack exposed 56M cards to financial risk, further highlighting financial-related hacks. That same day, September 18, 2014, it was also reported that the Chinese hacked U.S. military contractors and a Senate panel. Nine days later on September 27, 2014, more photos of Jennifer Lawrence and other nude celebrity were leaked online, raising the notion of hacking to a crescendo. Lastly, a day later on September 28, 2014, Instagram was reported down in China, possibly due to a cyber-attack.

Financial Cyber-Attacks Trending
A preview of financial related cyber-terror recently occurred on July 10, 2014, when it was reported that Norwegian banks suffered the largest-ever DDoS attack in their history, an act which the state-sponsored terror group known as Anonymous predictably took credit for. Because all 206 countries are under the command and control of the CIA, events tend to happen in other countries before transpire in America on a much larger scale. Roughly 2-weeks later on July 25, 2014, the European Central Bank was allegedly hacked and personal data stolen. Roughly a month later on August 27, 2014, it was revealed that the FBI is now investigating a cyber-attack on JPMorgan. Roughly 3-weeks later on September 17, 2014, members from Anonymous and an Occupy Wall Street group reportedly abolishes nearly $4 million in student loan debt on September 17, 2014, foreshadowing the notion of Anonymous vanishing millions into thin air. Roughly 3-weeks alter on October 3, 2014, the New York Times published a report entitled “Hackers’ Attack Cracked 10 Financial Firms in Major Assault”, further foreshadowing financial-related cyber-terror. Also on October 3, 2014, it was reported that the JP Morgan data breach affected 76 million households, a laughable notion considering that the population of the U.S. is only 300 million people. A few weeks later on October 20, 2014, U.S. officials warned 500 million financial records may have been hacked. The timely propaganda report was evidently published in order to show that financial-related cyber-terror is imminent just prior to an unprecedented attack on the U.S. financial system. Taken collectively, these timely reports have set the precedent for future bank-related cyber-terror attacks, most likely targeting the FED, NYSE, or SEC.

NYSE

NYSE Cyber-Attack
The latest New York Stock Exchange (NYSE) cyber-terror plot appears to be a redux of two previously foiled terror plots as depicted in the March 20, 2014 Truther.org report entitled “Impending Wall Street Banking Cyber-Heist to Transfer Billions to Bitcoin”, and the April 15, 2014 Truther.org report entitled “Feds Planning High Frequency Trading Cyber-Attack via “Heartbleed” Bug”. In short, hackers will cause a “High Frequency Trading” sell-off (which they will short-sell), the profits of which will be deposited in untraceable Bitcoin accounts. In order to provide a motive for a Bitcoin-related cyber-terror attack, the IRS declared that Bitcoin was not an official currency on March 25, 2014. Roughly 3-months later on June 13, 2014, it was revealed that the FBI will auction off seized Bitcoins worth $18m on June 27, 2014, the impending date of the attack. In order to raise the profile of banks prior to a debilitating cyber-terror attack that will likely bankrupt millions of investors, Vice President Joe Biden stated on June 23, 2014 that “I don’t have a savings account”. Two days later on June 25, 2014, the U.S. Federal Reserve warned that banks face “tougher tests” ahead, an ominous sign that a so-called “test” (i.e., attack) is imminent. Although impossible to prove, it appears that Bitcoin was specifically created to be an untraceable depository for stolen funds from a Wall Street cyber-attack. In other words, the hackers play the role of Robin Hood by stealing from the rich (i.e., Wall Street) and giving to the poor (i.e., Bitcoin)—the only catch being that Robin Hood is invisible

Anonymous Stock Market Warning
In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely a teenager.

“Quantum Dawn II″ Terror Drill
Prior to a major cyber-terror attack on the New York Stock Exchange (NYSE), one would expect there to be some stock-market related terror drills to prepare Wall Street insiders for the attack. Coincidentally, on June 13th, 2013, it was reported that Wall Street executed “Quantum Dawn 2”, a cyber-terror war-game apparently meant to give insiders an opportunity to make financial moves before the market crashes—for good. According to the report, Cyber Strategies oversaw a terror exercise which included Citigroup, Bank of America, the Department of Homeland Security, the Treasury Department, the Federal Reserve, the Securities and Exchange Commission, as well as 40 other firms. The drill, which featured a hacker, possibly from China, operating from a fake trading platform, prompted a response in which the participants facilitated a conference call to “figure out what was going on”. In other words, the drill simulated a real-life scenario in which insider firms received the “heads up” about an impending cyber-attack and subsequently shared this information accordingly so that their bank accounts and those of their clients would not be affected. The same sort of thing occurred just prior to 9/11 when “put options” or bets were taken out on United Airlines and American Airlines, the two airline companies involved in the attacks. According to the “9/11 Commission Report”, “some unusual trading did in fact occur”, however, it claimed that, “each such trade proved to have an innocuous explanation”.

“Quantum Dawn II” Fallout
In the October 23, 2013, Fox Business report entitled “‘White Hat’ Hackers Expose Flaws of U.S. Stock Market”, the details of the “Quantum Dawn 2”  cyber-attack exercise were revealed. According to the report, ethical “white hat” hackers intentionally “looking to expose the cyber vulnerabilities of U.S. equity markets”, were able to directly impact market performance by “forcing a mock market close”. According to the report, more than 50 entities and 500 people in the financial services sector participated in the cyber-attack which was executed by the Securities Industry and Financial Markets Association (SIFMA) on July 18, 2013. So called “ethical hackers” were told to give everything they had to try and cripple the U.S. stock market during the 6-hour exercise. “Quantum Dawn 2 demonstrated the industry’s resiliency when faced with serious cyber-attacks that aimed to steal money, crash systems and disrupt equity market trading,” SIFMA CEO Judd Gregg stated. According to Cedric Leighton, a former U.S. intelligence officer, “The more realistic the exercise the better prepared they’ll be if and when attacks from a cyber standpoint occur”.

FLASHBACK:

FLASHBACK: “Black Friday” Cyber-Attack
In yet another example of how state-sponsored terror drills always precede real-life terror events, on November 27, 2013, Truther.org published a report entitled, “Black Friday-Cyber Monday 2013 (SSTTA): NATO Executing “Largest Ever” Cyber-Terror Drill on Black Friday—Attack Imminent”. As revealed in the report, NATO was executing their largest cyber-terror drill ever and therefore the likelihood of state-sponsored cyber terror was extremely high. Predictably, it was later revealed that a major cyber-attack did in fact take place on “Black Friday” and that up to 40 million Target shoppers had their credit card information compromised. According to Brian Krebs, a journalist who specializes in computer security, the Target computer breach occurred on or around Black Friday, the busiest shopping day of the year. Evidently, the “Black Friday” cyber-attack was executed in order to set the precedent for greater acts of bank-related state-sponsored cyber-terror, namely an attack on U.S. stock markets and banks.

FLASHBACK: Googleplex Attack

Back on June 26, 2014, Truther.org published a report entitled “CIA Likely Planning “Anonymous” Cyber-Terror Attacks on June 27-28, 2014” which listed Google’s corporate headquarters (i.e., Googleplex) in Mountain View, California as one of three primary targets. Low and behold, less than 24-hours later on June 27, 2014, it was reported that 4 people were found dead in Turlock, California home, less than 100 miles away from Googleplex in Mountain View. Evidently, once the cyber-terror attack was exposed, the would-be terrorists (i.e., Special Forces, Blackwater, Mossad, etc.) where subsequently executed.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Basel, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

UPDATE: As of November 8, 2014, my PC is once again able to receive the internet. Luckily, a good friend of mine was able to stop by and go into my PC and change the settings so that I could access the internet. Evidently, sometime on the night of November 5, 2014, a third-party gained access to my PC, changing the proxy server settings. Since I know nothing about computers, I was locked out and unable to access the internet for over 48-hours.

As of November 6, 2014, I have been blocked from accessing the internet on my PC here in Switzerland. I’ve had my computer for years and have never had a problem so these developments are highly suspicious. I currently have internet service but no way to access it. Evidently, my IP address is being censored. Consequebtly, I am writing this post from my iPhone and am therefore not able to post terror warnings in respect to Thursday’s NCAA and NFL football games or the U.S. stock market.

Your thoughts and prayers are needed.

Namaste.

David Chase Taylor

IMG_1699-0.JPG

Mask March

Download & Forward PDF

David Chase Taylor
November 5, 2014
Truther.org

SWITZERLAND, Basel — Based on breaking news and events, it appears that the CIA is planning a wave of cyber and terror-related attacks across the world on November 5, 2014, namely in the U.K. and the United States. The impending attacks will predictably be scapegoated onto the state-sponsored cyber-terror group known as Anonymous.

While the impending Anonymous cyber-attacks could theoretically target airports, retailers or various factions within the intelligence and military communities (e.g., CIA, MI5, NASA, NSA, etc.), they will likely strike U.S. utilities (e.g., electrical grid, nuclear facilities, etc.) via the Utah Data Center (see below), and/or the heart of America’s financial system, namely the New York Stock Exchange (NYSE) and/or the Federal Reserve Bank (FED).

In a YouTube video uploaded on October 30, 2014, it was revealed that on November 5, 2014, members of Anonymous will hold demonstrations in 150 countries around the world. Dubbed as the “Million Mask March”, the protests are currently slated to take place at over 481 locations, making it the largest collective protest in the history of the world. The event is curiously being sponsored by Russia Today, a red flag that attacks will be executed and aired “live” around the world.

Considering that “Remember, Remember, the Fifth of November” is the undeclared motto of the state-sponsored terror group Anonymous, their minions will be out in force on November 5, 2014, a perfect scapegoat to show the public in the wake of earth-changing cyber-attacks. In other words, when things begin to go haywire electronically speaking, CIA puppets like Obama will simply point to the millions of Anonymous supporters in the streets as the cause.

Anonymous Stock Market Attack
In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely an alleged member of Anonymous.

Anonymous Capital Attack
November 5th commemorates Guy Fawkes’ failed 1605 Gunpowder Plot to blow up the Houses of Parliament in London, England. The foiled terror attack was made popular by the “V for Vendetta” (2005) film (see trailer) which glorified the notion of vigilante terrorism, ultimately paving the way for the emergence of the state-sponsored terror group known as Anonymous who adopted the films credo and symbology. Therefore, a similar attack on the U.S. Capitol Building in Washington, D.C., and/or the Palace of Westminster (UK Parliament) in London is also theoretically possible.

Anonymous NSA Attack
An Anonymous cyber-attack, should it happen, will most likely target the NSA’s new Utah Data Center which will likely result in the collapse, malfunction and/or explosion of U.S.-related infrastructure on the west coast of America (e.g., the electoral grid, dams, oil, gas, nuclear, water and sewer facilities). Known as the “Utah Data Center“, the NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, was completed in September of 2013. The $1.5B data center is located at Camp Williams, Utah, just 25 miles (40 km) south of Salt Lake City.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Basel, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss