SWITZERLAND, Basel — Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA) is looking to execute a wave of cyber-related terror attacks in the United States surrounding the official and unofficial holidays of Thanksgiving, Black Friday, and Cyber Monday.
Potential cyber-targets include but are not limited to: the NSA Data Center Utah in Bluffdale, Utah; the U.S. power grid; U.S. nuclear reactors; U.S. oil and gas facilities; U.S. airports and train stations; the International Space Station (ISS); national retailers (Target, Wal-Mart, etc.), Google Inc. (California); and the Hoover Dam in Clark County, Nevada.
In what appears to be pre-holiday cyber-terror programming, it was reported on November 20, 2014, that hackers accessed 500 webcams in the UK and thousands worldwide. Less than a day later on November 21, 2014, hundreds of web cams within the Tri-State Area were hacked. The latter incident was evidently staged in order to show that U.S. government computer networks are vulnerable to attack.
That same day, November 21, 2014, America’s Admiral Michael Rogers, director of the National Security Agency and commander of the U.S. Cyber Command, stated that adversaries of the U.S. conduct regular electronic reconnaissance to reveal weaknesses in America’s industrial control systems, ranging from power plants to sewage facilities
Two days later on November 23, 2014., CNN published a report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus.
“Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks?
In other words, the entire internet infrastructure has been hijacked by the Regin malware and therefore any type of cyber-related attack on America’s infrastructure is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.
Although a wave of unprecedented cyber-terror attacks could be scapegoated onto China, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack. This will essentially make anyone with a computer a potential suspect.
State-Sponsored Cyber-Terror Targets:
1. NSA Data Center Utah (Bluffdale, Utah)
2. U.S. Power Grid
3. Nuclear Reactors (U.S.)
4. Oil & Gas Facilities (U.S.)
5. Mass Transit (U.S. Airports, Bus and Train Stations)
6. International Space Station (ISS)
7. National Retailers (U.S.)
8. Google Inc. (California)
9. Hoover Dam (Clark County, Nevada)
[Does not purport to be a complete list of cyber-related targets]
The notion of a Cybergeddon has been promulgated in the media since 2012 via numerous propaganda articles which have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, and “Threat Of ‘Spectacular’ Cyberattack Looms”, all indicate that unprecedented state-sponsored cyber-terror with the United States is imminent.
In a 2007 CRS Report for Congress entitled “Terrorist Capabilities For Cyber-Attack: Overview And Policy Issues”, the U.S. government states that, “If terrorists were to launch a widespread cyberattack against the United States, the economy would be the intended target for disruption” and that “Many security experts also agree that a cyber-attack would be most effective if it were used to amplify a conventional bombing or CBRN (chemical, biological, radiological or nuclear attack). Authorities have expressed concerns about terrorists combining physical attacks such as bombings with hacker attacks to disrupt rescue efforts, known as hybrid or “swarming” attacks”. Therefore, cyber-attack will likely be executed along with real-world attacks.
If and when Cybergeddon occurs, a teenager affiliated with “Anonymous” will likely be scapegoated. However, prior to this occurring, the public must first be psychologically programed to accept that this is in fact possible. Starting in September of 2013, there has been an unprecedented amount of news and events in respect to teenagers which has been subconsciously programming the masses for teen-related cyber-attack. A preview of this type of pasty programming was reported on September 26, 2013, when England arrested a 16-year old boy for a distributed-denial-of-service (DDoS) attack which was touted as ““biggest cyber-attack in the history of the internet.” Roughly a month later on October 27, 2013, a 12-year old Canadian boy plead guilty to hacking government websites and giving the information to Anonymous. A major teenage cyber-terror attack effectively turn every kid with a computer into a suspected terrorist and would undoubtedly usher in draconian internet regulation—most likely starting with the RFID micro-chip which will be used to identify internet users.
1. NSA DATA CENTER ATTACK:
1.1: Utah Data Center Cyber-Attack
In order to create a formidable target prior to an “Anonymous”-related cyber-terror attack, the NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center“, was completed in September of 2013. The $1.5B data center is located at Camp Williams, Utah, just 25 miles (40 km) south of Salt Lake City. In order to bring unprecedented media attention to the Utah Data Center just prior to a major cyber-terror attack on it, it was reported on November 14, 2014, that Utah Considers cutting off water to the NSA’s Utah Data Center. The timely report was designed to show that the NSA center is a target as well as foreshadow that fact that U.S. utilities are about to be cut off.
2. POWER GRID ATTACK:
2. 1: Power Grid Cyber-Attack
If and when a major state-sponsored cyber-terror attack targets the U.S. power grid, it will most likely involve a lengthy blackout that may never be restored. Back on April 26, 2013, it was revealed that former CIA Director stated that the U.S. electrical grid is vulnerable to attack. Roughly 6 months later on October 17, 2013, it was reported that U.S. utilities are a “soft underbelly” for hackers. Most recently, on November 20, 2014, it was reported that the U.S. government thinks that China could take down the power grid. That same day, November 20, 2014, the NSA admitted that China and other unnamed entitled can cripple US power grid. Three days later on November 23, 2014, “Business Insider” published a report entitled “Here’s What Chinese Hackers Can Actually Do To The US Power Grid”. Although China could be scapegoated in a high-profile cyber-terror attack, Anonymous is the most likely culprit.
2.2: Cyber-Terror Drill: “GridEx II”
In apparent preparation for a massive cyber-terror attack targeting the U.S. power grid, on August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “…Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”
3. NUCLEAR REACTOR ATTACK:
3.1: Nuclear Reactor Cyber-Attack
Back on December 13, 2011, it was reported that U.S. officials were investigating whether Iranian and Venezuelan diplomats in Mexico were involved in planned cyber-attacks against U.S. targets, including nuclear power plants. Needless to say, the report confirms that a cyber-attack on U.S. nuclear facilities is indeed planned. Aside from blatant programming of the 2012 Hollywood nuclear reactor disaster film entitled “Chernobyl Diaries”, a recent Nuclear Regulatory Commission (NRC) panel recommended that the U.S. government customize emergency plans for each of America’s 65 nuclear power plants, a change that would “expand” the standard 10-mile evacuation zone around U.S. nuclear reactors. In what appears to be pre-nuclear reactor attack logistics, it was revealed on July 11, 2014, via the headline “Response to ‘Attack’ on Nuclear Reactor Is Praised” that the U.S. government is holding terror drills on nuclear reactors. According to the report, “Other mock attacks have been conducted at a handful of the nation’s 62 nuclear power plants”. Evidently, the U.S. federal government is perfecting their nuclear terror attack scenarios. When and where they will strike is not known, but practice makes perfect. Roughly a month later on August 20, 2014, it was revealed that hackers attacked Nuclear Regulatory Commission 3 times in 3 years, a report designed to show that cyber-terrorists are actively targeting nuclear reactors. Most recently, on November 21, 2014, it was reported that a radioactive leak occurred at a Scottish nuclear plant. Whether the alleged leak caused by a cyber-terror attack is not known, but it will likely be stated as such after a high-profile nuclear reactor cyber-terror attack.
3.2: Target: California Nuclear Plants
California has two main nuclear reactors on its coastline: The Diablo Canyon Power Plant in San Luis Obispo County, and the San Onofre Nuclear Generating Station in San Diego County. Should a state—sponsored cyber-terror attack be executed, both nuclear reactors may be targeted. The notion that these plants ae slated for disaster was revealed back on June 19, 2012, it was reported that “San Onofre nuclear plant could become California’s Fukushima”. To date, there have several highly suspicious incidents surrounding the nuclear plant including a radiation leak on February 1, 2012, a radioactive gas escape on April 7, 2012,a hydrogen leak on October 23, 2012, and a 700,000-pound steam generator which was allegedly removed on November 5, 2012. Back on September 9, 2011, there was a massive power outage in San Diego whereby 1.4 million people lost electricity, exactly the same amount of people which lost electricity on February 1, 2012, when the San Onofre plant was shut down. Whether or not the blackout was a beta-test of the eventual San Onofre nuclear cyber-attack is not known, but San Onofre appears fully prepared to go offline.
4. OIL & GAS ATTACK:
4.1: Oil & Gas Terror Cyber-Attack
Aside from the 6 terror attacks on oil and gas pipelines internationally, there have been 3 oil and gas pipeline terror cases within the U.S. since 9/11. Needless to say, a cyber-related terror attack would predictably cause an ecological disaster. The notion that terrorists are targeting oil and gas facilities in America was witnessed back on September 29, 2004, when it was reported that two New Caney, Douglas Lloyd Crosby and Dennis Wade Durrenberger Jr., were arrested and charged with criminal mischief, a first degree felony, in connection with a pipeline explosion that caused many to be evacuated from their New Caney homes. Three years later on June 2, 2007, it was reported that four would-be terrorists had hatched a plot to blow up Kennedy Airport and swaths of Queens by attacking fuel tanks and an underground pipeline by igniting a catastrophic explosion that would eclipse 9/11. According to the report, one of the suspects boasted to a federal informant that “he had a vision that would make the World Trade Center attack seem small“. Roughly six weeks later on July 13, 2007, it was reported that a Pennsylvania man, Michael C. Reynolds, was convicted of providing material support to terrorists in trying to help al-Qaida blow up U.S. oil pipelines and refineries.
4.2: TSA Pipeline Threat Assessment (2008)
An October 23, 2008, report from the Transportation Security Administration Office of Intelligence and the U.S. Department of Homeland Security entitled “TSA Pipeline Threat Assessment” stated that “Improvised explosive devices have been the preferred method of attack against gas and oil facilities worldwide” and that “the U.S. system and its related infrastructure remain an attractive target to both terrorists and domestic extremists alike, as long stretches of open unattended pipeline are difficult to protect and the economic impact of attacks would be significant…Al-Qa’ida, in particular, has noted the potentially damaging impact pipeline attacks—both in the United States and abroad—would have on the Homeland’s economy, national security, and public health and psychology. Al-Qa’ida’s demonstrated capability and intent to target oil and gas infrastructure overseas, and the group’s desire to continue attacks in the Homeland, suggest similar attacks could occur inside the United States.”
4.3: TSA Liquid and Natural Gas Pipeline Threat Assessment (2011)
A January 18, 2011, report from the TSA Office of Intelligence Pipeline Modal Threat Assessment and the U.S. Department of Homeland Security entitled “TSA Liquid and Natural Gas Pipeline Threat Assessment 2011” stated that “There were 44 suspicious pipelines, and related oil and natural gas SARs reported to TSA-OI from January 2010 to October 2010.21 Suspicious activities near pipelines and related infrastructure may indicate an interest to collect information for a future attack, or the desire to identify vulnerabilities or test a pipeline facility’s security and response operations”. The report further states that “Terrorist groups have discussed attacks on unspecified SCADA systems, but it is uncertain whether al-Qa’ida or any other group has the capability to conduct a successful cyber-attack.19 TSA-OI is not aware of any credible, specific threat reporting targeting U.S. pipelines’ industry control systems or the supervisory control and data acquisition networks.
5. U.S: MASS TRANSIT ATTACK:
5.1: Mass Transit Cyber-Attack
Since Thanksgiving weekend is the busiest travel time of the year, U.S. airports, bus stations and train station terminals will be packed with people, a very lucrative state-sponsored terror target. The notion of airport-related cyber terror was witnessed back on November 9, 2012, when 17 flights were diverted from Manila’s international airport due to an alleged air traffic equipment “glitch”. What role these 64 planes were slated to play in the wake of a cyber-terror attack is unknown, but they were likely remotely “programmed” to lose all power at a future date. Since the TSA has now expanded their duties beyond airport security to train terminals, there is even a greater chance that Amtrak trains will be targeted by the Obama administration in the near future. Back on December 29, 2011, it was reported that Professor Stefan Katzenbeisser of Technische Universität Darmstadt had told a security conference in Berlin that new train systems are vulnerable to hackers and “Denial of Service”. Future cyber-terror attacks could rhetorically target train switching systems, which enable trains to be guided from one track to another at a railway junction. Although these switching systems have historically been separate from the online world, this is no longer the case. The Israeli cyber-terror worm entitled the “Duqu virus”, has already wreaked havoc worldwide and could be used to target trains in the U.S. and Europe. Based on recent and inexplicable train crashes, this virus may already be attacking trains worldwide. Acting as a Trojan horse, the Duqu virus has the ability to essentially hijack its victim and then allow for the remote control of whatever entity is hijacked. If the Duqu virus hijacked a train, it could theoretically control train acceleration, braking and track switching.
6. SPACE STATION ATTACK:
6.1: Space Station Cyber-Attack
Back on March 1, 2012, it was reported that the laptop which was stolen from NASA last year was unencrypted and contained command and control codes for the International Space Station (ISS) on it. The laptop in question was one of 48 NASA notebooks or mobile devices stolen between April 2009 and April 2011. Needless to say, one or more of these stolen laptops could be used to crash the ISS. In an ominous sign that space-related cyber-terror is imminent, it was reported on November 12, 2013, that the Israeli made Stuxnet virus has now infected the ISS. In order to bring unprecedented media attention to ISS just prior to an attack, it was reported on November 12, 2014, that the International Space Station allegedly dodged Chinese space junk, a laughable notion to be sure. Nevertheless, roughly 2-weeks later on November 24, 2014, it was reported that a new crew arrived at International Space Station. In the event that the ISS is hacked, it will predictably fall from orbit onto a major city, most likely within the United States.
7. RETAIL CYBER-ATTACK:
7.1: Retail Cyber-Attack
Based on the 2013 Back Friday Attack, an attack on Black Friday in 2014 is all but expected. In yet another example of how state-sponsored terror drills always precede real-life terror events, back on November 27, 2013, Truther.org published a report entitled, “Black Friday-Cyber Monday 2013 (SSTTA): NATO Executing “Largest Ever” Cyber-Terror Drill on Black Friday—Attack Imminent”. As revealed in the report, NATO was executing their largest cyber-terror drill ever and therefore the likelihood of state-sponsored cyber terror was extremely high. Predictably, it was later revealed that a major cyber-attack did in fact take place on “Black Friday” and that up to 40 million Target shoppers had their credit card information compromised. According to Brian Krebs, a journalist who specializes in computer security, the Target computer breach occurred on or around Black Friday, the busiest shopping day of the year. Needless to say, another attack on U.S. retailers this Black Friday is expected.
8. GOOGLE CYBER-ATTACK:
8.1: Google Cyber-Attack
Back on June 26, 2014, Truther.org published a report entitled “CIA Likely Planning “Anonymous” Cyber-Terror Attacks on June 27-28, 2014” which listed Google’s corporate headquarters (i.e., Googleplex) in Mountain View, California as one of three primary targets. Low and behold, less than 24-hours later on June 27, 2014, it was reported that 4 people were found dead in Turlock, California home, less than 100 miles away from Googleplex in Mountain View. Evidently, once the cyber-terror attack was exposed, the would-be terrorists (i.e., Special Forces, Blackwater, Mossad, etc.) where subsequently executed.
8.2: Moffett Airfield Attack
Back on November 11, 2014, it was reported that Google has now taken control of Moffett Airfield in California from NASA. Therefore, an explosive attack on Google computer equipment inside the airport buildings may be used to sell the notion of a real-life cyber-attack. In other words, if and when a cyber-terror attack is executed, Google’s real-world facilities will suffer a real-world attack, selling the notion that a real cyber-attack was executed. This particular angle was attempted once before with the Google barges. In order to sell the notion of a Google attack to the public, Google previously placed “secret” barges off the shore of the U.S. in at least 4 locations (e.g., San Francisco, California; Portland, Maine; New London, Connecticut; and a second barge in San Francisco, California). In order to bring unprecedented attention to the Google Barges prior to their slated during a cyber-terror attack, the U.S. Coast Guard reportedly visited the two San Francisco Google Barges on November 2, 2013. In order to answer the question posed by the Boston Globe as to why Google went to sea, the simple answer is that it’s all part of an elaborate state-sponsored cyber-terror plot. Although the Google Barges were never attacked, their sheer existence confirmed that Google is indeed a target.
9. HOOVER DAM CYBER-ATTACK:
9.1: Hoover Dam Attack
The Hoover Dam is a concrete arch-gravity dam in the Black Canyon of the Colorado River, on the border between the U.S. states of Arizona and Nevada. Back on January 15, 2013, it was reported that the federal Occupational Safety and Health Administration (OSHA) had found 58 violations at Nevada’s Hoover Dam, the hydroelectric power plant east of Las Vegas. According to the report, OSHA found numerous superficial violations but stated that “none of the violations jeopardized the safety of the public or threatened the structural integrity of the dam or its operations”. Therefore, if and when the 79-year old year Hoover Dam is hit by a state-sponsored cyber-attack, it will likely “crack” (with a little help from demolition explosives) resulting in a massive local tidal wave and an electrical power blackout blanketing California, Arizona and Nevada. With no power, no airport, no gambling, no air conditioning, no sewage system and no way out, tourists and locals alike would begin looting as riots and mayhem would breakout almost instantaneously.
About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Basel, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.
Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste