Archive for the ‘EMP Terror’ Category

Cyber

Download & Forward PDF

David Chase Taylor
June 26, 2014
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA) will attempt to execute a major state-sponsored cyber-terror attack on Friday, June 27, 2014. The attack will likely target both cyber-related and real world entities, simultaneously.

Although state-sponsored terror plots are always subject to change, it appears thatGoogle’s corporate headquarters (i.e., Googleplex) in California, the New York Stock Exchange (NYSE), and possibly NASA’s upcoming rocket launch in Virginia could all be targeted in the attack. The attack on Google would be physical, the attack on the NYSE would be digital, and the NASA attack could result in an EMP-like attack.

Although the cyber-attack could be blamed on China, Iran, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack. This will enable the progenitors of the attack (i.e., the CIA) to steal millions if not billions of dollars without a trace. Should a country be deemed responsible, the millions of defrauded investors would demand an attack, possible invasion and of course compensation.

In what appears to be blatant June 27, 2014, cyber-terror attack propaganda, a CIA-spawned film about the allegedly deceased Zionist operative Aaron Swartz entitled “The Internet’s Own Boy” (2014) will debut in theaters on Friday, June 27, 2014 (see trailer). In the aftermath of a shocking and unprecedented cyber-terror attack, hackers avenging the death of Swartz will predictably be scapegoated for the attack. In other words, the film has provided a timey motive for a wave of revenge-based cyber-attacks.

aaron_swartz-790x519

NYSE Cyber-Attack

The latest New York Stock Exchange (NYSE) cyber-terror plot appears to be a redux of two previously foiled terror plots as depicted in the March 20, 2014 Truther.org report entitled “Impending Wall Street Banking Cyber-Heist to Transfer Billions to Bitcoin”, and the April 15, 2014 Truther.org report entitled “Feds Planning High Frequency Trading Cyber-Attack via “Heartbleed” Bug”. In short, hackers will cause a “High Frequency Trading” sell-off (which they will short-sell), the profits of which will be deposited in untraceable Bitcoin accounts. In order to provide a motive for a Bitcoin-related cyber-terror attack, the IRS declared that Bitcoin was not an official currency on March 25, 2014. Roughly 3-months later on June 13, 2014, it was revealed that the FBI will auction off seized Bitcoins worth $18m on June 27, 2014, the impending date of the attack. In order to raise the profile of banks prior to a debilitating cyber-terror attack that will likely bankrupt millions of investors, Vice President Joe Biden stated on June 23, 2014 that “I don’t have a savings account”. Two days later on June 25, 2014, the U.S. Federal Reserve warned that banks face “tougher tests” ahead, an ominous sign that a so-called “test” (i.e., attack) is imminent. Although impossible to prove, it appears that Bitcoin was specifically created to be an untraceable depository for stolen funds from a Wall Street cyber-attack. In other words, the hackers play the role of Robin Hood by stealing from the rich (i.e., Wall Street) and giving to the poor (i.e., Bitcoin)—the only catch being that Robin Hood is invisible.

Googleplex Attack
In what appears to be a preview of things to come; it was just revealed that “#OccupyGoogle” net neutrality protesters were arrested on June 25, 2014, at Google’s corporate headquarters (i.e., Googleplex) in Mountain View, California. Should a cyber-attack take place on June 27, 2014, it’s highly likely that another spontaneous protest will erupt at Google, only this time around, violence will break out. Similar to the cyber-attack planned for the four “secret” Google Barges off the coast of California, a violent Google attack will be used to sell the authenticity of cyber-terror attacks. The impending attack on Googleplex appears to be a redux of the recently foiled Facebook terror plot depicted in the April 20, 2014, Truther.org report entitled “Feds Plan to Execute Terror Attack on Facebook Headquarters in California”. Evidently, once the Facebook terror plot was exposed, the CIA decided to target the other big internet giant—Google.

NASA Rocket Launch
Between 4 and 5 AM (EST) on June 28, 2014, NASA will reportedly launch a rocket from the Wallops Flight Facility in Virginia. Should a wave of cyber-related attack hit America on June 27, 2014, it’s highly likely that the NASA launch will also be targeted. The attack could, in theory, cause the rocket to launch prematurely, explode in the air, causing an EMP-like attack on the East Coast. The notion that the CIA is planning cyber-attacks on NASA rocket launches was first exposed by Truther.org on September 6, 2013, in a report entitled “Minotaur V Rocket Launch Cyber Terror Attack: EMP Blast and East Coast Blackout Trending”. While rocket launches have historically taken place during the day at Cape Canaveral in Florida, they have mysteriously begun taking place at night in Virginia so that if and when one explodes due to an alleged cyber-terror attack, the millions of people living in the East Coast cities of Washington, D.C. and New York will witness it. In other words, the Wallops Flight Facility was built specifically so that a rocket explosion can result in an EMP-like attack over the eastern seaboard.

Cyber Terror Trending
Prior to an unprecedented cyber-terror attack, the world must be psychologically programmed through fraudulent headlines and fabricated events that yes, it can happen. Although cyber-terror related events have been trending for a while now, June 2014 headlines suggest that an attack is imminent.

June 2014 Headlines:

1. June 2, 2014: Biggest cyber attack ever? Experts say Brits have two weeks to prepare for hackers
2. June 4, 2014: Russian hacker engineered dazzling worldwide crime spree
3. June 5, 2014: ‘Don’t ask for privacy, Take it back’: Anti-NSA #ResetTheNet campaign kicks off
4. June 5, 2014: FBI provided Anonymous with targets, new leaks show
5. June 10, 2014: Second Chinese military unit linked to hacking
6. June 10, 2014: Chinese military linked to seven years of hacking US aerospace industry
7. June 10, 2014: Hacker of Bush e-mails gets 4 years behind bars
8. June 12, 2014: ‘Unprecedented’: 13 aircraft mysteriously disappear from radars in heart of Europe
9. June 14, 2014: Electronic war games blamed for jets vanishing off radars in Europe
10. June 15, 2014: NATO says not to blame for planes vanishing from radar
11. June 16, 2014: Systems glitch causes lines at Target stores
12. June 19, 2014: Facebook goes down across multiple countries
13. June 19, 2014: FBI and NYPD team up to create federal cybercrime task force
14. June 20, 2014: Cyber attacks from China target Apple websites on eve of referendum in Hong Kong
15. June 24, 2014: Ex-UK editor Andy Coulson convicted of phone hacking
16. June 25, 2014: Hackers hit Montana health database, breach impacts 1.3M users
17. June 25, 2014: #OccupyGoogle Net Neutrality Protesters Arrested
18. June 26, 2014: Aaron Swartz Documentary Hits Theaters, Web on Friday

[Does not purport to be a complete list of headlines or events]

Anonymous Stock Market Warning
In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely a teenager.

Anonymous-Terror Trending
Prior to an unprecedented cyber-attack by Anonymous, the world must be psychologically programmed through fraudulent headlines and fabricated events that yes, it can happen. As evidenced, news and events in respect to Anonymous are trending which suggests that a state-sponsored cyber-terror attack is imminent.

Anonymous Headlines:

1. March 2, 2014:
Anonymous Member Facing 440 Years in Jail for Cyber-Stalking and Hacking
2. April 2, 2014: Anonymous linked to hack of Albuquerque police amid shooting protests
3. April 6, 2014: #OpIsrael: Anonymous calls for massive attack on Israeli cyberspace
4. April 17, 2014: Anonymous Hacking Threat Was Teenage Hoax
5. April 23, 2014: Two ‘Anonymous’ hackers arrested in Cambodia
6. April 24, 2014: Anonymous Reportedly Behind Cyber Attacks Against Children’s Hospital
7. April 24, 2014: Anonymous Spokesman to Plead Guilty After Counts Dropped
8. April 25, 2014: Anonymous hacker turned FBI informant, helped with cyber attacks on foreign websites
9. April 29, 2014: Man tied to hacker group Anonymous accused of more hacking, cyberstalking
10. April 30, 2014: Anonymous Vows to Continue Its Cyber-Crusade
11. May 5, 2014: Anonymous Hacks Twitter Page Of BNP Chairman Nick Griffin
12. May 13, 2014: FBI used autistic New Yorker to nail Anonymous hacker
13. May 14, 2014: Anonymous: Why we’re Picketing Glenn Greenwald’s book tour
14. May 14, 2014: Anonymous hacker captured after feds found his accomplice
15. June 5, 2014: FBI provided Anonymous with targets, new leaks show
16. June 9, 2014:
Is Anonymous Dead, or Just Preparing to Rise Again?
17. June 18, 2014: Hacktivist Group Anonymous Targets World Cup

[Does not purport to be a complete list of headlines or events]

“Quantum Dawn 2” Cyber-Attack Drill (June 2013)
Prior to a major cyber-terror attack on the New York Stock Exchange (NYSE), one would expect there to be some stock-market related terror drills to prepare Wall Street insiders for the attack. Coincidentally, on June 13th, 2013, it was reported that Wall Street executed “Quantum Dawn 2”, a cyber-terror war-game apparently meant to give insiders an opportunity to make financial moves before the market crashes—for good. According to the report, Cyber Strategies oversaw a terror exercise which included Citigroup, Bank of America, the Department of Homeland Security, the Treasury Department, the Federal Reserve, the Securities and Exchange Commission, as well as 40 other firms. The drill, which featured a hacker, possibly from China, operating from a fake trading platform, prompted a response in which the participants facilitated a conference call to “figure out what was going on”. In other words, the drill simulated a real-life scenario in which insider firms received the “heads up” about an impending cyber-attack and subsequently shared this information accordingly so that their bank accounts and those of their clients would not be affected. The same sort of thing occurred just prior to 9/11 when “put options” or bets were taken out on United Airlines and American Airlines, the two airline companies involved in the attacks. According to the “9/11 Commission Report”, “some unusual trading did in fact occur”, however, it claimed that, “each such trade proved to have an innocuous explanation”.

“Quantum Dawn 2” Fallout (September, 2013)
In the October 23, 2013, Fox Business report entitled “‘White Hat’ Hackers Expose Flaws of U.S. Stock Market”, the details of “Quantum Dawn 2”  cyber-attack exercise were revealed. According to the report, ethical “white hat” hackers intentionally “looking to expose the cyber vulnerabilities of U.S. equity markets”, were able to directly impact market performance by “forcing a mock market close”. According to the report, more than 50 entities and 500 people in the financial services sector participated in the cyber-attack which was executed by the Securities Industry and Financial Markets Association (SIFMA) on July 18, 2013. So called “ethical hackers” were told to give everything they had to try and cripple the U.S. stock market during the 6-hour exercise. “Quantum Dawn 2 demonstrated the industry’s resiliency when faced with serious cyber-attacks that aimed to steal money, crash systems and disrupt equity market trading,” SIFMA CEO Judd Gregg stated. According to Cedric Leighton, a former U.S. intelligence officer, “The more realistic the exercise the better prepared they’ll be if and when attacks from a cyber standpoint occur”.

FLASHBACK: “Black Friday” Cyber-Attack
In yet another example of how state-sponsored terror drills always precede real-life terror events, on November 27, 2013, Truther.org published a report entitled, “Black Friday-Cyber Monday 2013 (SSTTA): NATO Executing “Largest Ever” Cyber-Terror Drill on Black Friday—Attack Imminent”. As revealed in the report, NATO was executing their largest cyber-terror drill ever and therefore the likelihood of state-sponsored cyber terror was extremely high. Predictably, it was later revealed that a major cyber-attack did in fact take place on “Black Friday” and that up to 40 million Target shoppers had their credit card information compromised. According to Brian Krebs, a journalist who specializes in computer security, the Target computer breach occurred on or around Black Friday, the busiest shopping day of the year. Evidently, the “Black Friday” cyber-attack was executed in order to set the precedent for greater acts of bank-related state-sponsored cyber-terror, namely an attack on U.S. stock markets and banks.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a false-flag terror plot is exposed (e.g., 2011 Super Bowl Nuclear Terror Plot), it is immediately canceled or postponed (e.g., 2014 Super Bowl Nuclear Terror Plot). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

truther-rss

Chinese EMP Nuke Drone Attack

Download & Forward PDF

David Chase Taylor
March 2, 2014
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that international intelligence agencies have once again green-lit a Chinese-based nuclear attack on the United States of America. With a recent poll finding that China is now America’s top enemy and revelations that a new U.S. versus China cold war is imminent, the pretext for a “Digital Pearl Harbor” has quietly been established.

The impending Pearl Harbor-like surprise attack will likely commence with an EMP (Electromagnetic Pulse) attack on U.S. satellites and defense systems in the Pacific theater, ultimately rendering U.S.-based radar and electronic warning systems useless. Shortly thereafter, autonomous drones armed with nuclear weapons will likely be launched from Chinese ships and nuclear subs in the Pacific Ocean. Although targets are always subject to change, twin nuclear drone strikes against the West Coast cities of San Diego and San Francisco, California are the most likely attack scenario.

READ: China’s World War III Doomsday Plot Exposed

Although reports in respect to China’s EMP program have been public since 2011 (see below), it was revealed on January 30, 2014, that China’s EMP weapons are an “ace” against U.S. defense systems and that the Chinese military is looking to use an EMP attack as part of a “one-two punch to knock out – literally within seconds – all defensive electronics”. The one-punch being the EMP attack followed by a two-punch nuclear attack. The notion that China plans to target the U.S. with an EMP strike was reiterated in the February 3, 2014, report entitled “U.S. Evaluates China’s EMP Threat”. Predictably, the Department of Defense (DOD) publically stated that they are “unaware of any increase in the threat of a deliberate destructive use of an EMP device”.

As depicted in the January 8, 2014, report entitled “Strategic Military Satellites Vulnerable to Attack by China in Future Space War”, U.S. satellites are no match for a space-based Chinese cyber-attack. The notion that U.S. computers could suddenly be rendered useless by an unseen and undetectable force such as an EMP strike was recently highlighted in a February 25, 2014, report which revealed that the first contagious airborne Wi-Fi computer virus has now been detected. Unbeknownst to most, digital backdoors, which allow for “Zero Day Attacks”, have been built into all military software to specifically allow for EMP and cyber-like attacks.

READ: Red Dawn Scenario: Chinese Attack On America Imminent

Back on November 19, 2013, it was reported that retired U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the Internet. In other words, Chinese computer viruses could theoretically attack U.S. military defense systems (even those not connected to the internet), ultimately rendering them useless.

Despite growing evidence that nuclear bombs likely do not even exist (see: February 4, 2014 Truther.org report) U.S. President Barack “O-Bomb-A”, (i.e., Barry Soetoro) is without a doubt the anointed nuclear doomsday president. Therefore, until Obama is ousted from public office, the world will be under the threat of state-sponsored nuclear terrorism. In the aftermath of a Chinese or Iranian nuclear attack, Obama will institute martial law and declare himself dictator. This was all but confirmed in the February 27, 2014, Fox News report which stated that Obama is about ready to make a “government unto himself“, a Hitler-like move if there ever was one.

fallout

Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

Chinese Space Attack
In order to attack U.S. satellites and defense systems, the Chinese government had to first prove to the world that they are smart enough technologically-wise to do so. This was all but confirmed on December 14, 2013, when China allegedly became the third country to land on moon. Roughly 2 weeks later on December 29, 2013, a report entitled “NASA Beware China’s Red Space Storm Rising” sounded the alarm in respect to China’s offensive space program. A month later on January 29, 2014, defense experts warned that China has boosted its space warfare capabilities. Although not yet confirmed, it does appear that China’s “Jade Rabbit” moon rover is military cover for the EMP-attack program which will take out U.S.-based military satellites and defense systems.

china-military-drone-stealth-russia.si

Chinese Drone Launch
Should Chinese drones nuke U.S. cities, they will most likely takeoff from Chinese ships in or near U.S. waters. According to a February 11, 2014, report published in respect to two Iranian warships off the coast of the U.S., the Pentagon stated that they may sail wherever they like, a reckless gesture at best. Four days later on February 15, 2014, a North Korean ship which had previously transported illegal weapons to Cuba returned to the island, unabated. A few weeks later on February 26, 2014, it was reported that a Russian spy ship was docked in Havana, Cuba, just 90 miles off the coast of America. These reports were published in order to: a) show that enemy war ships are sailing just off the coast of America, and b) that Chinese ships will be able to get close enough to U.S. shores in order to launch their nuclear drone strikes.

The “Invisibility Cloak
In order for China to pull off a “stealth” nuke attack on America, they will have to, at least theoretically speaking, employ some sort of technology which renders America’s defenses useless. Coincidentally, on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat about the development of an invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when the Chinese attack America, they may do so with the aid of superior technology which in will in essence have allowed their military equipment to become invisible to American defense systems (e.g., radar, satellites, sonar, etc.).

Asian Sneak “Attack” Propaganda
Prior to a high-profile Asian based West Coast attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. On July 12th, 2013, the film “Pacific Rim” (2013) (see trailer) was released which features a story line in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, their first 3 attacks target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico. If and when this Hollywood terror programming will manifest in reality is unknown, but the precedent for a surprise attack on the West Coast of America definitely has been set.

emp-blast-effects1

I: EMP ATTACK:

1.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

1.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

II. CYBER TERROR:

2.1: U.S. Vulnerable to Chinese Cyber Attack
Aside from the fact that Chinese hackers reportedly crashed Federal Election Commission website on December 19, 2013, recent reports in respect to cyber-security (or lack thereof) suggests that cyber-attacks against U.S. governmental institutions are imminent. For example, on February 4, 2014, it was revealed that a U.S. Senate report found that federal agencies often fail to take basic preventive cyber-security measures. That same day, it was also reported that “password” is the password on many U.S. government computer accounts, furthering the notion that feds are an easy target for hackers. A day later on February 5, 2014, a U.S. government report found that 4 in 10 government security breaches go undetected, suggesting that cyber-attacks are much more prevalent than originally thought. Needless to say, these propaganda reports have been disseminated with the goal of making the American public believe that the U.S. government is highly vulnerable to a cyber-attack, possibly emanating from China.

2.2: Cyber Doomsday
Since June of 2012, numerous propaganda articles have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, “Threat Of ‘Spectacular’ Cyberattack Looms” and “U.S. Homeland Chief: Cyber 9/11 Could Happen “Imminently“, all indicate that an unprecedented act of state-sponsored cyber-terror upon the United States is imminent. Exactly how a cyber-Doomsday will manifest itself is unknown, but a Chinese-based EMP strike followed by twin nuclear attacks appears to be the working terror scenario.

2.3: China & Cyber Terror
As previously reported, the nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. China, more than any other nation, is sure to be scapegoated in the aftermath of a cataclysmic cyber-terror attack against the United States. On October 5, 2011, U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two U.S. satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyber espionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta recently stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to clamp down on aggressive Chinese cyber-attacks against American companies and the U.S. government.  On October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.

READ: Chinese “Live TV” Cyber-Hijack With “Live” Nuclear Detonation

2.4: Cyber-Related Nuclear Terror
Prior to a high-profile EMP attack followed by twin nuclear attacks, the public must be psychologically prepared to accept that this is in fact possible. Based purely on research conducted to date, the marriage between cyber-terror and nuclear terror was first made on February 19, 2013, when a CNN headline entitled “Former CIA Official: Cyber War ‘More Sinister Than Nuclear Age’” first paired the terms “cyber” and “nuclear” together in the same sentence. Roughly a month later on March 22, 2013, the propaganda film entitled “Olympus Has Fallen” (2013) was released (see trailer) in which Washington D.C., America’s capital is attacked by an ex-North Korean terrorist who wants to hack the White House computer network and detonate American nuclear warheads while in their respective missile silos. Exactly a month later on April 22, 2013, the Wall Street Journal ran a headline entitled “China: Cyberattacks Are Like Nuclear Bombs”, ultimately linking the words “China”, Cyberattacks” and “Nuclear Bombs” in the same sentence. Roughly two months later on June 28, 2013, another propaganda film entitled  “White House Down” (2013), was released (see trailer) in which Washington D.C., America’s capital, was attacked by hackers attempting to breach the U.S. Department of Defense’s computers to access the “Nuclear Football”, the briefcase used by the President of the United States to initiate nuclear war.

original

III: DRONE ATTACK:

3.1: China’s Drone Attack
China is building one of the world’s largest drone fleets aimed at attacking the United States in the event of a war. According to the report, “The Chinese military envisions its drone swarms scouting out battlefields, guiding missile strikes and overwhelming opponents through sheer numbers. China’s military-industrial complex has developed homegrown drones to accomplish these goals, according to the report released on March 11, 2013, by the Project 2049 Institute. “The PLA now fields one of the world’s most expansive UAV [unmanned aerial vehicle] fleets,” said Ian Easton and L.C. Russell Hsiao, researchers at the Project 2049 Institute and authors of the new report. The Project 2049 Institute report warned that China could consider “plausibly deniable” drone attacks blamed upon mechanical failure or cyberhackers. The Chinese drones could act as decoys, use electronic warfare to jam communications and radar, guide missile strikes on carriers, fire missiles at U.S. Navy ships, drop nuclear bombs, or dive into U.S. ships like kamikaze robots.

READ: Chinese “Kamikaze” Done Attack On Pearl Harbor Hawaii Imminent

3.2: China’s “Stealth” Drones
If and when Chinese drones execute nuclear strikes against American cities, the drones will have to be stealth drones in order to circumvent U.S. aerial defense systems (in the event that they are not disabled due to an EMP attack). Another possibility is that the Chinese may cyber-hijack (commandeer) U.S. drones and arm them with Chinese-made nuclear weapons in order to get them past U.S. defense systems. Based on the following reports, both drone scenarios are possible, at least theoretically speaking. On March 11, 2013, Easton and L.C. Russell Hsiao, researchers at the Project 2049 Institute, stated that “The PLA [China] now fields one of the world’s most expansive UAV [unmanned aerial vehicle] fleets” and that China could consider “plausibly deniable” drone attacks blamed upon mechanical failure or cyberhackers. The drones could act as decoys, use electronic warfare to jam communications and radar, guide missile strikes on carriers, fire missiles at U.S. Navy ships or dive into ships like kamikaze robots. Project 2049 went on to state that China is developing drones such as the rumored “Dark Sword” stealth drone that have low radar profiles to escape radar detection and that Chinese engineers have even begun working on drones that have the software brains to fly in formation, do aerial refueling and takeoff and land autonomously. The report cautions the U.S. military to prepare for the worst-case scenario by hardening its existing air bases in Asia. On March 13, 2013, it was reported that China is building one of the world’s largest drone fleets aimed at attacking the United States in the event of a war. As of November 22, 2013, it was reported that China’s first stealth combat drone has taken its maiden flight.

IV. U.S. VERUS CHINA:

nuclear_explosion

4.1: Red China Rising
Aside from the fact that China openly called for the world to be “de-Americanised” on October 13, 2013, it was revealed on December 12, 2013, that a group of U.S. defense analysts told a prominent House subcommittee that the U.S. military needs a more focused war plan specific to China, especially after China’s declaration of an air defense zone over the East China Sea. A week after this shocking revelation, Chinese hackers reportedly crashed Federal Election Commission website on December 19, 2013, a direct attack on the U.S. and its democratic form of government. As of February 19, 2014, China cut its U.S. Treasury holdings the most since 2011, an ominous sign that a Chinese attack is imminent. After all, China holds most of America’s debt and therefor a nuclear strike against America may be a sign to pay up.

READ: China vs. Japan War Plot Exposed—Attack on Iwo Jima and Okinawa Imminent

4.2: U.S. Versus China  
Inflammatory war propaganda, rising diplomatic tensions between the U.S. and China along with unprecedented U.S. propaganda against China indicates that World War III scenario between the United States and China is on the horizon. On June 4th, 2012, it was reported that the Australian government’s Defense White Paper published in 2009 contained a “secret chapter” that assessed “Australia’s ability to fight an air-sea battle alongside the United States against China”. A few weeks later on June 27th, 2012, Chinese Maj. Gen. Peng Guangqian stated that a future conflict with the United States is coming as a result of U.S. “containment” policy. Guangqian was then quoted as saying, “The United States has been exhausting all its resources to establish a strategic containment system specifically targeting China” and that “The contradictions between China and the United States are structural, not to be changed by any individual, whether it is G.H.W. Bush, G.W. Bush or Barack Obama, it will not make a difference to these contradictions”.

4.3: U.S. Military Vulnerable to Attack
Prior to an unprovoked and unabated attack by China against the West Coast of America, the public must first be led to believe through propaganda and alleged whistleblowers that U.S. military equipment and weapons systems are vulnerable to Chinese cyber-related espionage. That way, in the aftermath of a Chinese invasion whereby U.S. defense systems such as missiles, planes and radars are suddenly rendered useless, the narrative of a Chinese cyber-attack can be floated to the American public and military as the reason for the deadly attack which will surely take America to war. If the following reports are to be believed, Chinese hackers have gained access to U.S. weapons secrets, stole blueprints from Australia’s intelligence agency, stole a number of the latest U.S. weapons, hacked the NSA chairman’s accounts, targeted U.S. missile systems, hacked the Obama campaign, and hacked the head of the Nuclear Security Agency. The notion that the Chinese military is “smarter” than the U.S. military and therefore vulnerable to an attack was basically confirmed on January 16, 2014, when it was reported that a U.S. admiral conceded that the U.S. is losing dominance to China.

Chinese Espionage Headlines:

1. March 29, 2013: Report: China Gained U.S. Weapons Secrets Using Cyberespionage
2. May 27, 2013: Chinese Hackers Steal Australian Security Intelligence Blueprints
3. May 28, 2013: Pentagon: The Chinese Stole Our Newest Weapons
4. May 28, 2013: Chinese Infiltrated Top U.S. Weapons Systems, Confidential Report Claims
5. May 28, 2013: Report Lists U.S. Weapons Compromised By Chinese Cyberspies
6. May 29, 2013: Pentagon Aircraft, Missile Defense Programs Target Of China Cyber Threat
7. May 29, 2013: China to Hold Digital War Games
8. May 31, 2013: Hagel Says Chinese Cyberthreats Pose ‘Stealthy’ Danger To US
9. June 5, 2013: China Claims ‘Mountains Of Data’ On Cyber Attacks By US
10. June 6, 2013: Chinese Hacked Obama, McCain Campaigns, Took Internal Documents

[Does not purport to be a complete list of events of headlines]

4.4: U.S. Weapon Systems Compromised by Chinese Hackers
Based on multiple reports, Chinese hackers have compromised numerous U.S. military weapons systems,  ultimately making U.S. military personal and equipment vulnerable to a Chinese attack. According to a May 28th, 2013, report by the Washington Post, the following is an “expanded partial list” of compromised DOD system designs and technologies:

I. U.S. System Designs
Terminal High Altitude Area Defense, Patriot Advanced Capability-3, Extended Area Protection and Survivability System (EAPS), F-35, V-22, C-17, Hawklink, Advanced Harpoon Weapon Control System, Tanker Conversions, Long-term Mine Reconnaissance System, Global Hawk, Navy antenna mechanisms, Global Freight Management System, Micro Air Vehicle, Brigade Combat Team Modernization, Aegis Ballistic Missile Defense System, USMC Tracked Combat Vehicles, Warfighter Information Network-Tactical (WIN-T), T700 Family of Engines, Full Authority Digital Engine Controller (FADEC), UH-60 Black Hawk, AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile), Affordable Weapons System, Littoral Combat Ship, Navy Standard Missile (SM-2,3,6), P-8A/Multi-Mission Aircraft, F/A and EA-18, RC-135 Detect./Collect, and the Mk54 Light Weight Torpedo.

II. U.S. Technologies
Directed Energy, UAV video system, Specific Emitter identification, Nanotechnology, Dual Use Avionics, Fuze/Munitions safety and development, Electronic Intelligence Processing, Tactical Data Links, Satellite Communications, Electronic Warfare, Advanced Signal Processing Technologies for Radars,  Nanostructured Metal Matrix Composite for Light Weight Ballistic Armor, Vision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV), Space Surveillance Telescope, Materials/processing technologies, IR Search and Track systems, Electronic Warfare systems, Electromagnetic Aircraft Launch, Rail Gun, Side Scan sonar, Mode 5 IFF, Export Control, ITAR, Distribution Statement B,C,D Technical Information, CAD drawings, 3D models, schematics, Software code, Critical technology, Vendor/supply chain data, Technical manuals, PII (email addresses, SSN, credit card numbers, passwords, etc.), and attendee lists for program reviews and meetings.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the 2014 global bio-terror pandemic. To date, David Chase Taylor has blown the whistle on 50+ state-sponsored terror plots, including the man-made comet ISON hoax, the drone strike on “Fast and Furious” star Paul Walker, and he was the first to expose Alex Jones’ links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. State-sponsored terror alerts, warning, assertions and forecasts made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically occur based on the cited date. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl XLV Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

truther-rss

Nuclear-Threats-from-North-Korea

Download & Forward PDF

UPDATE: Less than 48 hours after this Truther.org report was published, NBA legend Dennis Rodman, who had just arrived in North Korea on December 19, 2013 to bring global attention to North Korea and the NBA prior to an unprecedented nuclear EMP terror attack, inexplicably left the country on Monday, December 23, 2013, without even saying if he met Kim Jong Un, the sole purpose of his journey. The sudden departure by Rodman confirms that the North Korea/NBA nuclear EMP terror plot has officially been foiled.

David Chase Taylor
December 21, 2013
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the allegedly rogue nation of North Korea will launch a nuclear EMP missile strike against the United States in the very near future. Due to limited technology, the North Korean missile will predictably explode mid-air somewhere over the West Coast of the United States (i.e., Washington, Oregon or California) causing a burst of electromagnetic radiationthat will permanently disable the U.S. electrical grid.

Download & Forward PDF

The notion that North Korea is developing long-range nuclear EMP missiles has been well documented as of late. Starting on September 23, 2013, it was reported that a U.S.-based think-tank discovered that North Korea has been testing a long-range rocket engine. Roughly 6 weeks later on November 5, 2013, it was revealed that North Korea is developing ‘electromagnetic pulse weapons’. Three weeks later on November 26, 2013, it was reported that Iran and North Korea are secretly developing long-range rocket boosters for nuclear ICBM missiles. 48 hours later on November 28, 2013, it was reported that North Korea has restarted its nuclear reactor, an ominous sign indeed. Needless to say, a nuclear EMP missile strike emanating out of North Korea is imminent.

“We do not hide that we will launch a series of satellites and long-range rockets and carry out nuclear tests in the next higher level new phase of the struggle against the United States, the sworn enemy of the Korean people.”

—National Defense Commission of North Korea

Although a North Korean nuclear EMP missile strike could transpire at any time, it will most likely occur on Christmas Day, December 25, 2013, when two of the NBA’s elite teams—the Los Angeles Lakers and Miami Heat—will be showcased “live” on national television at 5:00 PM (EST). This is likely why NBA legend Dennis Rodman has visited North Korea twice, and is still there at the time of publishing (12/21/2013). Due to the fact that Christmas is a national holiday and no other sporting events will be available to watch, the game will likely have a very large television audience as well as an aerial blimp to document the nuclear event.

As first revealed in the March 31, 2013 Truther.org report entitled “North Korea’s False-Flag Bio-Terror Attack Plan Revealed”, international intelligence agencies have been planning a North Korean attack on the U.S. for some time now. Since the North Korean bio-terror attack was ultimately foiled, a nuclear attack is the next logical step.

In a move which shows the duplicity of the U.S. government, it was revealed on December 16, 2013, that hundreds (possibly thousands) of armored tanks and trucks are being moved to the West Coast by train (see video). In the aftermath of a successful nuclear EMP strike, martial law will surly result as most of America would be without electricity. Therefore, the U.S. military hardware needs to arrive at its destination on the West Coast prior to the attack actually taking place.

I. THE SET-UP:

nkorea20n-2-web

1.1: North Korean Threats & Warnings
Prior to an unprovoked attack against the U.S. emanating out of North Korea, the American public must be psychologically programmed by intelligence agencies through various media reports and staged events to accept that North Korea is in fact a legitimate threat. As evidenced, threats and warnings by the North Koran government are increasing in tone and will likely culminate in a North Korean nuclear EMP-like attack on the U.S. 

Vague Threats & Warnings:

1. February 23, 2013: North Korea warns US to cancel South Korea drills
2. March 19, 2013: North Korea has White House, U.S. Capitol in its sights in new propaganda video
3. March 28, 2013:
U.S. officials concerned over North Korea’s ‘ratcheting up of rhetoric’
4. March 28, 2013: North Korea orders rockets on standby to hit US bases
5. March 29, 2013: North Korea: ‘outbreak of war hours away’ as Kim Jong-un plans US strike
6. April 4, 2013: North Korea Warns U.S. It’s Authorized Nuclear Attack
7. October 12, 2013: North Korea warns of ‘all-out war’ as it refuses to sign pact with US

Kim Jong-un Under Western Mind Control
Shortly after the mysterious death of
North Korean President Kim Jong-il on August 24, 2012, his son, Kim Jong-un was placed into “power”. Since then, Jong-un has been routinely portrayed in the media as being mentally unstable, highly insecure, and willing to attack anyone at a moment’s notice. Not surprisingly, Kim Jong-un exhibits all the telltale signs of being brainwashed and under state-sponsored mind-control. Jong-un was reportedly spotted with his “handler” on numerous occasions while attending a “private school” in Switzerland. According to Wikipedia, “mind control” was first developed in Korea during the Korean War and involves a process in which a group or individual “systematically uses unethically manipulative methods to persuade others to conform to the wishes of the manipulator(s), often to the detriment of the person being manipulated”.

U.N. Security Council Resolution against North Korea
Prior to North Korea conducting an unprecedented and horrific nuclear attack on the U.S., the country must be demonized publically in order to give the perception that North Korea is a lone-wolf lashing out against the world. On top of the 8 Security Council Resolutions leveled by the United Nations against North Korea, the country has also suffered
numerous economic sanctions and regulations from nations around the world. Interestingly, of the 8 current U.N. resolutions against North Korea, 7 of them are in respect to nuclear weapons, ultimately giving well needed plausible deniability to U.N. and government officials in the aftermath of a North Korean nuclear EMP missile attack. By focusing UN sanction almost solely on North Korea’s nuclear program, a nuclear missile strike emanating out of North Korea is all but expected.

History of UNSC Resolutions against North Korea:

1. May 11, 1993:UNSC Resolution: UNSCR 0825/1993 (Nuclear)
2. April 28, 2004:
UNSC Resolution: UNSCR 1540/2004 (WMD)
3. July 15, 2006:
UNSC Resolution: UNSCR 1695/2006 (Ballistic Missiles)
4. October 14, 2006:
UNSC Resolution: UNSCR 1718/2006 (Nuclear)
5. June 12, 2009:
UNSC Resolution: UNSCR 1874/2009 (Nuclear)
6. June 10, 2011:
UNSC Resolution: UNSCR 1985/2011(Nuclear)
7. January 23, 2013:
UNSC Resolution: UNSCR 2087/2013 (Nuclear, WMD, Ballistic Missiles)
8. March 7, 2013:
UNSC Resolution: UNSCR 2094/2013 (Nuclear)

UN in North Korea
In order to ensure that a North Korean nuclear missile actually strikes the United States, it was revealed on December 11, 2013, that the United Nations Development Program (UNDP) has reopened their office in North Korea
. According to reports, the UN office was closed after it handed over “dual-use” technology to the communist regime. As with many intelligence propaganda reports, the opposite of what is being reported is actually true. In this case, it’s far more likely that the UNDP is never stopped providing “duel use” technology to North Korea.  The fact that UN is welcome in North Korea despite levying at least 8 sanctions against country shows that the entire notion that North Korea is a rogue nation is laughable on its face.

II. A NUCLEAR NORTH KOREA
:

4AsanNKorea

2.1: North Korean Nuclear Tests
As evidenced, North Korea has continued nuclear testing, regardless of the sanctions imposed by the United Nations. With each passing nuclear test, the respective yield of the test jumps considerably higher. Therefore, the 4th nuclear test (or the 1st nuclear attack) by North Korea should yield somewhere in the neighborhood of 25-40 kilotons of TNT, an amount on par with Pakistan’s nuclear program. According to physicists who testified before a United States Congressional hearing on October 7, 1999, nuclear weapons with yields of 10 kilotons or less can produce a large EMP.

North Korean Nuclear Test Timeline:

1. October 9, 2006: 1st Nuclear Test: Device: Fission: Type: Underground: Yield: 0.5 kilotons of TNT
2. May 25, 2009:
2nd Nuclear Test: Device: Fission: Type: Underground: Yield: 2.35 kilotons of TNT
3. February 12, 2013:
3rd Nuclear Test: Device: Fission: Type: Underground: Yield: 6-9 kilotons of TNT

2.2: North Korean Nuclear Terror Trending

Prior to a high-profile nuclear missile strike emanating out of North Korea, the American public must be psychologically programmed by intelligence agencies through various media reports and staged events to accept that this is in fact possible. As evidenced, headlines in respect to North Korea’s nuclear program are at an all-time high. Whether or not these headlines will culminate in an unprecedented North Korean nuclear missile strike is not known, but the precedent has definitely been set.

Nuclear Headlines:

1. February 12, 2013:
N. Korea conducts 3rd nuclear test, warns more ‘measures’ may come
2. March 10, 2013: North Korea: ‘If the US has nuclear weapons, why can’t we?’
3. April 2, 2013:
North Korea vows to restart nuke plant after U.S. sends destroyer to region
4. April 4, 2013:
North Korea Warns U.S. It’s Authorized Nuclear Attack
5. April 5, 2013:
U.S. deploys battalion expert in nuclear and chemical warfare off coast of North Korea
6. April 12, 2013: North Korea can mount nuclear warheads on missiles?
7. August 6, 2013:
North Korea expanding nuclear plant, US institute says
8. September 11, 2013:
Report: N. Korea may be restarting plutonium reactor
9. October 2, 2013:US, South Korea agree to work more on deterring North Korea nuclear threats
10. November 26, 2013: Iran, North Korea Secretly Developing Long-Range Rocket Booster for ICBMs
11. November 28, 2013:
North Korea ‘restarts’ nuclear reactor, atomic watchdog warns

2.3: North Korea-Cuba Scandal

In the event that North Korea strikes the U.S. with a nuclear missile, Cuba will likely play the role of middle-man in the quest for highly enriched uranium. This narrative began to form on July 16, 2013, it was reported that Panama had stopped a North Korean ship carrying missile material from Cuba. A day later on July 17, 2013, it was reported that a second North Korean ship had made a Cuba run back in 2012. 24 hours later on July 18, 2013, a third report revealed that North Korea stated that the ship in question only carried a legal load of arms, possibly a premeditated lie to hide the true nature of the voyage. Roughly a month later on August 14, 2013, it was reported that Fidel Castro stated that North Korea had provided Cuba with free weapons in the 1980s. Although most if not all the aforementioned reports were completely fabricated, they were released in a coordinated manner to show that North Korea does in fact have an active missile program and is currently seeking weapons on the open market. As witnessed during the nuclear Cuban Missile Crisis, Cuba has been cozy with Russian and therefore may have access to highly enriched uranium needed for a North Korean nuclear bomb.

III. NORTH KOREA’S MISSILE PROGRAM:

130411184420-tsr-lawrence-north-korea-missiles-nuclear-capable-00002010-story-top

3.1: North Korea Missile Terror Trending
Missile and rockets tests by North Korea are increasing in regularity and well as distance. If the latest propaganda reports are to be believed, North Korea now has the capability to launch missiles into outer space as well as strike America. The notion of an impending North Korean missile strike was front and center in what is now being called the “2013 Korean Crisis”. The fabricated crisis escalated as quickly as it dissipated but set the precedent for an impending North Korean missile strike.

Missile & Rocket Timeline:

1. May 29-30, 1993: 1st Missile Test: Result: Success: Type: Rodong-1/Nodong-1
2. August 31, 1998:
2nd Missile Test: Result: Success: Type: Taepodong-1
3. March 10, 2003:
3rd Missile Test: Result: Unknown: Type: Unknown
4. October, 2003:
4th Missile Test: Result: Unknown: Type: Unknown
5. May 2005:
5th Missile Test: Result: Unknown: Type: Unknown
6. March 8, 2006:
6th Missile Test: Result: Unknown: Type: Unknown
7. July 5, 2006:
7th Missile Test: Result: Fail: Type: Taepodong-2
8. April 5, 2009:
1st Rocket Test: Result: Success: Type: Unha-2
9. May 26, 2009:
8th Missile Test: Result: Unknown: Type: Unknown
10. July 4, 2009:
9th Missile Test: Result: Success: Type: Scud
11. December 19, 2011:
10th Missile Test: Result: Unknown: Type: Unknown
12. January 11, 2012:
11th Missile Test: Result: Unknown: Type: Unknown
13. April 12/16, 2012:
2nd Rocket Test: Result: Fail: Type: Unha-3
14. October 9, 2012: Isolated North Korea Says Its Rockets Can Hit U.S. Mainland
15. November 28, 2012:
Inside the Ring: North Korean Missile Launch Set
16. December 5, 2012:
Report: North Korea Could Launch Rocket by Next Week
17. December 7, 2012:
World on Edge Ahead of N. Korea’s Pending Satellite Launch
18. December 11, 2012:
North Korea Fires A Long-Range Rocket
19. December 12, 2012:
North Korean Rocket Launch Signaling Real-Life ‘Red Dawn’?
20. December 12, 2012:
North Korea rocket launch: timeline of nuclear and missile programmes
21. December 23, 2012:
North Korea ‘Has Ability To Fire A Rocket That Could Hit The United States’
22. January 30, 2013:
South Korea Launches Satellite-Carrying Rocket
23. February 5, 2013:
North Korea Video Shows New York In Ruins after Missile Attack
24. March 15, 2013: US to boost missile defense against North Korea
25. March 16, 2013:
North Korea Test-Fired 2 Short-Range Missiles During US-SKorean Drills
26. March 29, 2013: North Korea says it is ready to launch strike against US bases

27. April 3, 2013:
U.S. sending defensive missiles to Guam
28. April 5, 2013:
South Korean Destroyers Watch for Possible North Korean Missile Launch
29. April 6, 2013:
US Reinforcing Pacific Defenses to Counter North Korean Missile Threats
30. April 6, 2013: N Korea loads missiles onto launchers, tells Russia, Britain to evacuate embassies
31. April 9, 2013:
North Korea urges foreigners to leave South Korea ahead of possible missile strike
32. April 9, 2013:
Japanese PAC-3 batteries deployed as North Korea threatens missile launch
33. April 10, 2013:
False alarm on the North Korean missile launch prompts panic in Japan
34. April 10, 2013:
North Korea: US ‘ready to intercept up to THREE missiles’
35. April 10, 2013: North Korea fuels ballistic missile, ready for launch
36. April 12, 2013:
North Korea can mount nuclear warheads on missiles?
37. April 12, 2013:
Japan vows response to ‘any scenario’ after nuclear threat from North Korea
38. April 14, 2013:
Should the U.S. shoot down North Korean missile?
39
. April 16, 2012: US Officials Warn Failed North Korea Missile Launch Paves Way For Future Tests
40. April 20, 2013: North Korea moves two more missile launchers: report
41. May 7, 2013: North Korea withdraws missiles from launch site
42. May 18, 2013: N. Korea launches three short-range guided missiles: defense ministry
43. May 19, 2013: N Korea again fires short-range missile
44. May 20, 2013: North Korea fires sixth missile in three days

45. July 23, 2013: Images show construction halt at North Korean missile launch site
46. September 23, 2013:
N. Korea tests long-range rocket engine: US think-tank
47. November 26, 2013:
Iran, North Korea Secretly Developing Long-Range Rocket Booster for ICBMs

3.2: Missile Terror Trending
Prior to a high-profile North Korean nuclear missile strike, the American public must be psychologically prepared to accept that this is in fact possible. Aside from the aforementioned North Korean missile headlines and event, starting in July of 2013, there has been an unprecedented amount of missile-related headlines which indicates that missile-related terror is imminent.

Missile Headlines:

1. July 6, 2013: Missile designed to intercept nukes fails weapon test
2. July 26, 2013:
Don’t Be Alarmed by the Drone Blimps They’re here to Stop Cruise Missiles
3. August 13, 2013:
US Air Force unit operating nuclear missiles fails safety and security inspection
4. August 25, 2013:
Military removes nuclear weapons unit commander; decision follows security failure
5. September 15, 2013:
India conducts 2nd test flight of its nuclear- capable ‘Agni-V’ long-range ballistic
6. September 23, 2013:
N. Korea tests long-range rocket engine: US think-tank
7. September 22, 2013:
US Air Force test-launches intercontinental missile from California coast
8. October 16, 2013:
Inside the Ring: Russia to test new missile
9. October 24, 2013:
Missile doors left open while Air Force nuclear officer slept
10. November 7, 2013: China Deploys New Bomber with Long-Range Land Attack Missile
11. November 17, 2013:
Russia starts ambitious super-heavy space rocket project
12. November 26, 2013:
Iran, North Korea Secretly Developing Long-Range Rocket Booster for ICBMs
13. November 27, 2013:
Iran Announces Development of Ballistic Missile Technology
14. December 17, 2013:
Russia plans new ICBM to replace Cold War ‘Satan’ missile
15. December 17, 2013:
Iran Reveals New Details of Shoulder-Fired Missiles
16. December 17, 2013:
Minuteman 3 test missile launches from central California coast
17. December 18, 2013:
Russia Plans Rail-Mounted Missiles to Counter US Global Strike Program
18. December 18, 2013:
Bombshell find: Couple discovers military rocket in new apartment
19. December 19, 2013:
American anti-missile system more about attack than defense

[Does not purport to a complete list of headlines or events]

IV: NORTH KOREA PROPAGANDA:

GetFile.aspx

4.1: NBA Publicity Stunt
In order to bring unprecedented global attention to the country North Korea just prior to their first nuclear missile strike, it was reported on September 3, 2013, that NBA legend Dennis Rodman will make his return visit to North Korea in December. A few months later on November 22, 2013, it was reported that Rodman will hold an exhibition basketball game while in North Korea. As of December 19, 2013, Rodman returned to North Korea to meet with his so-called friend Kim Jong-un. A day later on December 20, 2013, Rodman reportedly received a chilling open letter from an ex-North Korean prisoner. Evidently, the entire Rodman-North Korea saga is an elaborate publicity stunt to raise the profile of North Korea prior to an international nuclear crisis. Although a North Korean nuclear EMP missile strike could come at any time, it will most likely occur on Christmas Day, December 25, 2013, when two of the NBA’s elite teams—the Los Angeles Lakers and Miami Heat—will be showcased “live” on national television at 5:00 PM (EST). This is likely why NBA legend Dennis Rodman has been to North Korea twice and is still there at the time of publishing. Due to the fact that Christmas is a national holiday and no other sports will be available to watch, the game will likely have a very large audience and an aerial blimp to document the event.

4.2: Shock Headlines Trending
Aside from the NBA publicity stunt, there have been an unprecedented amount of shock headlines in respect to North Korea which have been disseminated globally in 2013. Although they very in nature, the majority of them were released to show the brutal nature of the regime just prior to an unprovoked nuclear attack on the United States.

Shock Headlines:

1. March 29, 2013:
North Korea declares ‘state of war’ with South
2. April 1, 2013:
U.S. deploys stealth fighter jets to South Korea
3. April 19, 2013:
Pre-teen North Koreans trained as soldiers
4. August 30, 2013:
Kim Jong-un’s Ex-Girlfriend ‘Shot by Firing Squad’
5. September 16, 2013:
SKorean soldiers shoot man believed to be trying to sneak into NKorea
6. November 6, 2013: American missionary’s health failing as he marks one year in North Korean custody
7. November 7, 2013: North Korea says it has arrested South Korean spy in Pyongyang
8. November 12, 2013: Public Mass Executions Carried Out in Seven North Korean Cities
9. November 20, 2013: DEA: Arrests of 5 men show growth of North Korean meth production
10. November 21, 2013: Son says North Korea detains 85-year-old Korean War vet
11. November 21, 2013: North Korea Threatens to Attack South Korean Presidential Compound

12. November 30, 2013: N. Korea releases ‘written apology’ of US war veteran detained for ‘espionage’
13. December 3, 2013: U.S. vet detained in N. Korea oversaw guerrilla group

14. December 5, 2013: Satellite images reveal scale of North Korea prison camps, group says
15. December 11, 2013: UN opens in North Korea four years after office closed
16. December 12, 2013: North Korea executes Kim Jong-un’s powerful uncle over ‘treason’
17. December 13, 2013: Most bizarre things being reported about North Korea
18. December 13, 2013: More purges could follow North Korea execution of Kim’s uncle
19. December 14, 2013: The women behind the throne in North Korea’s ‘empire of horror’
20. December 20, 2013: North Korea threatens to strike South ‘without notice,’ sends warning via fax


V. EMP ATTACK:

emp-blast-effects1

5.1: What is an EMP?
An Nuclear EMP is a burst of electromagnetic radiation which usually results from a high energy nuclear explosion that suddenly fluctuates the magnetic field. Theoretically, an EMP could wipe out everything electronic (planes, trains, cars, computers, internet, etc.) in a flash. EMP terror has gained popularity of late and has been featured in movies such as “The Matrix” and television shows such as “24” and the #1 show on NBC entitled “Revolution”, which eerily features a post-EMP America with no electricity. Aside from the Hollywood EMP propaganda, there has been recent EMP terror legislation by the U.S. congress, a number of EMP terror conferences, and EMP terror scholarly whitepapers which have all been preparing local, state and federal officials for an upcoming EMP terror attack on America. Based on the 12 major power outages in 2012 alone, it appears that the U.S. government is programming the public for the permanent loss of electricity. Coincidentally, in September of 2012, Alex Jones of Infowars released a new magazine which indicates that the STRATFOR intelligence operation known as Infowars knows that the internet is about to expire and have planned ahead by launching a new propaganda magazine. In the propaganda film entitled “Red Dawn” (2012), (See: Trailer) a group of American youth out partying after a football game, suddenly find themselves in the middle of a major blackout, likely from an EMP attack.

gridex_banner

5.2: “GridEx II” Power Grid Drill
Considering that on November 13-15, 2013, a massive power grid terror drill entitled “GridEx II” was executed on the East Coast of America, there is a real possibility that a massive EMP-like nuclear attack could turn the lights out on America for good. According to the August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”

5.3: Blackout Déjà Vu
If and when a major cyber-terror attack occurs, it will most likely involve a lengthy blackout of the electrical grid. Predictably, it was reported on April 26, 2013, that the former CIA Director stated that the U.S. electrical grid is vulnerable to attack. On November 1, 2012, just days prior to the 2012 Presidential Election, Hurricane Sandy allegedly cut off electricity to roughly 600,000 customers, including the New York skyline. Roughly 3 months later on February 3, 2013, Super Bowl XLVII was blackout for 34 minutes due to an alleged power outage. Interestingly, on September 1, 2013, former NFL star Ray Lewis had stated that the Super Bowl blackout was conspiracy against the Baltimore Ravens, his former team. Regardless of the alleged cause, there is a concerted effort to turn the lights off in America for good. One way to achieve this would be to execute a North Korean EMP attack on Christmas day.

About the Author

David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the 2013 global bio-terror pandemic. To date, Truther.org has identified and exposed over 50 Obama sanctioned terror plots, as well as the Alex Jones’ links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. State-Sponsored Terror Threat Assessments (SSTTA), assertions, and forecasts made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically occur based on the cited date. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl XLV Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

Truther RSS

Grid Ex II

Download & Forward PDF

David Chase Taylor
November 19, 2013
Truther.org

SWITZERLAND, Zurich — According to NASA, the Minotaur I rocket carrying the DOD’s Operationally Response Space-3 mission will be launched by the U.S. Air Force on November 19, 2013, from the Mid-Atlantic Regional Spaceport Pad 0B on the Delmarva Peninsula south of Chincoteague, Virginia. The latest window for the launch is 7:30 to 9:30 PM (EST).

Access: Latest NASA Info

The Minotaur I rocket is a derivative of the LGM-30 Minuteman rocket which is a land-based intercontinental ballistic missile (ICBM) that is currently in service with the United States Air Force’sGlobal Strike Command. In other words, the Minotaur I rocketis a de facto nuclear missile which may end in an EMP-like explosion should it come under an alleged cyber-terror attack.

Download & Forward PDF

The possibility of an unprecedented cyber-terror attack is extremely high considering that the Syrian Electronic Army was to be implicated in a cyber-terror attack on the Minotaur V rocket launch of September 6, 2013. A couple of months later, the state-sponsored terror group known as “Anonymous” was caught red-handed plotting a November 5, 2013 cyber-terror attack on the Utah NSA Data Spy Center. The recently foiled cyber-terror plots indicates that the Obama administration is actively attempting to commit acts of cyber-terrorism against the American people.

Similarly to the
Minotaur V launch of September 6, 2013, the Minotaur I rocketwill be launched from Virginia and will be visible along much of the eastern seaboard from New York to Virginia. It appears that the late evening launch was a calculated decision in order to gain the most “live” viewers of a potential explosion which will be much brighter in the night sky.

EMP Attack?
If a cyber-terror attack strikes the Minotaur I rocket, it is highly likely that the explosion could have an EMP-like effect as a burst of electromagnetic nuclear radiation could theoretically cause a blackout of the U.S. electrical grid over New York City and a majority of the East Coast. Coincidentally, multiple governments just finished a power grid terror drill entitled “GridEx II” (see below) which has prepped all of North America for an epic power failure.

Cyber-Terror Drill: “GridEx II”
On November 13-15, 2013, a massive power grid terror drill entitled “GridEx II” was executed on the East Coast of America in apparent preparation for a massive cyber-terror attack or EMP explosion. According to the August 16, 2013, a New York Times report entitled “
As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “…Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”

I. THE WARNINGS:

1.1: Latest Cyber-Terror Warnings

Ever since former DHS Chief Janet Napolitano stated that a
cyber 9/11 could happen “imminently”, there has been a steady stream of cyber-related terror warnings that may culminate in an unprecedented cyber terror attack on the Minotaur I rocket, which is property of the Department of Defense (DOD) and the U.S. Air Force. In an ominous sign that space-related cyber-terror is imminent, it was reported on November 12, 2013, that the Israeli made Stuxnet virus has now infected the International Space Station (ISS).

November 2013 Cyber Terror Warnings:

1. November 5, 2013: Govt Agencies Have No Way of Warning Each Other About a Cyber Attack
2. November 14, 2013: FBI: Cyber-attacks surpassing terrorism as major domestic threat
3. November 16, 2013:
FBI: Anonymous engaged in year-long campaign targeting US Govt agencies
4. November 17, 2013:Anonymous hacking group targeting government websites, FBI warns

1.2: Cyber-Terror Doomsday Imminent
Since June of 2012,
numerous propaganda articles have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, and “Threat Of ‘Spectacular’ Cyberattack Looms” all indicate that an unprecedented act of state-sponsored cyber-terror upon the United States is imminent. Exactly how a cyber-Doomsday will manifest itself is unknown, but “Live TV” cyber-terror attack appears to be the working plan at this given time.

II. ANONYMOUS:

2.1: Anonymous Terror Trending
Although there are likely many non-state actors affiliated with Anonymous, the logo of Anonymous depicts two Roman sheaves just like the United Nations’ logo. Anonymous also receive worldwide press which indicates that they are indeed a state-sponsored cyber-hacking group. After all, government only pimps their own and will not under any circumstance give publicity to their enemy or a cause they do not support. Based on the sheer amount of headlines and events in respect to Anonymous, the next act of cyber-terror will almost undoubtedly be scapegoated onto them.

Anonymous Terror Timeline:

1. July 21, 2013: Anonymous” vows to hack government websites globally on November 5
2. August 23, 2013:
Anonymous trolls FBI, releases contact data for all Fed employees

3. September 12, 2013: Anonymous member sentenced to three years for hacking police sites
4. October 3, 2013:
Anonymous busted: 13 hacktivists indicted over Operation Payback
5. October 8, 2013:
Anonymous plans Million Mask March on Washington
6. October 27, 2013:12yo Canadian boy hacked Govt sites, gave info to Anonymous for video games
7. November 1, 2013:
‘Anonymous’ hack Singapore newspaper’s website
8. November 15, 2013: ‘Anonymous’ big gets 10 years for hacking FBI
9. November 15, 2013: B.S. ‘Anonymous’ Claim of 9/11 Style Attack in L.A. Today Goes Viral
10. November 16, 2013:
FBI: Anonymous engaged in year-long campaign targeting US Govt
11. November 17, 2013:
Anonymous hacking group targeting government websites, FBI warns

[Does not purport to be a complete list of events or headlines]

III. CYBER-TERROR ATTACKS:

3.1: Obama Cyber-Attacks
In the aftermath of an unprecedented Anonymous cyber-attack, the recent glitches and shutdowns of the ObamaCare website will predictably be cited as Anonymous cyber-attacks. Since October 12, 2013, the infamous ObamaCare website has suffered at least 3 cyber-related outages while Obama’s Facebook and Twitter accounts have also been digitally compromised. These fabricated attacks were executed to create a narrative whereby Obama himself is being victimized and targeted by hackers so that he can appear sympathetic to the public in the wake of upcoming cyber-attacks which his administration has sanctioned.   

Obama-Related Cyber Attacks:

1. October 12, 2013: Tech experts wary of more Obamacare glitches
2. October 27, 2013:
A Hacker Group Just Compromised a Page on Barack Obama’s Website

3. October 28, 2013:
Barack Obama’s social accounts target of Syrian Electronic Army
4. October 28, 2013:
ObamaCare website suffers new outage
5. November 14, 2013: Official: Hackers tried repeatedly to attack Obamacare website

3.2: Cyber-Terror Attack Propaganda

In blatantly naked programming for an impending cyber-terror attack, on September 6, 2013, a USA Today propaganda report entitled “How Prepared Are You for a Cyberattack?” was published. According to the report, most major U.S. companies have been under siege by hackers over the last 18 months. Only two days after Janet Napolitano’s speech warning of an impending cyber-attack, a hacker group called the Syrian Electronic Army hacked the New York Times’ website and their Twitter, for the second time in 2013. The report depicts a grim post-cyber-attack world: “Imagine waking up one morning with no power. Cellphones can’t connect, banks are closed, the Internet is down and credit cards don’t work. In localized emergencies, workers from other areas help to restore services quickly. A cyber-attack could affect wide regions of the country, overwhelming the available manpower. It could take days, weeks or months for basic services to be fully restored. Not a pretty picture”

2013 Cyber-Terror Headlines:

1. August 22, 2013: Nasdaq: ‘Connectivity Issue’ Led To Three-Hour Shutdown
2. August 23, 2013: Anonymous Trolls FBI, Releases Contact Data for All Fed Employees
3. August 24, 2013: Mysterious Computer Glitch Hits Gitmo 9/11 Tribunal
4. August 27, 2013: Napolitano warns large-scale cyber-attack on US is inevitable
5. August 27, 2013: ‘Largest Hack’ In Chinese History Has Beijing Stumped
6. August 27, 2013: Syrian Electronic Army Takes Down New York Times Website and Twitter
7. August 28, 2013: ‘N.Y. Times’ Blames Hackers in Latest Website Crash
8. September 2, 2013: Pro-Syrian Group Hacks U.S. Marines Website
9. September 5, 2013: Romanian Hackers Get Hefty Sentences in New Hampshire
10. September 12, 2013: Multiple NASA websites hacked
11. September 12, 2013: Anonymous member sentenced to three years for hacking police sites
12. September 18, 2013:
Brazilian hackers confuse NASA with NSA in revenge attack
13. September 22, 2013:
China may be hiring hackers to access US drone technology
14. September 20, 2013: Police nab U.K. cybercrime’s “Mr Big” after bank heist
15. September 21, 2013: UK charges 4 men over $2.1 million cyber theft from Barclays Bank
16. September 23, 2013: German group claims to have hacked Apple iPhone fingerprint scanner
17. September 24, 2013: U.S. military’s battlefield network vulnerable to hackers
18. September 26, 2013: UK secretly arrested 16-year old boy for world’s ‘biggest’ DDoS-attack
19. September 27, 2013: 71 iPads missing from Los Angeles schools, officials say
20. September 27, 2013: Arrest made in Miss Teen USA ‘sextortion’ case
21. September 27, 2013: Iran-backed hackers infiltrated Navy computers – US officials
22. October 3, 2013: Iran’s cyber warfare commander shot dead in alleged assassination
23. October 3, 2013: Anonymous busted: 13 hacktivists indicted over Operation Payback
24. October 6, 2013: LA officials seek fix to $1B program after students crack iPad security
25. October 7, 2013: Anonymous to March on DC on Guy Fawkes Day
26. October 8, 2013: Anonymous plans Million Mask March on Washington
27. October 12, 2013: Tech experts wary of more Obamacare glitches
28. October 12, 2013: Computer Glitch Blamed For Nationwide EBT System Shutdown On Saturday
29. October 17, 2013: Power Plant Plight: US utilities’ soft underbelly for hackers
30. October 17, 2013: The Fifth Estate Proves How Hard It Is to Make a Movie About the Internet
31. October 20, 2013:
Cheney feared heart device would be hacked in assassination effort
32. October 20, 2013: East Coast Internet Traffic Is Restored
33. October 25, 2013: NSA site went down due to ‘internal error’, not DDoS attack, agency claims
34. October 26, 2013: Pentagon agency creating digital map of the world
35. October 27, 2013: 12yo Canadian boy hacked Govt sites, gave info to Anonymous
36. October 27, 2013: A Hacker Group Just Compromised a Page on Barack Obama’s Website
37. October 28, 2013: US State Department lacks any cyber-security whatsoever – report
38. October 28, 2013: Barack Obama’s social accounts target of Syrian Electronic Army
39. October 28, 2013: U.K. phone-hacking trial opens for top Murdoch aides
40. October 28, 2013: ObamaCare website suffers new outage
41. October 29, 2013: Nasdaq says “human error” to blame for earlier index data outage
42. October 30, 2013: L.A. sets up command center to combat cyber-attacks
43. October 31, 2013: Vandals spray swastikas over lenses of three speed cameras
44. November 1, 2013: ‘Anonymous’ hack Singapore newspaper’s website
45. November 2, 2011: 20 U.S. And Latin American Cities Host “Hackathon’ To Help Migrants
46. November 3, 2013: Hackers deface dozens of websites in Australia, Philippines
47. November 4, 2013: Thieves swipe school-issued iPads
48. November 5, 2013:
Govt Agencies Have No Way of Warning Each Other About a Cyber Attack
49. November 6, 2013: WEEEEEEE?! FOX news website features headlines, ‘tech error’ blamed
50. November 11, 2013: Anonymous factions threaten cyber-war on one another over anti-NSA hacks
51. November 12, 2013: US-Israeli computer super-worm hit Russian nuclear plant – Kaspersky
52. November 12, 2013: Stuxnet virus has infected the International Space Station
53. November 12, 2013: Is Cyber War Around the Corner?
54. November 14, 2013: FBI: Cyber-attacks surpassing terrorism as major domestic threat
55. November 14, 2013: Hackers accessing info via baby monitors
56. November 14, 2013: Official: Hackers tried repeatedly to attack Obamacare website
57. November 14, 2013: Anonymous: False Flag attack on Citi Bank Building downtown LA (VIDEO)
58. November 15, 2013: ‘Anonymous’ big gets 10 years for hacking FBI
59. November 15, 2013: B.S. ‘Anonymous’ Claim of 9/11 Style Attack in L.A. Today Goes Viral
60. November 16, 2013: FBI: Anonymous engaged in year-long campaign targeting US Govt
61. November 17, 2013: Anonymous hacking group targeting government websites, FBI warns

[Does not purport to be a complete list of events or headlines]

IV. THE BLACKOUT:

4.1: What is an EMP?
An
electromagnetic pulse (EMP) is a burst of electromagnetic radiation which usually results from a high energy nuclear explosion that suddenly fluctuates the magnetic field. Theoretically, an EMP could wipe out everything electronic (planes, trains, cars, computers, internet, etc.) in a flash. EMP terror has gained popularity of late and has been featured in movies such as “The Matrix” and television shows such as “24” and the #1 show on NBC entitled “Revolution”, which eerily features a post-EMP America with no electricity. Aside from the Hollywood EMP propaganda, there has been recent EMP terror legislation by the U.S. congress, a number of EMP terror conferences, and EMP terror scholarly whitepapers which have all been preparing local, state and federal officials for an upcoming EMP terror attack on America. Based on the 12 major power outages in 2012 alone, it appears that the U.S. government is programming the public for the permanent loss of electricity. Coincidentally, in September of 2012, Alex Jones of Infowars released a new magazine which indicates that the STRATFOR intelligence operation known as Infowars knows that the internet is about to expire and have planned ahead by launching a new propaganda magazine. In the propaganda film entitled “Red Dawn” (2012), (See: Trailer) a group of American youth out partying after a football game, suddenly find themselves in the middle of a major blackout, likely from an EMP attack.

4.2: Blackout Deja Vu
If and when a major cyber-terror attack occurs, it will most likely involve a lengthy blackout of the electrical grid. Predictably, it was reported on April 26, 2013, that the former CIA Director stated that the U.S. electrical grid is vulnerable to attack. Roughly 6 months later on October 17, 2013, that U.S. utilities are a “soft underbelly” for hackers. As evidenced, “blackouts” have been trending starting on November 1, 2012, just days prior to the 2012 Presidential Election, when Hurricane Sandy allegedly cut off electricity to roughly 600,000 customers, including the New York skyline. Roughly 3 months later on February 3, 2013, Super Bowl XLVII was blackout for 34 minutes due to an alleged power outage. Coincidentally, on September 1, 2013, former NFL star Ray Lewis had stated that the Super Bowl blackout was conspiracy against the Baltimore Ravens, his former team. Only 4 day later on September 5, 2013, just prior to the 2013 NFL’s kick-off game between the Denver Broncos and the Baltimore Ravens, the game was postponed by the NFL for roughly 30 minutes due to non-existent lightening.

Blackouts Trending:

1. August 27, 2013: Man Steals Bucket Truck Causing Power Blackout (Elmont, New York)
2. September 3, 2013:
Venezuela Hit by Blackout, Govt Blames ‘Sabotage’ (Caracas; Venezuela)
3. September 5, 2013:
Nelson Mandela’s Home Hit by Power Cut (Johannesburg, South Africa)
4. October 16, 2013:
Power Outage at Tigers-Red Sox Game (Detroit, Michigan)
5. October 20, 2013:
East Coast Internet Traffic Is Restored (East Coast of U.S.)

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the 2013 global bio-terror pandemic. To date, Truther.org has identified and exposed over 50 Obama sanctioned terror plots, as well as the Alex Jones’ links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. State-Sponsored Terror Threat Assessments (SSTTA), assertions, and forecasts made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically occur based on the cited date. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl XLV Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

Truther RSS

EMP NY

Download & Forward PDF

UPDATE 2: Within 24 hours of being unable to execute the Syrian Electronic Army cyber-terror attack depicted herein, Obama officially hinted that he may abanodon a strike on Syria altogether.

UPDATE 1: Less than 24 hours after the following Truther.org report was published, the LADEE spacecraft quickly “ran into equipment trouble” after its launch into space. According to the report, the “problem needs to be resolved in the next two to three weeks”, potentially indicating that the mission is doomed and that the spacecraft will eventually self-destruct. 

David Chase Taylor
September 6, 2013
Truther.org

SWITZERLAND, Zürich — Unable to conduct their Al Qaeda/Syrian Rebel chemical terror attack on America soil on August 24, 2013, the Obama administration and it’s rabid Zionist puppeteers have once again had to rewrite the Syrian terror narrative. While Obama waits to receive U.S. Congressional approval for his premeditated attack on Syria, it’s quite clear that the administration lacks both international and domestic support for a new war.

Download & Forward PDF

Therefore, the real terrorists must somehow radically alter public opinion and the best way to do that is by conducting a major false-flag terror operation. A new terror attack would galvanize support for Obama globally while simultaneously giving him the green light to attack American gun owners at home with unmanned drones. Naturally, this type of aggression by Obama would spark a civil war—exactly what it’s intended to do.

The Nuclear “Minotaur V”
Based on breaking news and events, it appears that there is a real possibility of a major state-sponsored cyber-terror attack targeting the Minotaur V rocket launch and the U.S. power grid. According to NASA, on September 6, 11:27 p.m. (EDT), the Minotaur V rocket will launch from the Mid-Atlantic Regional Spaceport Pad 0B at the Wallops Flight Facility in Virginia. Minotaur V will allegedly be carrying the Lunar Atmosphere and Dust Environment Explorer (LADEE) satellite into orbit. The Minotaur V was derived from the Minotaur IV, itself a derivative of the nuclear LGM-118 Peacekeeper ICBM. Minotaur V’s launch will be the first lunar mission to be launched from Virginia and is anticipated to be visible along much of the eastern seaboard from New York to Virginia. Why this particular rocket is being launched from Virginia as opposed to Florida is highly suspicious, especially considering the launch is scheduled for a Friday night in a calculated move to gain the most “live” viewers. Should the rocket be attacked, it is possible that its explosion could have an EMP-like effect as a burst of electromagnetic nuclear radiation causes a blackout of the U.S. electrical grid over New York City and a majority of the East Coast.

Resurrecting Obama
As luck would have it; the eyes of the sporting world will be focused on New York City as it hosts the 2013 U.S. Open until September 9, 2013. Coincidentally, Obama will be in attendance at the G-20 Summit in Saint Petersburg, Russia until at least September 6, 2013, so it would be the perfect opportunity for him to grandstand and act “presidential” in the wake of an unprecedented terror attack. Although numerous cyber-patsies have been primed for such an event, the attack will likely be blamed on Syrian Electronic Army who were conveniently added to the FBI’s wanted list on September 6, 2013. If the Minotaur V rocket launch is suddenly canceled or postponed, it will most likely indicate that the payload had been changed and the terror plot was canceled.

Bent Spear 2013
A Bent Spear refers to incidents involving nuclear weapons, warheads, components or vehicles transporting nuclear material which violate or breach handling or security regulations. For only the second time in history, a “bent spear” was reported on September 3, 2013, when Inforwars/STRATFOR released a propaganda article entitled “Exclusive: High Level Source Confirms Secret US Nuclear Warhead Transfer” which stated that a U.S. nuke was on the loose and was headed to South Carolina. Two days later on September 5, 2013, Infowars/STRATFOR released another report entitled “Sen Graham Warns of Nuke Strike After Missing Warheads Report” in which Lindsay Graham reiterated the fear mongering propaganda report in further collusion between the Obama administration and Alex Jones. In the wake of an EMP-like nuclear blast over the East Coast, it is highly likely that Jones will state that this missing nuke was used in the attack.

Cyber-Terror Drill: “GridEx II”
In apparent preparation for a massive cyber-terror attack targeting the U.S. power grid, on August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “…Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyberattacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”

DHS Warns of Major Cyber-Terror Attack
As is generally par for the false-flag terror course; governmental agency heads tend to foreshadow major terror events in a calculated bid to gain plausible deniability. On August 27, 2013, former U.S. Department of Homeland Security (DHS) Chief Janet Napolitano explicitly warned that the DHS must prepare for an inevitable large-scale cyberattack against the United States and that her new successor should move fast to strengthen the nation’s cyber-defenses. At Napolitano’s farewell speech at the National Press Club, she stated: “Our country will, at some point, face a major cyber-event that will have a serious effect on our lives, our economy and the everyday functioning of our society. While we have built systems, protections and a framework to identify attacks and intrusions, share information with the private sector and across government, and develop plans and capabilities to mitigate the damage, more must be done, and quickly”. Recent headlines in respect to cyber-related terror attacks and hackers indicate that cyber-terrorism is blinking red on every level.

Cyber-Terror Attack Headlines:

1. August 22, 2013: Nasdaq: ‘Connectivity Issue’ Led To Three-Hour Shutdown
2. August 23, 2013: Anonymous Trolls FBI, Releases Contact Data For All Fed Employees
3. August 24, 2013: Mysterious Computer Glitch Hits Gitmo 9/11 Tribunal
4. August 27, 2013: Napolitano warns large-scale cyberattack on US is inevitable
5. August 27, 2013: ‘Largest Hack’ In Chinese History Has Beijing Stumped
6. August 27, 2013: Syrian Electronic Army Takes Down New York Times Website And Twitter
7. August 28, 2013: ‘N.Y. Times’ Blames Hackers In Latest Website Crash
8. September 2, 2013: Pro-Syrian Group Hacks U.S. Marines Website
9. September 5, 2013: Romanian Hackers Get Hefty Sentences In New Hampshire

[Does not purport to be a complete list of events or headlines]

Cyberattack Propaganda Report
In blatantly naked programming for an impending cyber-terror  attack, on September 6, 2013, a USA Today propaganda report entitled “How Prepared Are You For A Cyberattack?” was published. According to the report, most major U.S. companies have been under siege by hackers over the last 18 months. Only two days after Janet Napolitano’s speech warning of an impending cyberattack, a hacker group called the Syrian Electronic Army hacked the New York Times’ website and their Twitter, for the second time in 2013. The report depicts a grim post-cyberattack world: “Imagine waking up one morning with no power. Cellphones can’t connect, banks are closed, the Internet is down and credit cards don’t work. In localized emergencies, workers from other areas help to restore services quickly. A cyberattack could affect wide regions of the country, overwhelming the available manpower. It could take days, weeks or months for basic services to be fully restored. Not a pretty picture”.

Cyber Doomsday
Since June of 2012, numerous propaganda articles have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, “Threat Of ‘Spectacular’ Cyberattack Looms” and “U.S. Homeland Chief: Cyber 9/11 Could Happen “Imminently“, all indicate that an unprecedented act of state-sponsored cyber-terror upon the United States is imminent. Exactly how a cyber-Doomsday will manifest itself is unknown, but “Live TV” cyber-terror attack appears to be the working plan at this given time.

A Potential Motive
In the aftermath of a major cyber-attack on the United States emanating from Syria, a plausible motive for the attack must be floated to the public by the media. Coincidentally, on August 29, 2013, a report entitled “Satellites Over Pakistan Guided Bin Laden Raid, Leaked NSA Documents Say” was published which stated that a fleet of NSA satellites collecting electronic intelligence over Pakistan guided the raid by U.S. Navy SEALs that allegedly killed Osama bin Laden. Regardless of the fact that bin Laden was reported killed on December 26, 2001, the NSA satellites purportedly tracked phone and communications among al Qaeda operatives, ultimately linking them to the Abbottabad, Pakistan compound where bin Laden allegedly was hiding. Whether or not the a future Syrian based cyber-attack will be blamed on the Assad regime or the Syrian Rebels is not known, but sympathy for bin Laden could serve as a potential motive in either case.

I. CYBER-ATTACK PATSIES:

Cyber-Terror Patsies
In the aftermath of major state-sponsored terror attacks, intelligence agencies such as the CIA and the FBI like to have at least three or four different sets of well-groomed patsies. This allows for flexibility when it comes to arrests, propaganda, and an inevitable response. In respect to cyber-terror, Truther.org has identified at least 4 patsies (e.g., the Syrian Electronic Army, Anonymous, the Unknowns, and China) which could ultimately be blamed in the wake of an attack on a NASA ICBM rocket launch.

Syrian Electronic Army (SEA)
As previously mentioned, the Obama administration was unable to conduct the Al Qaeda/Syrian Rebel chemical attack on America soil on August 24, 2013, and therefore they now need a new reason to attack Syria. Coincidentally, on September 6, 2013, a report entitled “FBI Adds Syrian Electronic Army To Wanted List” stated that the Syrian Electronic Army (SEA), an alleged group of hackers sympathetic to Syrian President Bashar Assad, has been added to the FBI‘s most wanted list. According to the report, the SEA is responsible for major cyberattacks on the New York Times, their Twitter, the Huffington Post, the U.S. Marine Corps, the Washington Post, Thomson Reuters and the Associated Press’ Twitter feed. As a result of AP Twitter attack, the Associated Press falsely reported that President Obama had been injured in a surprise attack on the White House, causing a brief panic online. The tweet caused the U.S. stock market to fall by over 150 points.

Syrian Cyber War Trending
Based on breaking news and events, it’s quite likely that the Syrian Electronic Army (SEA) will be implicated in the aftermath of the next major cyber-attack, ultimately giving Obama the reason he so desperately needs to attack Syria. As evidenced below, Syrian hackers have been implicated in at least 7 cyber-related attacks on U.S. based entities within just the last 30 days.

Syrian Electronic Army:

1. August 15, 2013: CNN, Washington Post, Time Hacked By Syrian Electronic Army
2. August 27, 2013: Syrian Electronic Army Takes Down New York Times Website And Twitter
3. August 28, 2013: Obama Hits Pause On U.S. Action In Face Of Crippling Cyber Strikes From Syria
4. August 30, 2013: Syria’s Cyber Retaliation Signals New Era Of Warfare
5. August 31, 2013: Syria Facing U.S. Cyber Attacks In Upcoming Strikes
6. September 2, 2013: Pro-Syrian Group Hacks U.S. Marines Website
7. September 4, 2013: Syrian Electronic Army Denies Being Attacked By Anonymous
8. September 6, 2013:
FBI Adds Syrian Electronic Army To Wanted List
9. September 6, 2013:
FBI Warns Of Syrian Electronic Army Hacking Threat

[Does not purport to be a complete list of events or headlines]

U.S. Domestic Patsies
As depicted in the September 6, 2013, report entitled “FBI Adds Syrian Electronic Army To Wanted List”, the Federal Bureau of Investigation (FBI) has stated that any U.S. citizen found to be aiding the Syrian Electronic Army (SEA)hackers will be investigated as a terrorist. In the wake of a Syrian based cyberattack, it should come as no surprise if Americans are implicated. Linking the Syrian Rebels to American patriots who come from the Rebel South has been the working plan since the U.S. went into Libya a week after the failed nuclear terror attack on Super Bowl XLV on February 6, 2011. Coincidentally, on September 6, 2013, it was reported that SWAT teams in Florida are conducting terror drills against “native-born America-hating terrorists”  further indicating that innocent American citizens will be targeted in the aftermath of a major cyber-related terror attack.

Tri-State Hackers
In the aftermath of a major false-flag cyber-attack targeting a rocket from Virginia flying over New York, hackers would be likely be arrested and implicated in the attack. Recent news stemming from the tri-state region suggests that a number of potential patsies have already been primed for the attack. On August 27, 2013, it was reported a Metropolitan Transportation Authority (MTA) worker stole a bucket truck from its facility in Jamaica, Queens, around 4 a.m. According to the report, the driver extended its boom and drove off, pulling down a dozen utility poles and knocking out power to more than 6,000 customers around Elmont, New York. The bucket truck and several welding machines were reportedly discovered missing at 6 a.m. Although it was unclear whether the incident intentional or accidental, police allegedly arrested the driver and charges are pending. Two days later on August 29, 2013, it was reported that large amounts of copper were stolen from Fort Monroe buildings in Hampton, Virginia. According to the report, the purported theft was bold because Hampton has a police officer who patrols the fort 24 hours a day. Whether or not the two previous cases have anything to do with the Brooklyn Bridge incident (see below) is not known, but any suspicious activity in the target area that have to do with electrical components, communication, military bases and welding machines is highly suspect.

Brooklyn Bridge Mystery Man
If a successful cyber-attack was launched against the Minotaur V rocket, it’s theoretically possible that the hackers would have set-up a homing device to guide the rocket to a particular target location such as the Empire State Building, the Freedom Tower, the U.S. Open, or the Brooklyn Bridge.  Coincidentally, on July 4, 2013, it was reported that witnesses saw a man rappelling down from the Brooklyn Bridge in New York City. Interestingly, the bridge was “under construction” at the time of the incident. Whether or not the construction compromised the structural integrity of the bridge is not known, but the timely closure could have theoretically provided cover for the installation of demolition explosives in and around the Brooklyn Bridge. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a terrorist attack. Prior to a high-profile terror attack on the Brooklyn Bridge, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “The Dark Knight Rises” (2012) is a film (see trailer) which depicts the Brooklyn Bridge as the target of a major terror attack.

“The Unknowns”
Prior to a major domestic cyber-related terror attack, the government must first create trade-specific patsies who will later take the blame. On May 3, 2012, a report entitled, “New ‘Unknowns’ Hacking Group Hits NASA, Air Force, European Space Agency” was published which stated that a group calling itself “The Unknowns” had published a list of passwords and documents reportedly belonging to NASA, the European Space Agency and the U.S. Air Force, among other high-profile government targets. Although no one from the Unknowns has been implicated in the May 2013 attacks, they could be the top suspect in future NASA related cyber-attacks.

“Anonymous”
In more apparent foreshadowing of cyber-related event to come, on July 17, 2013, a report entitled “#Nov5th 2013: Anonymous Pledges To Hack Govt Websites Globally On Guy Fawkes Day” was published which reported that the government hacking group known as “Anonymous” is actively seeking to launch a cyber-attack in the next few months. Whether or not they will stick to the date of November 5, 2013 is not known, but due to their popularity as an anti-government entity, they would be an easy scapegoated for any future cyber-related attack.

“China “
The nation of China has been directly implicated in multiple cyber-related attacks on NASA, U.S. satellites, and the International Space Station. Should future space terror strike America, there is a good possibility that China could be scapegoated for the attacks. On October 28, 2011, it was reported that Chinese hackers may have interfered with two US satellites on four separate occasions. Five months later on March 1, 2012, it was reported that a laptop stolen from NASA last year was unencrypted and contained command and control codes for the International Space Station on it. The particular laptop in question was one of 48 NASA notebooks or mobile devices stolen between April 2009 and April 2011. Although China has not been directly implicated in the thefts, based on their cyber-related crimes against NASA, they are the top suspect. Six days later on March 7, 2012, it was reported that Chinese hackers had gained ‘full access’ to the computer network in one of NASA’s key control centers, the Jet Propulsion Laboratory (JPL). The JPL manages 23 spacecraft on active space missions, including missions to Jupiter, Mars and Saturn.

II. BLACKOUT:

Blackout Deja Vu
In the aftermath of a successful cyber-attack against the Minotaur V rocket, it is highly plausible that the exploding rocket and satellite will emit EMP-like waves which inevitably be blamed for a subsequent blackout. Blackouts are just another form of state-sponsored terrorism and have been trending as of late. For example, on November 1, 2012, just days prior to the 2012 Presidential Election, Hurricane Sandy allegedly cut off electricity to roughly 600,000 customers, including the New York skyline. Roughly 3 months later on February 3, 2013, Super Bowl XLVII was blackout for 34 minutes due to an alleged power outage. Coincidentally, on September 1, 2013, former NFL star Ray Lewis had stated that the Super Bowl blackout was conspiracy against the Baltimore Ravens, his former team. Only 4 day later on September 5, 2013, just prior to the 2013 NFL’s kick-off game between the Denver Broncos and the Baltimore Ravens, the game was postponed by the NFL for roughly 30 minutes due to non-existent lightening. Predictably, the Super Bowl blackout was r discussed at length on the television broadcast, ultimately rehashing the blackout for millions of fans the day before the scheduled rocket launch in Virginia.

What is an EMP?

An electromagnetic pulse (EMP) is a burst of electromagnetic radiation which usually results from a high energy nuclear explosion that suddenly fluctuates the magnetic field. Theoretically, an EMP could wipe out everything electronic (planes, trains, cars, computers, internet, etc.) in a flash. EMP terror has gained popularity of late and has been featured in movies such as “The Matrix” and television shows such as “24” and the #1 show on NBC entitled “Revolution”, which eerily features a post-EMP America with no electricity. Aside from the Hollywood EMP propaganda, there has been recent EMP terror legislation by the U.S. congress, a number of EMP terror conferences, and EMP terror scholarly whitepapers which have all been preparing local, state and federal officials for an upcoming EMP terror attack on America. Based on the 12 major power outages in 2012 alone, it appears that the U.S. government is programming the public for the permanent loss of electricity. Coincidentally, in September of 2012, Alex Jones of Infowars released a new magazine which indicates that the STRATFOR intelligence operation known as Infowars knows that the internet is about to expire and have planned ahead by launching a new propaganda magazine. In the propaganda film entitled “Red Dawn” (2012), (See: Trailer) a group of American youth out partying after a football game, suddenly find themselves in the middle of a major blackout, likely from an EMP attack.

Blackouts Trending:

1. August 27, 2013: Man Steals Bucket Truck Causing Power Blackout (Elmont, New York)
2. September 3, 2013: Venezuela Hit By Blackout, Govt Blames ‘Sabotage’ (Caracas; Venezuela)
3. September 5, 2013: Nelson Mandela’s Home Hit By Power Cut (Johannesburg, South Africa)

Conclusion
To date, Truther.org has thwarted two major state-sponsored nuclear terror attacks by the Obama administration (i.e., “Super Bowl XLV Nuclear Terror Plot” and the “Live TV” Cyber-Hijack With “Live” Nuclear Detonation”). Realistically speaking, the only way to defeat the current establishment is with information, for it kills both terrorists and dictators alike. It is imperative to remember that violence of any kind MUST be avoided at all costs for it plays right into their hand. By educating yourself and those around you, America and the world will inevitably see who is really pulling the strings of terror.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the 2013 global bio-terror pandemic. To date, Taylor has exposed over 50 Obama sanctioned terror plots, as well as Alex Jones’ affiliation to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. Terror related assertions, forecasts and predictions made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically happen based on the cumulative terror related data. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl XLV Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Namaste

Chinese Drone Attack

Download & Forward PDF

David Chase Taylor
March 31, 2013
Truther.org

Based on recent news and events, it is highly likely that China will launch a “surprise” attack against the United States. For those who think a Chinese attack on the U.S. is laughable, consider the following: On September 30, 2012, it was reported that the White House was attacked by hackers allegedly linked to China’s government.

This unprecedented cyber-terror attack targeted the U.S. government’s most sensitive computer networks, ultimately breaching a system used by the White House Military Office for nuclear commands. The Chinese sneak attack is slated to be eerily reminiscent of the December 7, 1941, Japanese attack on Pearl Harbor, and will undoubtedly be the spark which ignites the World War III scenario between the U.S. and China.

Download & Forward PDF

This multifaceted attack will most likely involve a cyber-attack against U.S. financial interests (stock markets and banks), and an EMP attack targeting U.S. military radar and satellites ultimately leaving the U.S. electronically blind to a Chinese stealth drone attack on U.S. military bases in the Pacific, namely Pearl Harbor in Hawaii, the home state of U.S. President Obama. This sneak attack was first exposed in the November 31, 2012, report entitled “Red Dawn Scenario: Chinese Attack On America Imminent”. Since this watershed report was released, there have been countless accusations by the U.S. against China in respect to cyber espionage and cyber-attacks allegedly stemming from the Chinese military. To add more fuel to the fire, it was reported on March 21, 2013, that China had conducted a massive cyber-terror attack on South Korea, a close U.S. ally in the region.

Since June of 2012, numerous propaganda articles have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, “Threat Of ‘Spectacular’ Cyberattack Looms” and “U.S. Homeland Chief: Cyber 9/11 Could Happen “Imminently“, all indicate that an unprecedented act of state-sponsored cyber-terror upon the United States is imminent.

ENCLOSED CHAPTERS:

1. Chinese Drone Attack
2. Chinese Cyber-Terror Attack
3. Chinese EMP Attack
4. World War III Scenario: U.S. Versus China  

1. Chinese Drone Attack:

1.1: Surprise “Aerial Attack” Propaganda Films

Prior to a high-profile aerial attack on the Pacific Coast of the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are taken by surprise and viciously attacked. If and when this terror programming will manifest in reality is unknown, but it is definitely in the terror cards.

1.2: China’s Cyber/Drone Attack
On March 13, 2013, it was reported that China is building one of the world’s largest drone fleets aimed at attacking the United States in the event of a war. According to the report, “The Chinese military envisions its drone swarms scouting out battlefields, guiding missile strikes and overwhelming opponents through sheer numbers. China’s military-industrial complex has developed homegrown drones to accomplish these goals, according to the report released on March 11, 2013, by the Project 2049 Institute. “The PLA now fields one of the world’s most expansive UAV [unmanned aerial vehicle] fleets,” said Ian Easton and L.C. Russell Hsiao, researchers at the Project 2049 Institute and authors of the new report. The Project 2049 Institute report warned that China could consider “plausibly deniable” drone attacks blamed upon mechanical failure or cyberhackers. The drones could act as decoys, use electronic warfare to jam communications and radar, guide missile strikes on carriers, fire missiles at U.S. Navy ships or dive into ships like kamikaze robots.

1.3: China’s “Stealth” Drones
The report by Project 2049 goes on to state that China is developing drones such as the rumored “Dark Sword” stealth drone that have low radar profiles to escape radar detection and that Chinese engineers have even begun working on drones that have the software brains to fly in formation, do aerial refueling and takeoff and land autonomously. The report goes on to cautions the U.S. military to prepare for the worst-case scenario by hardening its existing air bases in Asia.

1.4: South Korea Developing “Kamikaze” Attack Drones
China is not alone in its quest for kamikaze drones. October 9, 2012, it was reported that a suicide drone capable of striking North Korea is under development in South Korea. According to the report, the “Devil Killer” can reach speeds of approximately 250 mph, carry an explosive payload, automatically identify targets, as well as undertake an automatic strike or a manually executed one. The Devil Killer can theoretically strike a target 25 miles away in about 10 minutes and is expected to be deployed by 2015. This development is an obvious threat and provocation to North Korea and will likely be cited as one of the main justifications for a future North Korean biological and/or chemical attack on South Korea.

1.5: North Korea’s “American-Made” Drones
North Korea is also attempting to secure “kamikaze” like drones. On February 6, 2012, it was reported that North Korea, by way of Syria, had purchased numerous high-speed American-made target drones with the intent of developing new drones based off the technology. According to the report, North Korea has already conducted numerous tests on high-speed drones mounted with high explosives and that the “North appears likely to deploy [the drones] near the inter-Korean border to target South Korean troops stationed on border islands in the Yellow Sea”.

1.6: Chinese Attack on Hawaii?

On November 5, 2012, it was reported in an article entitled “Red Flag Over The Atlantic: China Is Angling To Take Over A U.S. Airbase In The Azores” that “Chinese planes could patrol the northern and central portions of the Atlantic and thereby cut air and sea traffic between the U.S. and Europe” and that “China could target the American homeland…Lajes is less than 2,300 miles from New York, shorter than the distance between Pearl Harbor and Los Angeles”. While the aforementioned scenario is laughable and an obvious decoy, Pearl Harbor in the U.S. state of Hawaii is the most likely target. After all, history has a tendency to repeat itself.

1.7: A New Pearl Harbor
Based on recent military drills and maneuvers, an attack by China on the U.S. island of Hawaii (President Obama home state) is highly likely. A new Pearl Harbor would destroy a key U.S. foothold in the Pacific as well as remind Americans of when the Japanese attacked Pearl Harbor on December 7, 1941. In order to pull this sneak attack off, the Chinese would have to blind America electronically with an EMP/cyber-attack prior to any aerial drone attack. On August 13, 2012, it was reported that China had launched the “Bahai Sea Green Pearl”, a 36,000-ton ferry and cruise  ship commissioned in August of 2012 at Yantai Port in China’s northeastern Shandong Province. The ship is intended to ferry cars and passengers across the Yellow Sea, but when needed by the People’s Liberation Army, the “Green Pearl” can double as a troop carrier. Visually, the “Green Pearl” looks just like any other civilian cruise ship and could easily be used to secretly transport Chinese troops to Hawaii or the U.S. mainland in a surprise attack. Two months later on October 15, 2012, it was reported that one of China’s seven military command groups had held a joint military drill involving infantry, artillery and air forces to improve the ability of paratroops to land on and capture an island.

2. Chinese Cyber-Terror Attack:

2.1: China & Cyber Terror
The nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. Based on recent news and events, China, more than any other nation, is sure to be scapegoated in the aftermath of a cataclysmic cyber-terror attack against the United States. On October 5, 2011, U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two U.S. satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyber espionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta recently stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to clamp down on aggressive Chinese cyber-attacks against American companies and the U.S. government.  On October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.

2.2: Cyber Terror Target: U.S. Economy
Since 2010, there has been literally hundreds of cyber-attacks, a good many of them against the U.S. financial sector. In a 2007 CRS Report for Congress entitled “Terrorist Capabilities For Cyber-Attack: Overview And Policy Issues”, the U.S. government states that, “If terrorists [China] were to launch a widespread cyberattack against the United States, the economy would be the intended target for disruption” and that “…many security experts also agree that a cyber-attack would be most effective if it were used to amplify a conventional bombing or CBRN (chemical, biological, radiological or nuclear attack)”. Authorities have also expressed concerns about terrorists combining physical attacks such as bombings with hacker attacks to disrupt rescue efforts, known as hybrid or “swarming” attacks.

2.3: Financial Cyber Terror Blinking Red
Based on unprecedented financial cyber-terror propaganda and the recent rash of suspects and patsies arrested for financial cyber-terror related crimes, financial cyber-terror is blinking red on every level. On April 24, 2012, it was reported that Osama bin Laden was looking for a follow-up terror attack to doom the American economy, so a cyber-terror attack targeting U.S. banks and Wall Street hijacking trillions of dollars and dooming the American economy is definitely in the cards. To date, individuals have been arrested for numerous cyber-terror related crimes such as credit and debit card PIN theft, theft of proprietary software code from the Federal Reserve Bank of New York, illegal reproduction and distribution of more than 100 copyrighted commercial and financial business software programs, malware SpyEye used to steal and use personal banking and credit card data from unsuspecting victims’ online accounts, and the former head of fraud and security for digital banking at Lloyds Bank admitted to committing £2.5 million fraud. In other words, everything needed to commit the greatest bank heist ever is conveniently in place. Coincidentally, governments around the world have been executing financial cyber-terror drills in which hackers hijack trillions of dollars with no trace.

2.4: The Chase Bank “$0.00” Balance Beta-Test
On March 18, 2013, it was reported that millions of Chase Bank customers across the U.S. who use online and mobile banking saw their checking and savings accounts with a zero balance. Although this unprecedented electronic banking event was chalked up to being an “internal glitch”, it was most likely a beta-test to gage the American public’s reaction to a future cyber terror attack in which they are suddenly faced with the reality of losing their entire life’s saving. The beta-test was then used as a psychological marker of things to come as media operatives worldwide collectively prepped their respective audiences for an upcoming financial related cyber-heist that will most likely be blamed on China. “We have a technology problem regarding customers’ balance information,” Chase said in a statement. “It has nothing to do with cyber threats. It is an internal issue. We are very sorry to our customers for the inconvenience…It is not confined to the West Coast.”

3. Chinese EMP Terror Attack:

3.1: Chinese EMP Terror Attack
If the EMP terror propaganda is to be believed, a single Chinese EMP could destroy America, ultimately causing a nightmare worse than 9/11 and would result in an America with no power, no food, no transportation, no banking and no internet. Based on the recent news and events, it is highly likely that the Chinese EMP attack will target U.S. military radar and satellite installations in the Pacific, ultimately leaving the U.S. electronically blind to a Chinese aerial attack.

3.2: China’s EMP Quest

In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it is stated that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Adm. Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If U.S. propaganda is to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

3.3: Chinese “Mystery Missile” EMP Attack?
On November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. The U.S. government denied that they were responsible for the missile, but a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. or Chinese military attacked the “Carnival Splendor” with an EMP missile and the U.S. sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. fired EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

4. The World War III Scenario:

4.1: United Stated Versus China  
Inflammatory war propaganda, rising diplomatic tensions between the U.S. and China along with unprecedented U.S. propaganda against China indicates that World War III scenario between the United States and China is on the horizon. On June 4, 2012, it was reported that the Australian government’s Defense White Paper published in 2009 contained a “secret chapter” that assessed “Australia’s ability to fight an air-sea battle alongside the United States against China”. A few weeks later on June 27, 2012, Chinese general Peng stated that a future conflict with the United States is coming as a result of U.S. “containment” policy. Peng was then quoted as saying: “The United States has been exhausting all its resources to establish a strategic containment system specifically targeting China” and that “The contradictions between China and the United States are structural, not to be changed by any individual, whether it is G.H.W. Bush, G.W. Bush or Barack Obama, it will not make a difference to these contradictions.”

About the Author
David Chase Taylor, the editor-in-chief of Truther.org, is an American journalist living in Zürich, Switzerland, where he has applied for political asylum after the release of The Nuclear Bible, a book credited with stopping a false-flag/state-sponsored nuclear terror attack upon America. Taylor has also released The Bio-Terror Bible, a book and website exposing the coming global bio-terror pandemic. Taylor has also been credited with exposing the 2012 DNC Terror Plot, the “Twilight” Premier Terror Plot, and the Alex Jones links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. Terror related assertions, forecasts and predictions made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically happen based on the cumulative terror related data. Historically, once a major false-flag terror plot is exposed (see: Super Bowl Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Namaste.

Chinese Red Dawn by December 21, 2012

Chinese Red Dawn Imminent

Truther.org
November 30, 2012
David Chase Taylor

With no major Obama terror attack to date, it appears that the Obama Administration and its Zionist controllers have stuck a deal with China to allow for the “controlled” attack and the potential invasion of sovereign U.S. territory. A Chinese surprise attack is imminent and will most likely come in the form of a combined EMP terror attack, cyber-terror attack, and physical attack via manned aircraft and drones against U.S. military bases, cities and infrastructure in Hawaii and other U.S. coastal cities.

If the EMP terror propaganda is to be believed, a single Chinese EMP could destroy America, ultimately causing a nightmare worse than 9/11 resulting in an America with no power, no food, no transportation, no banking and no internet. To those who think a Chinese attack on the U.S. is laughable, consider this: On September 30, 2012, it was reported that the White House was attacked by hackers allegedly linked to China’s government. The unprecedented cyber-terror attack targeted the U.S. government’s most sensitive computer networks, ultimately breaching a system used by the White House Military Office for nuclear commands.

Download & Forward PDF

Unprecedented war propaganda, rising diplomatic tensions between the U.S. and China along with unprecedented U.S. propaganda against China indicates that World War III scenario between the United States and China is on the horizon. On June 4, 2012, it was reported that the Australian government’s 2009 Defence White Paper contained a “secret chapter” that assessed “Australia’s ability to fight an air-sea battle alongside the United States against China”. Then on June 27, 2012, Chinese general Peng stated that a future conflict with the United States is coming as a result of U.S. “containment” policy. “The United States has been exhausting all its resources to establish a strategic containment system specifically targeting China…The contradictions between China and the United States are structural, not to be changed by any individual, whether it is G.H.W. Bush, G.W. Bush or Barack Obama, it will not make a difference to these contradictions.”

This Truther.org terror warning is complex and interconnected and therefore can only be understood once all the following chapters are reviewed, confirmed and understood:

1. Rise of China
2. China & EMP Warfare
3. China & Cyber Terror
4. China & Space Terror
5. U.S. Landmarks Slated for Demolition

China Can’t Invade America
China, despite its 2.3 million man military, cannot physically occupy the continental Unites States. As General Isoroku Yamamoto, Fleet Admiral and Commander-in-Chief of the Imperial Japanese Navy (IJN) during World War II, once stated, “You cannot invade the mainland United States. There would be a rifle behind every blade of grass”. However, the invasion and occupation of Hawaii and select coastal locations such as New Orleans, Houston, San Diego, Los Angeles, San Francisco or Seattle is theoretically possible. Word about the Zionist occupation of America has reached critical mass and it is clear that Americans in both the police and military will not arrest, detain or execute their fellow American citizens. Therefore, a treacherous backroom deal has been struck between the Zionists and China to execute the dirty work that Americans won’t.

The Patriot Trap
In the aftermath of surprise Chinese attack and subsequent invasion, gun-wielding freedom loving patriots from all over America will flock to the coastal hotspots to fight the Chinese occupation. The will allow for the identification, apprehension, internment and subsequent death of potentially millions of American citizens. In the fog of war, it will be almost impossible to know whether these Americans disappeared at the hands of the Chinese or at the hands of the American government. In the end, it doesn’t really matter as both forces will be working together against the American people.

American Terrorists  
Essentially, a surprise Chinese attack and subsequent invasion would serve as both a psychological operation (PSYOP) and military diversion for the U.S. government in order to a) declare martial and seize total power, b) open FEMA camps for mass arrests and detection , and c) to regain public credibility which has been lost since 9/11. Once the patriot trap has served its purpose, so called American freedom fighters waging war against the Chinese government will be labeled as “terrorists” and treated as such. The Chinese invasion scenario depicted herein is essentially the storyline of two major films (see below), and appears to be the operational plan in place at the moment.

“Tomorrow, When the War Began”
In the propaganda film entitled “Tomorrow, When the War Began” (2010), (See: Trailer) a group of Australian youth out camping awake to find the skies full of invading Asian military aircraft, obviously Chinese. Once home, the group finds their homes abandoned, without power, without internet and without telephone. Eventually, the group finds out that the citizens of their town are being detained in FEMA like concentration camps by the invading military force from Asia. The group eventually decides to fight the foreign occupation and begins attacking and terrorizing them with the hope of regaining their freedom and country.

“Red Dawn”
In the propaganda film entitled “Red Dawn” (2012), (See: Trailer) a group of American youth out partying after a football game, suddenly find themselves in the middle of a major blackout, likely from an EMP attack. After returning home, they awake to find the skies full of invading North Korean military aircraft. The group vacates to a cabin and eventually finds out that their friends are being held in FEMA like prison camps. After debating what to do, the group begins plotting ways to attack and terrorize the occupying North Korean military force with the hope of regaining their freedom and country. The North Korea military strike deals with high ranking Americans and the group of youth known as the “Wolverines” are labeled as terrorists.

Terrorism No Longer Working
To date, there have been at least four Obama terror plots which have been foiled: The Super Bowl XLV nuclear terror plot, the 2012 New Year’s Eve dirty bomb plot, the 2012 Democratic National Convention terror plot, and the foiled Twilight Premier Massacre.  After being caught red-handed on multiple occasions, the Obama Administration and its Zionist controllers were so desperate for fresh new ways to terrorize the American public that in October of 2012, they enlisted the help of New York University. According to reports, NYU students were required to write a 10-15 page paper describing how they would hypothetically attack the United States. According to the class’s syllabus, students “must describe your hypothetical attack and what will happen in the aftermath of the attack,” considering how it’s achieved, funded, manned and responded to. The new terror ideas, whatever they may have been, obviously didn’t work and it appears that the tried and true method of full-scale war is back on the table.

China Planning to Attack U.S. Homeland?
On November 5, 2012, an article entitled “Red Flag Over The Atlantic: China Is Angling To Take Over A U.S. Airbase In The Azores” stated that “Chinese planes could patrol the northern and central portions of the Atlantic and thereby cut air and sea traffic between the U.S. and Europe” and that “China could target the American homeland. Lajes is less than 2,300 miles from New York, shorter than the distance between Pearl Harbor and Los Angeles”. The article concludes that “There are undoubtedly other stopgap solutions that the Pentagon could implement. None of them will be perfect, but all of them would be better than having Beijing’s red flag flying over the Atlantic — and permitting Chinese aircraft to patrol the waters connecting America to Europe”.

New Pearl Harbor: Chinese to Attack Hawaii?
Based on recent military drills and maneuvers, an attack by China on the U.S. island of Hawaii is highly likely. A new Pearl Harbor would destroy a key U.S. foothold in the Pacific as well as remind Americans of when the Japanese attacked Pearl Harbor on December 7, 1941. With state of the art radar and satellites, the Chinese will probably have to blind America electronically with an EMP/cyber-attack prior to an attack, or use unconventional means to transport their troops to Hawaii. On August 13, 2012, it was reported that China launched the “Bahai Sea Green Pearl”, a 36,000-ton ferry and cruise  ship commissioned in August of 2012 at Yantai Port in China’s northeastern Shandong Province. The ship is intended to ferry cars and passengers across the Yellow Sea, but when needed by the People’s Liberation Army, the “Green Pearl” can double as a troop carrier. Visually, the “Green Pearl” looks just like any other civilian cruise ship and could easily be used to secretly transport Chinese troops to Hawaii or the U.S. mainland in a surprise attack. On October 15, 2012, it was reported that one of China’s seven military command groups held a joint military drill involving infantry, artillery and air forces to improve the ability of paratroops to land on and capture an island.

Aircraft Carrier Attack?
If propaganda films like “Battleship” (2012) and “Red Tails” (2012) are any indication, high profile attacks on U.S. warships and aircraft carries may be imminent. On November 22, 2012, it was reported that the U.S. Navy is recalling the USS Dwight D. Eisenhower aircraft carrier back to Naval Station Norfolk, Virginia, for repairs. The USS Dwight D. Eisenhower, named after an American World War II hero, is currently stationed in the Persian Gulf but will be home for Christmas to allegedly “repair its flight deck”. On November 29, 2012, it was reported that the U.S.S. Enterprise, the world’s first nuclear-powered aircraft carrier, will retire after 5 decades of service. As of December 1, 2012, the U.S.S. Enterprise, whose name was made globally famous by the television show Star Trek, will also be stationed at Naval Station Norfolk, Virginia. Come December 21, 2012, both the USS Dwight D. Eisenhower and the USS Enterprise, maybe the two most famous ships in America’s history, will essentially become sitting ducks at Naval Station Norfolk, located just outside Washington D.C. Exactly how and when these ships will be attacked is not known, but they are a prime target or state-sponsored terror.

Pakistani Nuke Attack  
On February 1, 2011, Julian Assange of Wikileaks revealed to the world via leaked classified diplomatic documents that Al-Qaida was on the brink of using a nuclear bomb and that the West was on the verge of a “Nuclear 9/11″. What the diplomatic documents failed to mention was actual target, date and location of the upcoming nuclear terror attack which was previously revealed in The Nuclear Bible as Super Bowl XLV on February 6, 2011, in Dallas, Texas. Pakistan, whether they knew it or not at the time, had been set-up for the nuclear attack as they have been directly linked to every single major terror event including the 1993 World Trade Center Bombing, the USS Cole Bombing, the 9/11 attacks, the 7/7 Bombings in London, the Mumbai terror attacks as well as every major act of nuclear proliferation.

Nuclear Endgame: China
According to Wikipedia, since 1950, both China and Pakistan “have placed considerable importance on the maintenance of an extremely close and supportive relationship” and “each considers the other a close strategic ally”.  Had a nuclear attack transpired on Super Bowl Sunday, it is highly likely that a full scale nuclear war between Pakistan and the United States would have ensued, ultimately drawing China in on the side of Pakistan. During an Oval Office meeting on November 25, 2009, U.S. President Barack Obama was quoted as saying, “We need to make clear to people that the cancer is in Pakistan”. Since the nuclear terror plot was foiled, it appears that the nuclear World War III scenario between the U.S. and China will have to be brought about by unconventional means, namely a surprise attack.

1. RISE OF CHINA

1.1: A Chinese
Coup D’état
On September 11, 2012, the mysterious disappearance of then Chinese Vice-President Xi Jinping made international headlines. Shortly thereafter, Chinese President Hu Jintao was not re-elected as a member of the party’s Central Committee and was forced to step down as Communist Party leader. These timely events eventually cleared the way for now President Xi Jinping, a son of the Communist party whose father was a revolutionary hero. The quick and unprecedented shakeup of China’s leadership has fueled speculation and fears of an internal power struggle over the leadership and direction of Chinese government. A November 9, 2012, report entitled “China’s Hu Jintao Warns Party Of Enemy Within”, echoed those sentiments as outgoing President Hu spoke in front of 2,000 delegates at the opening of the 18th Communist Party Congress in Beijing stating that “Combating corruption and promoting political integrity is a major political issue. If we fail to handle it, it could prove fatal to the party and even cause the collapse of the party and the fall of the state. All those who violate party discipline and state laws, whoever they are and whatever power or official positions they have, must be brought to justice without mercy,” he warned. What direction President Xi Jinping will take China is still unknown, but it appears that World War III is on the horizon.

Potential Chinese Targets:
1. Japan
2. Hawaii
3. Australia
4. Mainland United States (New Orleans, Houston, San Diego, Los Angeles, San Francisco, Seattle)

1.2: U.S. Versus China War Propaganda
War propaganda between the U.S. and China is at an all-time high and escalating. In a May 16, 2012, report entitled “Chinese Official: It’s Us Or America”, quoted Song Xiaojun, a former senior officer of the People’s Liberation Army, who stated that “Australia always has to depend on somebody else, whether it is to be the ‘son’ of the US or ‘son’ of China”, ultimately implying that soon Australia will have to choose sides in an upcoming war between the U.S. and China. On May 18, 2012, it was reported by the Pentagon that China is exploiting Western commercial technology, conducting aggressive cyber espionage and buying more anti-ship missiles as part of a steady military build-up. A month later on June 3, 2012, a report entitled “America Threatens China: Pentagon Prepares For Confrontation In The Asia-Pacific Region” stated that “Having vanquished most all islands of resistance and neutrality in Europe, Africa and the Middle East, the Pentagon is moving its global military machine into the Asia-Pacific for a showdown with China”. A day later on June 4, 2012, it was reported that a newly published book by journalist David Uren had revealed that the Australian government’s 2009 Defence White Paper contained a “secret chapter” that assessed “Australia’s ability to fight an air-sea battle alongside the United States against China”. Two days later on June 6, 2012, it was reported that India declined to participate in a new and aggressive U.S. foreign policy towards Asia entitled ‘Rebalancing of Military Strategy with focus on Asia-Pacific‘ which essentially proposes that at least 60 percent of U.S. Naval assets be deployed in Asia-Pacific to counter China. A few weeks later on June 27, 2012, it was reported that a People’s Liberation Army (PLA) Maj. Gen. Peng Guangqian stated that a future conflict with the United States is coming as a result of U.S. “containment” policies. “The United States has been exhausting all its resources to establish a strategic containment system specifically targeting China,” Gen. Peng said. “The contradictions between China and the United States are structural, not to be changed by any individual, whether it is G.H.W. Bush, G.W. Bush or Barack Obama, it will not make a difference to these contradictions.” A few months later on August 24, 2012, in a report entitled “China Could Penetrate US With New Huge Missile”, it stated that the “Dongfeng-41 (DF-41) intercontinental [nuclear] ballistic missile (ICBM), had been fired in testing last month by the PLA’s Second Artillery Corps” and that “It might be time to sweep the cobwebs out of that old nuclear bunker at the bottom of the garden”.  A month later on September 3, 2012, it was reported that India, after declining an offer from the U.S. to counter China, India has now stepped up military relations and unity with China. On September 21, 2012, in a report entitled “PLA Admiral: China Should Prepare For Conflict With U.S. Over Disputed Islands” it quotes Zhang Zhaozhong, a rear admiral at China’s National Defense University, as stating that, “China has a stronger fighting capability than Japan in a war for the Diaoyu Islands, because China’s coastal areas are close to the islands and the radar and missiles there can cover all the islands.” Zhaozhong then makes it clear what will happen if the U.S. were to become embroiled in the conflict. “The intervention of the U.S. military will change the military strength contrast between China and Japan, so China should prepare for it”, Zhaozhong stated. In an October 8, 2012, report entitled “US: China Bears Malice Towards US”, states that a draft of a report by the U.S. House Intelligence Committee says that China bears malice towards the U.S. and that Chinese corporations pose “a threat to the U.S. national security”.

1.3: Latest Chinese Military Weapons
Complementing the ever growing U.S. versus China war propaganda is unprecedented military growth by China. A quick look at China’s new military might indicates that China is less concerned with self-defense but rather a stab at world dominance. Aside from their latest aircraft carriers, drones and stealth fighters, China boasts the new Type 99 Main battle tank, the HQ-19 missile system which can track up to 100 airborne targets at once, the PGZ-95 anti-aircraft system fires which up to 800 25mm rounds a minute, the Type 22 Houbei Class which is the world’s first attack catamaran, Type 052 destroyers which carry 48 missiles apiece, the Kilo-class submarine which can bring China’s nuclear payload anywhere in the world, and the Dongfeng class of ICBMs can theoretically drop a nuclear missile anywhere in North America.

Latest Chinese Military Advancements:

1. August 13, 2012: China Launches Cruise Ships to Haul Troops and Tanks
2. August 29, 2012: China Deploys Drones to “Conduct Maritime Surveillance”
3. September 17, 2012: China Activates New J-21 Stealth Fighter
4. September 25, 2012: China Unveils First Aircraft Carrier To Enter Service
5. October 16, 2012: China Leads Asia in Military Spending
6. November 1, 2012: China Tests Second Type of Stealth Fighter Prototype
7. November 8, 2012: China Subs to Carry Nuclear Warheads
8. November 9, 2012: China Launches Mystery Space Plane
9. November 10, 2012: China Plans To Launch Manned Spaceship
10. November 18, 2012: China Launches “Disaster-Monitoring Satellite”
11. November 25, 2012: China Lands First Jet on Aircraft Carrier

1.4: Latest Chinese Military Maneuvers  
Based on military maneuvers conducted by both China and the United States in 2012 alone, war between the two nuclear nations is closer than ever. On June 19, 2012, it was reported that China, Iran, Russia and Syria participated in the “largest war game”. Roughly four months later on October 15, 2012, it was reported that one of China’s seven military command groups held a joint military drill involving infantry, artillery and air forces to improve the ability of paratroops to land on and capture an island. On July 30, 2012, it was reported that Chinese naval forces were nearing Europe when their PLAN escort fleet, which included the Type 052 “Qingdao” destroyer, Type 054A “Yantai” missile frigate, and the “Weishanhu” auxiliary oil replenishment ship, crossed the Suez Canal, with Cairo’s permission, on their way to the Mediterranean Sea. On October 23, 2012, it was reported that China had announced a major reshuffle of the PLA with the appointment of a new air force commander and a new head to its General Political Department, which is responsible for army morale, personnel changes and loyalty to the Communist party. On October 24, 2012, it was reported that China has appointed a new army chief of staff and other top officers amid efforts to “further professionalize the world’s largest standing military”. On November 8, 2012, it was reported in a 2012 report by the U.S. Congress that China appears to be within two years of deploying submarine-launched nuclear weapons, but that China remains “the most threatening” in cyberspace. On November 21, 2012, it was reported that China’s military held holding naval exercises near Japan and closed off an area near the nuclear submarine base at Huludao, where China builds its Type 094 ballistic-missile submarines.

1.5: Anti-Chinese U.S. Military Maneuvers
Based on military maneuvers conducted by both China and the United States in 2012 alone, war between the two nuclear nations is closer than ever. On May 11, 2012, the U.S. Navy successfully tested a new anti-ballistic missile over the Pacific. The next month on June 12, 2012, commander of the U.S. Pacific Fleet Admiral Cecil Haney stated that the Navy will be sending its most advanced vessels and aircraft to the Asia-Pacific region. A couple weeks later on June 21, 2012, it was reported that the U.S, Japan and South Korea began joint naval exercises in waters near China. Two days after that on June 23, 2012, it was reported that the U.S. is now rebuilding and refurbishing former military bases in the Asia-Pacific region. Four days later on June 27, 2012, it was reported that the U.S. had tested yet another medium-range, separating ballistic missile off the coast of Hawaii. Three days after that on June 30, 2012, it was reported that a group of Russia’s Pacific Fleet warships arrived at the U.S. Pearl Harbor naval base to take part in the Rim of the Pacific international drills. A week later on July 8, 2012, it was reported that B-1 bombers are being transferred from Afghanistan to the Asia-Pacific region. “The B-1′s capabilities are particularly well-suited to the vast distances and unique challenges of the Pacific region, and we’ll continue to invest in, and rely on, the B-1 in support of the focus on the Pacific” stated Major General Michael Holmes, assistant deputy chief of staff for Air Force Operations. A month later on August 1, 2012, it was reported that Pentagon planners are considering adding bombers and attack submarines to the Pacific fleet as part of a growing U.S. focus on security challenges in the Asia-Pacific, namely China. On October 3, 2012, it was reported that U.S. Stryker Brigade spent the past month training in Hawaii conducting hand-grenade qualification, assault tactics with a focus on platoon-level training. On October 26, 2012, it was reported that the U.S. military had intercepted four out of five targets over the Pacific Ocean in the largest and most complex test of the nation’s ballistic missile defense system.

1.6: U.S. & Chinese Diplomatic Tensions
Diplomatic tensions between the U.S. and China are currently at unprecedented levels. A crisis of any kind could theoretically draw both sides into a violent and bloody conflict. On June 2, 2012, it was reported that a Chinese security official at the Ministry of State Security, China’s main intelligence agency, has been arrested on suspicion of spying for the U.S. after allegedly passing along information to the U.S. regarding China’s espionage activities. A month later on July 6, 2012, it was reported that a Pentagon Contractor was caught illegally selling military technology to China. Six days later on July 12, 2012, it was reported that the FBI had opened a criminal investigation targeting a leading Chinese telecommunications firm that allegedly conspired to illegally ship hardware and software purchased from U.S. tech firms to Iran’s government-controlled telecom company, a violation of several federal laws and a trade embargo imposed on the outlaw Islamic nation. That same day, July 12, 2012, it was also reported that the Chinese government has begun cracking down on GM (General Motors) car manufacturing and sales in China. A few months later on September 4, 2012, it was reported that two Chinese men were detained over an attack on the Japanese ambassador’s car in Beijing. The U.S. has been a long-time ally of Japan, especially in the escalating feud with China over the Senkaku Island. On September 5, 2012, a report entitled “Territorial Tensions Ripple As Clinton Visits Beijing” stated that tensions over territorial disputes have spiked this year between China and Japan and that “the United States has been drawn into the fray.” A month later on October 20, 2012, a report entitled “US Risks Drawing Beijing’s Ire With Military Cruise In Disputed Waters” stated that a U.S. aircraft carrier group cruised through the disputed South China Sea in “a show of American power in waters that are fast becoming a focal point of Washington’s strategic rivalry with Beijing”. On October 25, 2012, it was reported that China rejected sanctions and the use of force against Iran over its nuclear energy program, a direct slap in the face of both the U.S. and Israel. That same day, October 25, 2012, the Chinese government blocked access to the English-language and Chinese-language Web sites of The New York Times from computers in mainland China in response to an article in both languages describing wealth accumulated by the family of the country’s prime minister.

1.7: The Senkaku Islands Dispute
The Senkaku Islands dispute appears to be the powder keg which will eventually ignite the Chinese war machine to attack Japan, Hawaii, mainland United States and potentially even Australia. On September 21, 2012, in a report entitled “PLA Admiral: China Should Prepare For Conflict With U.S. Over Disputed Islands” it quotes Zhang Zhaozhong, a rear admiral at China’s National Defense University, as stating that, “China has a stronger fighting capability than Japan in a war for the Diaoyu Islands, because China’s coastal areas are close to the islands and the radar and missiles there can cover all the islands.” Zhaozhong then makes it clear what will happen if the U.S. were to become embroiled in the conflict. “The intervention of the U.S. military will change the military strength contrast between China and Japan, so China should prepare for it”, Zhaozhong stated. According to Wikipedia, the Senkaku Islands dispute concerns a territorial dispute over a group of uninhabited islands known as the Senkaku Islands in Japan and as the Diaoyu (in China) or Tiaoyutai Islands (in Taiwan). Aside from a 1945 to 1972 period of administration by the United States, the archipelago has been controlled by Japan since 1895.The People’s Republic of China (PRC) disputed the proposed US handover of authority to Japan in 1971and has asserted its claims to the islands since that time.The Republic of China (Taiwan) also claims the islands. The territory is close to key shipping lanes, rich fishing grounds, and there may be oil reserves in the area. Although the United States does not have an official position on the merits of the competing sovereignty claims,the islands are included within the U.S. Japan Security Treaty meaning that a defense of the islands by Japan may compel support from the United States military. In September 2012, the Japanese government purchased the remaining three of the disputed islands that it did not already own from their private owner, prompting large-scale protests in China.

1.8: Escalating War of Words

Historically speaking, prior to any bloody international conflicts, there is usually a verbal sparring of words from both sides prior to any act of war. The situation between the U.S. and China is no different and the rhetoric is getting more heated with each passing day. On May 25, 2012, the People’s Republic of China published a scathing report entitled, “The Human Rights Record of the United States in 2011” and released it via their  Chinese consulate in New York City. In the report, China is very critical of U.S. gun ownership laws: “The United States prioritizes the right to keep and bear arms over the protection of citizens’ lives and personal security and exercises lax firearm possession control, causing rampant gun ownership,” the report claims. On June 5, 2012, it was reported that China told foreign embassies to stop publishing their own reports on air quality in the country, escalating its objections to a popular U.S. Embassy Twitter feed that tracks pollution in smoggy Beijing. On June 25, 2012, a report entitled “Dogs Destined For The Table: Horrific Images Show Animals Being Killed, Cooked And Served Up As A Meal In Chinese Tradition” was published as part of an obvious  and growing propaganda campaign to demonize China and foment hatred prior to a military engagement against the country. On July 12, 2012, it was reported that U.S. Senate Majority Leader Harry Reid slammed the U.S. Olympic Committee over reports that the Team USA uniforms were made in China, saying officials “should burn” them. On August 6, 2012, it was reported that China blasted the U.S. for its recent public criticism and urging of diplomacy to address territorial disputes in the South China Sea, saying the U.S. statement shows “total disregard for the facts” and sends “a seriously wrong message“. On September 3, 2012, it was reported that some 8000 people chanted “No to brainwashing education. Withdraw national education” in an effort to denounce the Hong Kong government-funded booklet entitled “The China Model” they say glorifies China’s single Communist party rule while glossing over more brutal aspects of its rule and political controversies. On October 16, 2012, the Pew Global Attitudes Project released a report which allegedly found that people in China are increasingly worried about corruption, inequality, food safety, and that about half of Chinese like American ideas about democracy. On November 2, 2012, it was reported that China plans to launch a national voluntary organ donation system early next year in a bid to fulfill growing transplant lists and phase out its long-criticized reliance on organs from executed prisoners. The report essentially confirms that China is indeed still harvesting human organs illegally and that although they have plans to change, they still are engaged in potentially the most inhumane and brutal practices known to mankind.

1.9: Chinese Terrorism on the Rise
In an apparent move to menace the West with a new breed of terrorist as well as quell dissent at home once offensive Chinese military operations begin, China is suddenly dealing with an outbreak of homegrown Islamic terrorism. On June 30, 2012, it was reported that passengers and crew members thwarted a 9/11 style hijack attempt to overtake a plane in the western Chinese province of Xinjiang. According to the report, six Chinese terrorists posing as passengers tried to take control of the plane “through violence”. The passengers and crew members managed to subdue the Chinese hijackers, sustaining minor injuries in the struggle. On October 29, 2012, it was reported that Chinese Muslim separatists from the northwest region of Xinjiang were battling Syrian government forces alongside al-Qaida and other extremist groups. The report, citing unidentified Chinese anti-terrorism authorities, states that the groups were funding their activities through drug and gun trafficking, kidnapping and robbery, and providing training for “separatists, criminals and terrorists” who had fled Xinjiang. “After receiving orders from al-Qaida, terrorists from China came to Syria to meet with jihadists already on the ground before forming groups on the front lines,” the report quoted an unidentified official as saying. On October 9, 2012, it was reported that two flights out of Tibet and southern Jiangxi bound for Beijing were grounded on after China’s national carrier, Air China, received terror “threat calls” from unidentified sources, prompting a tightening of security in many airports across the country.

1.10: Chinese Dalai Lama Assassination Plot 
On May 12, 2012, it was reported that the Dalai Lama, a 76-year-old Nobel Peace Prize winner, revealed he was the intended target in a Chinese assassination plot. Lama stated that he had been passed reports from inside Tibet warning that Chinese agents had trained Tibetan women for a mission to poison him while posing as devotees seeking his blessings. The Dalai Lama is a darling of the West, especially the United States and the European Union, so any suspected plot to attack on the world-famous Buddhist monk paints China as an aggressive and brutal regime.

1.11: China Eclipses U.S. as Super-Power
A November 9, 2012, report entitled “China’s Economy To Overtake US In Next Four Years”, states that “The Paris-based Organisation for Economic Co-operation and Development (OECD) says that China’s economy will be larger than the combined economies of the eurozone countries by the end of this year, and will overtake the US by the end of 2016.” On November 21, 2012, it was reported that China is planning to build the tallest skyscraper in the world standing at 2,749ft (838m) high, over 220 floors, and it will only take them 90 days, an obvious slap in the face of America who has yet to finish the “Freedom Tower” which has been under construction since April 27, 2006. On November 29, 2012, a new report by Ernst & Young was published stating that the Chinese film market, the second biggest in the world, will surpass the U.S. by 2020.

1.12: 45 Signs That China Is Colonizing America
On May 23, 2012, a report entitled “45 Signs That China Is Colonizing America” was released. The report albeit true, is intended to make Americans feel insecure about themselves as a nation and as a people, as well as scapegoat China for their current financial situation as opposed to the Zionist who are running America into the ground.

1. It was recently announced that China’s Dalian Wanda Group has bought U.S. movie theater chain AMC Entertainment for a whopping 2.6 billion dollars.  This deal represents China’s biggest corporate takeover of a U.S. firm ever.
2. Earlier this month, the Federal Reserve announced that it has given approval for banks owned by the Chinese government to buy stakes in U.S.-owned banks.
3. A few days ago Reuters reported that China is now able to completely bypass Wall Street and purchase U.S. debt directly from the U.S. Treasury Department.
4. A recent investigation by the U.S. Senate Committee on Armed Services found more than one million counterfeit Chinese parts in the Department of Defense supply chain.  How in the world could we be so stupid?
5. After being bailed out by U.S. taxpayers, General Motors is currently involved in 11 joint ventures with companies owned by the Chinese government.  The price for entering into many of these “joint ventures” was a transfer of “state of the art technology” from General Motors to the communist Chinese.
6. A Chinese company known as “Sino-Michigan Properties LLC” has purchased 200 acres of land near the town of Milan, Michigan.  The goal is to build a “China City” with artificial lakes, a Chinese cultural center and hundreds of housing units for Chinese citizens.
7. As I reported on recently, corporations controlled by the Chinese government have been rapidly buying up U.S. oil and gas deposits worth billions of dollars.
8. Chinese investors have been gobbling up real estate all over New York City.  The following is from a recent Forbes article….“According to a recent report in the New York Times, investors from China are “snapping up luxury apartments” and are planning to spend hundreds of millions of dollars on commercial and residential projects like Atlantic Yards in Brooklyn. Chinese companies also have signed major leases at the Empire State Building and at 1 World Trade Center, the report said.”
9. The Chinese are also doing huge real estate deals in cities in the middle part of the country.  The following example is from an article in the Toledo Blade…“Dashing Pacific Group Ltd., which has already purchased the nearby Docks restaurant complex for $2.15 million, put its $3.8 million offer to buy the southern 69 acres at the Marina District in East Toledo back on the table for approval by Toledo City Council. Additionally, Dashing Pacific Chairman Yuan Xiaohong, in a letter signed in Hangzhou, said the firm wants a two-year option to buy the decommissioned Toledo Edison power plant property on the site.”
10. According to ABC News, major road and bridge projects all over the United States are being built by Chinese companies.  Meanwhile, there are millions upon millions of blue collar American workers that cannot find jobs.  The following is a brief excerpt from a recent ABC News article….”In New York there is a $400 million renovation project on the Alexander Hamilton Bridge…In California, there is a $7.2 billion project to rebuild the Bay Bridge connecting San Francisco and Oakland…In Alaska, there is a proposal for a $190 million bridge project…These projects sound like steps in the right direction, but much of the work is going to Chinese government-owned firms…”When we subsidize jobs in China, we’re not creating any wealth in the United States,” said Scott Paul, executive director for the Alliance for American Manufacturing.
11. The new World Trade Center tower is going to include glass that has been imported from China.
12. The new Martin Luther King memorial on the National Mall was made in China.
13. Check out this incredible photo which contrasts the decline of Detroit over the years with the amazing rise of Shanghai, China.
14. A couple of years ago, a large Chinese company was considering building “a 10,000- to 30,000-acre technology zone for industry, retail centers and homes” just south of Boise, Idaho.
15. Our trade deficit with China in 2011 was $295.5 billion.  That was the largest trade deficit that one country has had with another country in the history of the planet.
16. In 2011, our trade deficit with China was 28 times larger than it was back in 1990 and more than 49,000 times larger than it was back in 1985.
17. Back in 1998, the United States had 25 percent of the world’s high-tech export market and China had just 10 percent. Today, China’s high-tech exports are more than twice the size of U.S. high-tech exports.
18. America has lost more than a quarter of all of its high-tech manufacturing jobs over the past ten years.
19. According to the Economic Policy Institute, America is losing half a million jobs to China every single year.
20. The U.S. spends about 4 dollars on goods and services from China for every one dollar that China spends on goods and services from the United States.  Does that sound like “fair trade” to you?
21. While we allow Chinese goods to freely flood our shores, China just keeps slapping new tariffs on American-made goods.  According to the New York Times, a Jeep Grand Cherokee that costs $27,490 in the United States costs about $85,000 in China thanks to all the tariffs.
22. According to U.S. Representative Betty Sutton, an average of 23 manufacturing facilities a day closed down in the United States during 2010.
23. The United States has lost an average of approximately 50,000 manufacturing jobs a month and more than 56,000 manufacturing facilities in the United States have been shut down since China joined the World Trade Organization in 2001.
24. The United States has lost a staggering 32 percent of its manufacturing jobs since the year 2000.
25. Between December 2000 and December 2010, 38 percent of the manufacturing jobs in Ohio were lost, 42 percent of the manufacturing jobs in North Carolina were lost and 48 percent of the manufacturing jobs in Michigan were lost.
26. In 2010, China produced more than twice as many automobiles as the United States did.
27. In 2010, China produced 627 million metric tons of steel.  The United States only produced 80 million metric tons of steel.
28. In 2010, China produced 7.3 million metric tons of cotton.  The United States only produced 3.4 million metric tons of cotton.
29. Today, China produces nearly twice as much beer as the United States does.
30. 85 percent of all artificial Christmas trees are made in China.
31. China is now the number one producer of wind and solar power on the entire globe.
32. Chinese solar panel production was about 50 times larger in 2010 than it was in 2005.
33. Right now, China is producing more than three times as much coal as the United States does.
34. China is now the number one supplier of components that are critical to the operation of U.S. defense systems.
35. According to author Clyde Prestowitz, China’s number one export to the U.S. is computer equipment.  According to an article in U.S. News & World Report, during 2010 the number one U.S. export to China was “scrap and trash”.
36. According to Professor Alan Blinder of Princeton University, 40 million more U.S. jobs could be sent offshore over the next two decades.
37. The United States had been the leading consumer of energy on the globe for about 100 years, but during the summer of 2010 China took over the number one spot.
38. 15 years ago, China was 14th in the world in published scientific research articles.  But now, China is expected to pass the United States and become number one very shortly.
39. China now awards more doctoral degrees in engineering each year than the United States does.
40. China now possesses the fastest supercomputer on the entire planet.
41. China now has the world’s fastest train and the world’s most extensive high-speed rail network.
42. The Chinese economy has grown 7 times faster than the U.S. economy has over the past decade.
43. The Chinese economy is projected to be larger than the U.S. economy by 2016.
44. One economist is projecting that the Chinese economy will be three times larger than the U.S. economy by the year 2040.
45. China now holds approximately 1.17 trillion dollars of U.S. government debt.  If you were alive back when Jesus was born and you had spent a million dollars every single day since then, you still would not have spent that much money by now.

2. CHINA & EMP WARFARE

2.1: China’s EMP Quest
A January 8, 2011, article entitled “China’s Quest For Dominance In Electro-Magnetic Warfare” stated that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Adm. Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the U.S. propaganda is to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in any future conflict. Aside from China, the U.S. has also publically accused  North Korea of also developing EMP weapons. If and when an EMP terror attack strikes America, there is a high probability that China will ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

2.2: What is an EMP?
An electromagnetic pulse (EMP) is a burst of electromagnetic radiation which usually results from a high energy nuclear explosion that suddenly fluctuates the magnetic field. Theoretically, an EMP could wipe out everything electronic (planes, trains, cars, computers, internet, etc.) in a flash. EMP terror has gained popularity of late and has been featured in movies such as “The Matrix” and television shows such as “24” and the #1 show on NBC entitled “Revolution”, which eerily features a post-EMP America with no electricity. Aside from the Hollywood EMP propaganda, there has been recent EMP terror legislation by the U.S. congress, a number of EMP terror conferences, and EMP terror scholarly whitepapers which have all been preparing local, state and federal officials for an upcoming EMP terror attack on America. Based on the 12 major power outages in 2012 alone, it appears that the U.S. government is programming the public for the permanent loss of electricity. Coincidentally, in September of 2012, Alex Jones of Infowars released a new magazine which indicates that the STRATFOR intelligence operation known as Infowars knows that the internet is about to expire and have planned ahead by launching a new propaganda magazine.

2.3: Chinese “Mystery Missile” EMP Attack?
On November 10, 2010, it was reported that a satellite monitoring the western coastal regions of North America detected an “EMP anomalous event” which occurred on November 8, 2010, when a Chinese sub allegedly fired an EMP weapon. According to the report, the Chinese Navy fired an EMP missile on the U.S. based cruise ship “Carnival Splendor resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that same day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. The U.S. government denied that they were responsible for the missile, but a Russian report stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a US Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the Chinese attacked the “Carnival Splendor” with an EMP weapon and the U.S. sent up a random missile to distract the world from it.

2.4: EMP Terror Drills
To date, there have been only a handful of EMP terror drills, but a recent massive and unprecedented “nuclear terror drill” in Russia has drawn red flags for a number of different reason. First off, the nuclear terror scenario was highly exposed and ultimately foiled in 2011, so chances of another staged nuclear terror plot in 2012 is virtually non-existent. Therefore, the gathering of 58 nations to deal with “a simulated aftermath of a nuclear terrorism attack” is absurd, especially considering that the fallout of a nuclear terror attack would not directly affect 58 nations. It is far more likely that the 58 nations were drilling for the simulated aftermath of an EMP nuclear terror attack because the permanent loss of electricity in one nation would directly affect business, communication, energy media, travel, and a host of other electrical dependent sectors in other nations as well.

2.5: EMP Terror & Planes
On April 1, 2009, it was reported that counterterrorism analysts warned that EMP weapons capable of frying the electronics in civil airliners could be built using information and components available on the net. According to the report, all it would take to bring a plane down would be “a single but highly energetic microwave radio pulse blasted from a device inside a plane, or on the ground and trained at an aircraft coming in to land”. The same exact scenario of planes dropping like flies from the sky originally depicted by counterterrorism analysts in 2009 came to fruition in 2012 and is featured in the EMP terror television show entitled “Revolution”. Interestingly, in October of 2012, American Airlines has pulled 47 planes due to malfunctioning seats and 17 flights were diverted from Manila’s international airport due to an alleged air traffic equipment “glitch”. What role these 64 planes will play in the wake of a cyber-terror attack is unknown, but there is a real possibility that these planes have been remotely “programmed” to lose all power and drop to earth on a future date.

2.6: EMP Terror & Cars
One of the entities which will likely be affected by an EMP terror attack is cars and trucks. In 2012 alone, tens of millions of American cars have been recalled for suspicious reasons. Whether or not these cars, most of which have onboard computers, where uploaded with a virus or computer program to electrically debilitate the vehicle at a future date or by remote control is not known, but the large amount of recalls (partial list below) by almost every single motor company in the world is highly suspicious. The scenario of cars suddenly losing power and becoming useless is a main theme in the #1 show on NBC entitled “Revolution”, which eerily features a post-EMP America with no electricity and no working cars.

Recent Factory Recalls:

1. February 10, 2010: Toyota Vehicle Recall (2.3 Million)
2. May 19, 2010: Nissan Vehicle Recall (48,700)
3. June 30, 2011: Nissan Vehicle Recall (35,000)
4. July 14, 2011: Dodge Vehicle Recall (242,780)
5. December 31, 2011: GMC Vehicle Recall (4,296)
6. June 22, 2012: GMC Vehicle Recall (400,000)
7. July 19, 2012: Ford Vehicle Recall (11,500)
8. July 26, 2012: Ford Vehicle Recall (484,600)
9. July 30, 2012: Hyundai Vehicle Recall (221,631)
10. August 11, 2012: GMC Police Car Recall (38,000)
11. August 18, 2012: GMC & Isuzu Recall (258,000)
12. September 17, 2012: Ford Vehicle Recall (5,500)
13. September 13, 2012: Nissan Vehicle Recall (50,000)
14. September 21, 2012: GMC Vehicle Recall (426,000)
15. October 1, 2012: Honda Vehicle Recall (625,762)
16. October 1, 2012: GMC Vehicle Recall (40,859)
17. October 7, 2012: Honda Vehicle Recall (1.71 Million)
18. October 8, 2012: Dodge Vehicle Recall (44,300)
19. October 10, 2012: Toyota Vehicle Recall (7.43 Million)
20. October 17, 2012: Ford Vehicle Recall (262,000)
21. October 22, 2012: Nissan Vehicle Recall (13,919)
22. October 25, 2012: BMW Vehicle Recall (7,485)
23. October 28, 2012: BMW Vehicle Recall (45,500)
24. October 30, 2012: Nissan Vehicle Recall (11,000)
25. November 8, 2012: Jaguar Vehicle Recall (4,195)
26. November 9, 2012: Chrysler Vehicle Recall (919,000)
27. November 11, 2012: Jeep Vehicle Recalls (775,000)
28. November 12, 2012: Scion Vehicle Recall (11,200)
29. November 14, 2012: Toyota Vehicle Recall (2.77 Million)
30. November 14, 2012: GMC Vehicle Recall (2,949)
31. November 14, 2012: Cadillac Vehicle Recall (12,626)
32. November 15, 2012: Honda Generator Recall (150,600)
33. November 19, 2012: Honda Motorcycle Recall (11,500)
34. November 20, 2012: Volkswagen Vehicle Recall (2,471)
35. November 20, 2012: Mercedes-Benz Vehicle Recall (23)
36. November 21, 2012: Toyota Vehicle Recall (150,000)
37. November 29, 2012: Honda Vehicle Recall (157)

3. CHINA & CYBER TERROR

3.1: China & Cyber Terror
The nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. Based on news and events surrounding, China more than any other nation is sure to be scapegoated in the aftermath of cyber-terror attacks against the United States. On October 5, 2011, U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign and cybercrime against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two US satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyberespionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta, has publically stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to tamp down aggressive Chinese cyber-attacks against American companies and the government.  October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.

3.2: Cyber-Terror Attacks
Since 2011, there have been an epidemic of “cyber-attacks” targeting high-profile government entities such as the Vatican, United Nations, Interpol, NASA, Scotland Yard, FBI, DHS, CIA and the U.S. Federal Trade Commission. Less publicized however have been the cyber-attacks on critical infrastructure such as water plants, nuclear power plants, oil refineries and banks. These alleged cyber-attacks, whether real or not, give the perception that any entity with an internet connection is vulnerable to a future cyber-attack.

3.3: Cyber Terror Drills
Both the Israeli and U.S. government, namely the CIA and the U.S. Department of Homeland Security, have been drilling cyber-terror attacks on a routine basis. Past cyber-terror drills range in duration and targets, generally focus on the financial and infrastructure targets. According to reports, authorities have expressed concerns about terrorists combining physical attacks such as bombings with hacker attacks to disrupt rescue efforts, known as hybrid or “swarming” attacks.”

3.4: Cyber-Terror Hotline
Just as the United States and the Soviet Union had a nuclear hotline to avoid potential nuclear misunderstandings during the Cold War, a new “cyber-war hotline” is being speculated about in order to avoid future misunderstandings in the wake of major cyber-terror attacks. Security expert Bruce Schneier stated that a hotline between the world’s cyber commands would “at least allow governments to talk to each other, rather than guess where an attack came from.” On October 4, 2012, it was reported that Britain has begun tentative talks with China and Russia about setting up a hotline to help prevent cyber-emergencies from spiraling out of control. “At the moment, we don’t really have sufficient information-sharing arrangements with some countries such as China and the Chinese computer emergency response team,” said a senior Foreign Office official.

3.5: Cyber-Terror Plots & Patsies
Since April of 2011, there has been at least 25 major cases in which individuals or groups were charged with committing acts hacking or cyber-terror, while in China, police allegedly arrested 10,000 people in an unprecedented cyber-terror sweep. In most of the cases, finance or bank related hacking or cyber-terror was the motive although major corporate, energy or government institutions such AT&T, Blackberry, British National Party CIA, English Defence League, Facebook, Federal Reserve Bank, NATO, NHI, Nintendo, Sega and Symantec have also been allegedly targeted.

3.6: Cyber-Terror Security Takeover
Under the guise of “cyber security”, the U.S. government has spent billions of dollars mapping and federalizing cyberspace and cyber security throughout America. According to the 2009 CRS Report for Congress entitled “Comprehensive National Cybersecurity Initiative”, the sudden change in policy is to ensure that “U.S. Government cyber security initiatives are appropriately integrated, resourced and coordinated with Congress and the private sector“. This changes essentially ensures that the private sectors of the economy (banks, gas, oil, power, stock markets, etc.) are under the cyber thumb of the U.S. government so that they can be targeted, hijacked and ultimately destroyed in a future cyber terror attack.

3.7: Cyber-Terror Target: Airplanes
According to recent cyber-terror propaganda, drones and planes can be remotely hijacked and then used as weapons, similarly to what happened on September 11, 2001. On June 25, 2012, it was reported that with the right equipment, anyone could take control of a GPS-guided drone and easily turn it into a weapon. Professor Todd Humphreys of the University of Texas at Austin stated that “Each one of these [drones] could be a potential missile used against us.” A month later on July 27, 2012, it was reported that air traffic control software which is used around the world could be exploited by hackers to unleash squadrons of ghost planes. Interestingly, in October of 2012, American Airlines has pulled 47 planes due to malfunctioning seats and 17 flights were diverted from Manila’s international airport due to an alleged air traffic equipment “glitch”. What role these 64 planes will play in the wake of a cyber-terror attack is unknown, but there is a real possibility that these planes have been remotely “programmed” to lose all power at a future date.

3.8: Cyber-Terror Target: Nuclear Reactors
On December 13, 2011, it was reported that U.S. officials were investigating whether Iranian and Venezuelan diplomats in Mexico were involved in planned cyber-attacks against U.S. targets, including nuclear power plants. There have also been approximately 45 nuclear reactor “emergencies”, “closures”, “leaks” and other major incidents clearly setting the stage for nuclear reactor terror on an unimaginable scale. Complementing the unprecedented nuclear reactor emergencies are multiple cases of “terrorists” attempting to breach nuclear reactors, repeated lapses in nuclear reactor security, as well as countless propaganda articles indicating that a Fukushima-level event inside the United States is a foregone conclusion.

3.9: Cyber-Terror Target: Prisons
Since September of 2012, there have been 4 major prison breaks in Iraq Libya Mexico and the U.S. which untimely indicates that more major prison breaks are imminent. On November 10, 2011, it was reported that officials with the Federal Bureau of Prisons have been informed that U.S. penitentiaries could be vulnerable to cyber-terror attacks that would help prisoners escape. According to the report, most American prisons are operated by industrial control systems (ICS) that also are used by power plants, water treatment facilities and other infrastructure operations. ICS’ vulnerability was demonstrated two years in Iran, when hackers sabotaged that country’s nuclear program by exploiting its Siemens programmable logic controllers (PLCs). Almost all of the 117 federal correctional facilities, 1,700 prisons and 3,000 jails in the United States use PLCs to control doors and manage their security systems. Coincidentally, on October 2, 2012, it was reported that the Obama administration plans to buy an Illinois prison which end up being the prison facility that suffers a cyber-terror prison break.

3.10: Cyber-Terror Target: Subways & Trains
On December 29, 2011, it was reported that Professor Stefan Katzenbeisser of Technische Universität Darmstadt had told a security conference in Berlin that new train system was vulnerable to hackers and “Denial of Service”. Future cyber-terror attacks could rhetorically target train switching systems, which enable trains to be guided from one track to another at a railway junction. Although these switching systems have historically been separate from the online world, this is no longer the case.  The Israeli cyber-terror worm entitled the “Duqu virus”, has already wreaked havoc worldwide and could be used to target trains in the U.S. and Europe. Based on recent and inexplicable train crashes, this virus may already be attacking trains worldwide. Acting as a Trojan horse, the Duqu virus has the ability to essentially hijack its victim and then allow for the remote control of whatever entity is hijacked. If the Duqu virus hijacked a train, it could theoretically control train acceleration, braking and track switching.

3.11: Cyber-Terror Target: U.S. Stock Markets
Based on unprecedented financial cyber-terror propaganda and the recent rash of suspects and patsies arrested for financial cyber-terror and financial related crimes, financial cyber-terror is blinking red on every level. An April 24, 2012, report stated that Osama bin Laden was looking for a follow-up terror attack to  doom the American economy, so there is a real possibility that cyber terror attack targeting U.S. banks and Wall Street could hijack trillions of dollars ultimately dooming the American economy. To date, individuals have been arrested for cyber-terror related crimes such as credit and debit card PIN theft, the theft of proprietary software code from the Federal Reserve Bank of New York, the illegal reproduction and distribution of more than 100 copyrighted commercial and financial business software programs, the malware SpyEye used to steal and use personal banking and credit card data from unsuspecting victims’ online accounts, and the former head of fraud and security for digital banking at Lloyds Bank has admitted to committing £2.5 million fraud. Essentially, everything needed to commit the greatest bank heist ever is conveniently in place. Coincidentally, governments around the world have been executing financial cyber-terror drills in which hackers hijack trillions of dollars with no trace.

3.12: Military Computer Thefts
Since 2006, thousands of military laptops have been stolen in the United States and the United Kingdom. Why these thefts are being allowed to occur is not yet clear, but it plays nicely into the narrative of impending cyber-terror attacks. These laptops will have likely made it onto the black market and into the waiting hands of “terrorists” who will allegedly launch cyber-terror attacks against the U.S. and U.K. militaries and governments.

3:13: U.S. & Israeli Sponsored Cyber Terror
When massive cyber-terror attack begins to occur, the prime suspects should be the U.S. and Israeli governments who openly brag about their offensive cyber-attack capabilities.  According to Wikipedia, the Joint Functional Component Command – Network Warfare team (JFCCNW) is “responsible for coordinating offensive computer network operations for the United States Department of Defense” and that the JFCCNW is “the world’s most formidable hacker posse: a super-secret, multimillion-dollar weapons program that may be ready to launch bloodless cyber-war against enemy networks”. Aside from being implemented in both the “Stuxnet” virus and the “Duqu” virus, the Israeli government allegedly ranks  #1 in cyber terrorism.

4. CHINA & SPACE TERROR

4.1: China & Space Warfare
China has been directly implicated in cyber-attacks on NASA, U.S. satellites and the international Space Station. Should future space terror strike America, there is little doubt that China will scapegoated for the attacks.  On October 28, 2011, it was reported that Chinese hackers may have interfered with two US satellites on four separate occasions. On March 1, 2012, it was reported that a laptop stolen from NASA last year was unencrypted and contained command and control codes for the International Space Station on it. The particular laptop in question was one of 48 NASA notebooks or mobile devices stolen between April 2009 and April 2011. Although China has not been directly implicated in the thefts, based on their cyber related crimes against NASA, they are the top suspect. On March 7, 2012, it was reported that Chinese hackers had gained ‘full access’ to the computer network in one of NASA’s key control centers, the Jet Propulsion Laboratory (JPL). The JPL manages 23 spacecraft on active space missions, including missions to Jupiter, Mars and Saturn. On May 3, 2012, it was reported that a new hacking group calling itself “The Unknowns” had published a list of passwords and documents reportedly belonging to NASA, the European Space Agency and the U.S. Air Force, among other high-profile government targets. Although China has not been implicated in the “Unknown” attacks, based on their cyber related crimes against NASA, they are again the top suspect.

4.2: Space Terror Imminent
The threat of space terror, whether natural or man-made, is now imminent. Based on the sudden increase in cases of falling space debris  and the approximately 30 incidents where satellites or man-made spacecraft suddenly and unexpectedly reentered the earth’s atmosphere, the potential for space terror is at an all-time high. Complementing the rash of falling space objects is a plethora of space terror propaganda and space debris propaganda which openly states that the chance that earth will be attacked by asteroids, comets, meteoroids, falling satellites,  solar explosion, space junk and ‘solar flare’ storms is real and increasing by the day. So perilous is the situation, that Federal Emergency Management Agency (FEMA) released a falling satellite memo and a “First Responder Guide For Space Object Re-Entry” which instructs first responders on the dangers and procedures of satellite re-entry response. FEMA’s memos are also supported by a number of different scholarly whitepapers which also address the inherent dangers of falling satellite space terror.

4.3: Satellite & Space Station Cyber Terror
Recent space cyber-terror propaganda states that the international space station and satellites may be targeted for cyber-terror in the near future. On October 28, 2011, it was reported that Chinese hackers may have interfered with two US satellites on four separate occasions in 2007 and 2008. According to the report, the Chinese hackers had enough access to take complete control of one of the satellites but chose not to do.  Then on May 17, 2011, it was reported that a Romanian hacker claimed to have breached a computer server at NASA’s Goddard Space Flight Center and gained access to confidential satellite data. Roughly a year later on March 1, 2012, it was reported that in testimony before a House Science, Space and Technology subcommittee, NASA Inspector General Paul Martin said the notebook computer stolen in March 2011 “resulted in the loss of the algorithms” used to control the space station. This particular laptop, Martin said, was one of 48 NASA notebooks or mobile devices stolen between April 2009 and April 2011. A week later on March 7, 2012, it was reported that Chinese hackers gained ‘full access’ to the computer network in one of NASA’s key control centres, the Jet Propulsion Laboratory (JPL) which manages 23 spacecraft conducting active space missions, including missions to Jupiter, Mars and Saturn. Operating from an internet address in China, the hackers gained full system access allowing them to upload hacking tools to steal user IDs and control NASA systems, as well as copy sensitive files. Should U.S. satellites or spacecraft begin a free-fall to planet earth, China will certainly be scapegoated.

4.4: SpaceX Program
A mysterious new program entitled SpaceX has been launched just as the Chinese space cyber-terror rhetoric and propaganda is at an all-time high. What exactly SpaceX does is unknown, but since its launch it has already drawn red flags for a number of different reasons. When it was first launched, SpaceX was allegedly was allegedly sent into the wrong orbit because of a booster problem during launch. Secondly, SpaceX is actively engaging the international space station which is interesting considering SpaceX is a “private” company which is fully engaging the public international space station without any apparent public consent or permission. Thirdly, once in orbit, the communications satellite flying piggyback aboard a SpaceX’s Falcon 9 rocket allegedly fell out of orbit and burned up in the atmosphere following a problem during liftoff. While all the aforementioned anomalies surrounding SpaceX may in fact be real and harmless, it appears that SpaceX is the private space program set-up to destroy the international space station and numerous satellites in the wake of an alleged Chinese based cyber-terror or EMP terror attack.

5. U.S. LANDMARKS SLATED FOR DEMOLITION

5.1: 9/11 Déjà vu?
As fate would have it, the Brooklyn Bridge, the Gateway Arch, the Golden Gate Bridge, Independence Hall, the Lincoln Memorial Reflecting Pool, Mount Rushmore, the Statue of Liberty, the U.S. Capitol, the U.S. Supreme Court Building, the USS Arizona Memorial at Pearl Harbor and the Washington Monument have all undergone recent renovations or are currently under construction. Timely construction could allow for the undercover placement of explosives which could then be detonated via remote control at a future date. American history shows that the World Trade Center received a timely “elevator renovation” just prior to 9/11, and that the Pentagon also underwent a renovation project in the exact location where it was later hit. Should the Chinese attack America, most if not all of these historic landmarks could be demolished within a matter of minutes, ultimately enraging Americans and causing them to blame the Chinese. These attacks would likely destroy America psychologically, make the U.S. government look sympathetic, and garner unprecedented hatred towards the Chinese.

5.2: Brooklyn Bridge (New York City)
Recently exposed U.S. bridge terror plots and bridge closures due to bomb threats may indicate that American bridges will be targeted for terror in the near future.  According to reports, the Brooklyn Bridge is currently undergoing a four-year, $500 million safety and aesthetic improvement program that will be completed in 2014. Aside from the construction, an April 27, 2011, report stated that a long-standing plot by al-Qaida to take down the Brooklyn Bridge was revealed by classified documents obtained by the New York Times. In 2012 alone, there have been at least 5 rather suspicious closings of the Brooklyn Bridge in New York City which may indicate that the bridge has already been set-up for demolition.

5.3: Federal Building Terror?
The recent terror attacks on U.S. Embassies in Libya, Egypt, Yemen and Tunisia may be a prelude to future terror attacks against U.S. Federal buildings in America on the scale of the Oklahoma City Bombing of 1995. Recent and highly publicized attacks and foiled terror plots against, U.S. Capitol Buildings, U.S. Courthouses, U.S. Federal buildings, the Pentagon as well as attacks against U.S. military bases indicate that terror against U.S. Federal buildings, bases and property is now imminent. Interestingly, the U.S. government is shutting down six courthouses in the southern part of the United States due to “money problems” which may indicate that the south is where future acts of federal false-flag terrorism is be being planned.

5.4: Federal Reserve Terror?
Before terrorist Quazi Mohammad Rezwanul Ahsan Nafis, allegedly attempted to detonate a 1,000-pound bomb in front of the Federal Reserve building in New York City in October of 2012, the U.S. government was conducting terror drills on the Federal Reserve in August of 2012. According to the report, the FED terror exercise was executed by U.S. Special Operations Command, an elite and secretive military unit based in Florida who has done extensive operations in Somalia, an alleged home to Al Shabaab. The elite unit trained for two weeks on the FED terror drills which were scheduled to occur between 7 p.m. and midnight and that reportedly involved three Black Hawks hovering over the Federal Reserve’s parking lot with four smaller helicopters landing on the bank’s roof. Should Federal Reserve terror strike America, it will happen at one or more of the FED’s 12 locations: Boston, New York, Philadelphia, Cleveland, Richmond, Atlanta, Chicago, St. Louis, Minneapolis, Kansas City, Dallas or San Francisco. Coincidentally, in September of 2012, Alex Jones of Infowars released a new magazine whose maiden cover featured the Federal Reserve on fire, further indicating that the STRATFOR intelligence operation known as Infowars knew that Federal Reserve terror was being planned.

5.5: Gateway Arch (St. Louis, Missouri)
On December 15, 2011, it was reported that the Gateway Arch in St. Louis, Missouri, would undergo a facelift renovation with the aid of $20 million from the federal government with the goal to finish improvements to the area by 2015, the 50th anniversary of when the Gateway Arch was completed.

5.6: Golden Gate Bridge (San Francisco)
Recently exposed U.S. bridge terror plots and bridge closures due to bomb threats may indicate that American bridges will be targeted for terror in the near future.  On February 23, 2012, it was reported that the Golden Gate Bridge in San Francisco, California, would undergo a renovation project that will “take years to complete”. According to the report, the project involves repainting the two main suspension cables which are responsible for holding the bridge in place. In what appears to be psychological programming The Onion ran a story in 2009 which joked about a “horrific attack on San Francisco’s Golden Gate Bridge, which left thousands missing and assumed dead”.

5.7: Independence Hall (Philadelphia, Pennsylvania)
On February 15, 2012, it was reported that after 18 months of rehabilitation, the iconic clock tower at Independence Hall will be completed. Independence Hall, where the Declaration of Independence was signed, and the Liberty Bell are two of America’s most famous attractions.

5.8: Lincoln Memorial Reflecting Pool (Washington D.C.)
On September 1, 2012, it was reported that construction workers had finally taken down the construction fence which had marred the view of the Lincoln Memorial Reflecting Pool for nearly two years. According to the report, the renovation costing $34 million gave the pool a new steel reinforced foundation as well as a new filtration system that pumps water from the Potomac Tidal Basin

5.9: Mt. Rushmore (Black Hills, South Dakota)
According to a July 3, 2005, report, Mt. Rushmore has been targeted for terror on multiple occasions. A September 18, 2012, report openly questioned whether Mt. Rushmore was a terrorist target and subsequently released a U.S. government security assessment of the Mount Rushmore National Monument. According to the report, the government conducted a 2008 study on the psychosocial impacts of a terrorist attack on national monuments such as Mr. Rushmore. Curiously, some of the findings in the study have been blacked out.

Mt. Rushmore has been targeted for terror on multiple occasions:
1.
Between 1970 and 1973, members of the American Indian Movement made several attempts to occupy and deface the monument.
2. In 1975, a bomb went off in front of the visitor center prior to visitors’ morning arrival.
3. In 1987, the environmental group Greenpeace climbed the mountain with plans to unfurl a 160-by-50-foot protest banner reading “We the people say no to acid rain” over the presidents’ faces.
4. In 1991, the Park Service received threats to assassinate then-President George H.W. Bush during a celebration marking the monument’s 50th anniversary of completion.
5. In 1999, a Colorado man was arrested for threatening to blow up the mountain.

5.10: Nuclear Reactor Terror
Ever since the Fukushima nuclear reactor disaster in 2011, there have been approximately 45 nuclear reactor “emergencies”, “closures”, “leaks” and other major incidents clearly setting the stage for coming nuclear reactor terror on an unimaginable scale. Complementing the unprecedented nuclear reactor emergencies are multiple cases of “terrorists” attempting to breach nuclear reactors, repeated lapses in nuclear reactor security, as well as countless propaganda articles indicating that a Fukushima-level event inside the United States is a foregone conclusion. Aside from blatant programming of the 2012 Hollywood nuclear reactor disaster film entitled “Chernobyl Diaries”, a recent Nuclear Regulatory Commission (NRC) panel recommended that the U.S. government customize emergency plans for each of America’s 65 nuclear power plants, a change would “expand” the standard 10-mile evacuation zone surrounding nuclear reactors.

5.11: Pearl Harbor USS Arizona Memorial (Pearl Harbor, Hawaii)
On May 30, 2012, it was reported that the USS Arizona Memorial in Pearl Harbor, Hawaii, was in dire need of funds to finish its restoration project which was started back in 2007. The USS Arizona Memorial marks the resting place of 1,102 of the 1,177 sailors killed on the USS Arizona during the attack on Pearl Harbor on December 7, 1941 by Japanese imperial forces.

5.12: Statue of Liberty (New York City)
On April 3, 2012, it was reported that al Qaeda would be “coming soon again” to New York City, according to an alleged jihadi on-line forums. Six months later on October 26, 2012, it was reported that the Statue of Liberty will reopen on the 126th anniversary of its dedication after a year-long renovation.  The $30 million renovation allegedly improved fire alarms, sprinkler systems and exit routes to bring Lady Liberty in line with New York City safety codes.

5.13: U.S. Capitol Building (Washington D.C.)
According to reports, the U.S. Capitol dome will undergo its first major face-lift in more than 50 years, costing $19 million in repairs to the lower portion of the dome. According to the American Institute of Architects, American Society of Civil Engineers and other groups, “The U.S. Capitol is not merely Congress’ work space; it is also an attraction for millions of visitors from around the world…and a potential target for those who wish to do us harm“. Suspiciously, Knesset security and the Jerusalem district police anti-terror squad recently conducted a terror exercise in which a plane crashes into the Knesset, Israel’s congressional building. In the drill, the plane contained “dangerous materials” so it was necessary for Israeli security officers to wear protective clothing for radiation and biological contamination. Aside from the 2011 terror plot targeting the U.S. Capitol building, the U.S. Capitol was also the target of an Israeli suicide bomber  in 1998, but due to faulty wiring the bomb was never detonated.

5.14: U.S. Supreme Court
(Washington D.C.)
On May 22, 2012, it was reported that the U.S. Supreme Court is getting a “facelift” and that workers have now started a two-year Supreme Court renovation project on the building’s marble facade. According to the report, the decision for the 2012 renovation was due to a November 2005 incident, in which 80 pounds of marble fell from the Authority figure of Robert Aitken’s sculpture of “Liberty Enthroned. Why the U.S. government waited 7 years to repair one of its most precious landmarks ultimately leaves more questions than answers.

5.15: Washington D.C.
Recently, historical American artifacts were stolen from the U.S. National Archives in Washington D.C., including the Wright Brothers airplane patent, the bombing maps for the nuclear attack on Japan, and photos allegedly taken by astronauts on the moon.  The shocking news was then complemented by reports that Washington D.C.’s Pennsylvania Avenue, also known as “America’s Main Street,” was now being listed among the nation’s endangered landscapes because of neglect and deferred maintenance, despite the fact that almost every major historical building, landmark or monument in Washington D.C. has either recently undergone renovation or is still currently under construction.  The notion that  Washington D.C. is doomed is complemented by recent government terror drills that are preparing the capital for future acts of terror. On February 22, 2012, it was reported that a new security project to lock down gateways to the U.S. Capitol is being planned, aimed at targeting gang assaults and lone wolf attackers. According to the report, officials are warning lawmakers and Capitol security against a developing type of assault called a “blended attack” that combines a physical attack against a target along with a cyber-attack against the same or different targets. Six months later on August 20, 2012, it was reported that the U.S. Air Force and Coast Guard aircraft would fly “intercept and identification” exercises entitled “Falcon Virgo” over Washington D.C. as part of efforts to prevent suicide aircraft attacks or other threats to the capital.

5:16: Washington Monument (Washington D.C.)
On August 24, 2011, it was reported that due to an earthquake, the Washington Monument had suffered a crack near the pyramid-shaped tip and had monument been permanently tilted. Although this report was later denied by officials, the Washington Monument is currently closed sue to construction and is not scheduled to re-open until 2014.

5.17: White House (Washington D.C.)
On September 12, 2012, it was reported that after nearly two years and $86 million worth of construction, the West Wing of the Obama White House has emerged from its visual seclusion “remarkably unchanged”. According to the report, the construction project began in September of 2010 with the excavation of a huge multistory pit in front of the West Wing. Aside from the suspicious construction, the White House has been the target of a number of high-profile terror plots and threats: On January 18, 2012, it was reported that an Occupy Wall Street protester threw a smoke bomb over the fence of the White House. Two months later on March 8, 2012, it was reported that a top hacker and committed anarchist who worked closely with the LulzSec, openly spoke of burning down the White House. Six months later on September 30, 2012, it was reported that the White House was attacked by hackers allegedly linked to China’s government. The unprecedented cyber-terror attack targeted the U.S. government’s most sensitive computer networks, ultimately breaching a system used by the White House Military Office for nuclear commands. A month later on October 21, 2012, it was reported that a year-long investigation by the Investigative Project on Terrorism (IPT) has found that scores of known radical Islamists made hundreds of visits to the Obama White House, meeting with top administration officials.

CONCLUSION

Starting wars between foreign countries is taken directly out of the 7th Protocols of Zion which states: “In order to display our system of keeping the governments of the goyim in Europe in check, we shall show our strength by committing terrorist attacks against one of them. If the governments of Europe should collectively rise against us, we shall respond using the military might of America, or China, or Japan.” Clearly, the Zionists have lost control of America and are hell bent on starting World War III in order to consolidate power, kill off millions of patriotic Americans, and further bankrupt America into endless debt. That obviously cannot be allowed to happen. Please do your part and spread the word.

About the Author
David Chase Taylor is an American journalist living in Zürich, Switzerland, where he has applied for political asylum after the release of The Nuclear Bible, a book credited with stopping a false-flag/state-sponsored nuclear terror attack upon America. Taylor also released The Bio-Terror Bible, a book and website exposing the coming global bio-terror pandemic. Taylor, the editor-in-chief of Truther.org, has also exposed the 2012 Democratic National Convention Terror PlotNATO’s implementation of the SKYNET Terminator Program, the “Twilight” Premier Terror Plot, as well as the Alex Jones links to STRATFOR.

TRUTHER.ORG LEGAL DISCLAIMER: Terror related assertions, forecasts and predictions made by Truther.org DO NOT necessarily imply that said terror events will transpire in reality, but rather that there is a distinct possibility that said terror events theoretically could happen based on the cumulative terror related data. Historically, once a particular false-flag terror related plot is widely exposed (See: Super Bowl XLV), the terror plot is immediately canceled or postponed. State-sponsored terror attacks must have a prior “paper trail” in order to set-up patsies, create plausible deniability, develop scapegoats, and mislead the public from the true perpetrators of terror. Truther.org’s sole purpose is preventing 9/11 type terror events by drawing unwanted global attention to various terror related “paper trails” prior to their fruition.