Archive for the ‘Terror Alerts’ Category

Travel Alert

Download & Forward PDF

David Chase Taylor
November 26, 2014
Truther.org

SWITZERLAND, Basel — Considering that the Thanksgiving Eve is the busiest travel time of the year, it’s highly likely that the Obama administration (at the behest of the CIA) is plotting a wave of travel-related terror attacks across the U.S. in order to terrorize Americans during the holidays.

Truther.org has exposed recent terror plots targeting U.S. airports, U.S. buses, U.S. trains and U.S. subways so another terror plot would be par for the course. The impending attacks will most likely be scapegoated onto the state-sponsored terror group known as ISIS.

In order to raise the notion of guns at U.S. airports prior to a Thanksgiving-related airport massacre, it was reported on November 3, 2014, that the TSA confiscated dozens of guns at U.S. airports in October of 2014. The timely report was designed to give the U.S. government plausible deniability in the aftermath of gun-related airport massacre.

Roughly 3-weeks later on November 23, 2014, it was reported that a naked man crashed through the ceiling and attacked an elderly man at Boston’s Logan airport. Aside from the fact that Logan was used in the 9/11 attacks, the naked man was designed to be shocking so that public would remember the incident, further acclimating them to the notion of an airport-related attack.

In what appears to be the chosen train line for Thanksgiving-related terror attacks, it was reported on October 31, 2014, that the LACMTA is closing train stations for Blue Line improvements. The Los Angeles County Metropolitan Transportation Authority stated that the Blue Line Pacific Coast Highway and Anaheim stations in Long Beach will each receive improvements such as new tracks and track beds.

Whether the timely closure of the Blue Line has provided the necessary cover for the installation of explosives and/or bio-chemical weapons on the tracks or inside the stations is not known, but it’s highly likely. Said weapons could be utilized at a later date in a coordinated state-sponsored terror attack.

Top U.S. Travel Targets:

I. Airplanes & Airports
II. Buses & Bus Stations
III. Trains & Train Stations
IV. Subways & Subway Stations

ISIS BIO

ISIS Bio-Terror Attack
The endgame of ISIS terrorists, who were reportedly trained at a secret base in Jordan, is a bio-chemical terror attack that spawns the global pandemic planned for 2014. This particular narrative was first identified on June 19, 2014, when ISIS reportedly stormed a Saddam-era chemical weapons complex in Iraq. Roughly 3-weeks later on July 8, 2014, it was reported that “abandoned” barrels containing deadly sarin were seized by ISIS in rebel-held Syria. Less than 24-hours later on July 9, 2014, it was reported that Iraq has now lost control of a chemical weapons depot to ISIS. Never mind that back on March 31, 2005, “The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction” reported that the intelligence community was “dead wrong” in its assessments of Iraq’s weapons of mass destruction capabilities prior to the U.S. invasion. In other words, there were no WMDs in Iraq but ISIS located two bio-chemical weapon depots inside Iraq within 27 days? Needless to say, the entire ISIS-bio-terror narrative has been fabricated by the CIA in order to provide the necessary cover for a state-sponsored bio-chemical attack. The ISIS endgame was confirmed yet again on August 28, 2014, when it was revealed that a black Dell laptop belonging to ISIS contained instructions on how to weaponize the bubonic plague. Lastly, on October 30, 2014, it was reported that Spanish Intelligence has intercepted an ISIS plot to weaponize Ebola, confirming that an ISIS-related bio-terror attack is imminent.

New York Bio-Terror Drills
Prior to a state-sponsored bio-terror attack in New York City, local, state and federal officials must drill the exact scenario so that they are psychologically prepared for the real thing. Coincidentally, on October 31, 2014, it was reported that FEMA is conducting pandemic training in both New York and New Jersey. According to the report, the Federal Emergency Management Agency is executing the “2013-14 Pandemic Influenza Continuity Exercise Strategy” in the Tri-State area. The bio-terror training reportedly involves a November 6-7, 2014 timeframe for a “Final planning meeting” which is a requirement when “conducting full scale exercises”. FEMA also states that “Training will be provided to exercise Controllers and Evaluators to help manage full scale exercise play”. Therefore, just like before 9/11, FEMA is already on the ground in New York City ready to deal with a bio-terror attack.

I. AIRPLANE/AIRPORT ATTACK:

F201401080844382218623932

1.1: 9/11-Style Attack by ISIS
In order to set up ISIS for a 9/11-style attack, the CIA has repeatedly had their intelligence operatives state that this type of attack is now being planned. For example, on June 15, 2014, U.S. Senator Lindsay Graham stated that ISIS held territory in Iraq will be the next 9/11 “staging area”. Less than 24-hours later on June 16, 2014, CBS News published a report entitled “Will ISIS Plan a 9/11-Style Terror Plot Against the U.S.?”, further foreshadowing the notion if a 9/11-style attack by ISIS. Roughly a week later on June 23, 2014, former Vice President Dick Cheney stated that another 9/11 is coming, only “far deadlier”. Two days later on June 25, 2014, it was reported that ISIS is trying to grab its own air force, foreshadowing the notion that ISIS is planning an aerial-related terror attack. Lastly, on August 22, 2014, the White House stated that ISIS could “pivot” to a 9/11-style attack, ultimately confirming that a 9/11-style attack by ISIS is now in play. How U.S. politicians and the White House in Washington, D.C. know the secret plans of terrorists hiding in the deserts of Iraq is unknown unless of course both the U.S. government and ISIS are being controlled by the same entity—the CIA.

1.2: Airport Attack
What type of ISIS-related airport attack is planned is not known, but based on recent airport-related violence by Islamic terrorists (see below), a 9/11-style kamikaze attack, bombing, gun-related massacre, hijacking, hostage crisis or suicide bombing are the most likely terror scenarios. In an ominous sign that Miami, Florida will be targeted, it was revealed on October 22, 2014, that a concourse at Miami international airport was evacuated after a passenger made a false bomb threat. Whether the evacuation provided the necessary cover for the installation of weapons and/or explosives within the airport is not known, but it’s highly likely. Said weapons and/or explosives could be utilized at a later date in a coordinated state-sponsored terror attack. In order to program Americans for an airport attack in Miami, the Travel Channel created a television show entitled ‘‘Airport 24/7: Miami’’ about how the airport dealt with terrorist threats. With about 40 million passengers moving through the airport every year, Miami is a ‘‘Category X’’ airport, meaning it’s a prime target for a terrorist attack.

Top U.S. Airport Terror Targets
:

1. JFK International Airport (New York, New York)
2. LaGuardia Airport (New York, New York)
3. LAX International Airport (Los Angeles, California)
4. Miami International Airport (Miami, Florida)
5. Newark Liberty International Airport (Newark, New Jersey)

1.3: ISIS Airport Attack

The notion that ISIS wants to execute an airport related terror attack was witnessed back on October 6, 2014, when a teenager was arrested at O’Hare Airport in Chicago after trying to join ISIS. Six days later on October 12, 2014, U.S. General Dempsey stated that ISIS had “straight shot” to Baghdad airport, implying that an ISIS airport attack may be forthcoming. U.S. airports have been under the threat of state-sponsored terror since the foiled Millennium Terror Plot of December 31, 1999, which involved an “Islamic” terrorist plot to bomb LAX airport. Roughly 4 years later on July 4, 2002, there was shooting at LAX which killed 3, reportedly by a 41-year-old Egyptian national. LAX came under attack again on November 1, 2013, when a TSA worker reportedly killed 1 and injured 7. Roughly 6 months later on April 10, 2014, a photo of San Francisco Airport appeared in al-Qaida’s magazine “Inspire”. Since Al Qaeda and ISIS are the primary terrorist arm of the CIA, the magazine’s “photos” are in essence the targets that the CIA is planning to attack.

2014 Islamic Airport Attacks:

1. June 9, 2014: ‘This is just the beginning': Taliban claim Pakistan airport attack
2. June 10, 2014: Gunmen attack Karachi Airport security training facility in second assault
3. June 26, 2014: Separatists attack airport in east Ukraine, defy truce
4. July 17, 2014: Gunmen attack airport in Afghan capital
5. July 27, 2014: Over 50 dead in Tripoli airport battle as foreigners leave collapsing Libya
6. August 9, 2014: Rocket hits Kabul airport after Kerry departure
7. August 23, 2014: Libyan militants claim to have taken control of Tripoli’s main airport
8. November 11, 2014: Shiite rebels clash with security guards at Sanaa airport; 4 killed

[Does not purport to be a complete list of airport attacks]

II. BUS ATTACK:

2014-school-bus-terror

2.1: Bus Attack
Exactly what type of bus-related terror attack is planned is not known, but it will likely involve a beheading, bio-chemical attack, bombing, or suicide bombing. The attack will predictably be scapegoated onto the state-sponsored terror group known as ISIS. In what appears to be the bus slated for the impending ISIS-related terror attack, it was reported on November 1, 2014, that a Halloween fight on S52 bus in Staten Island resulted in it being “taken out of service”. Considering that no one was killed in the fight, its removal from the fleet is highly suspicious. Whether the timely fight and subsequent removal of the bus provided the necessary cover for the installation of weapon and/or explosives aboard the bus is not known, but it’s highly likely. Said weapons and/or explosives could be utilized at a later date in a coordinated state-sponsored terror attack. In order to bring unprecedented media publicity to both bio-terror and buses prior to an attack, President Obama once again stated that Ebola can’t be spread on bus. This was the second time that Obama mentioned buses and Ebola in the same sentence. Back on September 30, 2014, it was reported that anti-jihad bus ads were pulled in New York City after a request from the family of James Foley. The CIA-spawned publicity stunt was evidently designed to provide a timely motive for an Islamic bus-related terror attack in New York City.

2.2: Bus Terror Trending
Prior to a high-profile bus-related terror attack in the United States, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced bus-related terror is now at an all-time high which suggests that a state-sponsored terror attack on buses and/or stations is imminent.

Bus Terror Timeline:

1. October 4, 2014: Pakistan bus station bombing kills 5
2. October 10, 2014: One Killed, One Injured In Shooting Near Union Station
3. October 11, 2014: ‘Brutal attack’ at NC bus station caught on tape, suspect arrested
4. October 12, 2014: Raiders fans egg Chargers’ bus in Oakland
5. October 13, 2014: Metro bus driver quarantined after passenger yells ‘I have Ebola!’
6. October 14, 2014:
Passengers hurt when Megabus flips on Ind. interstate
7. October 15, 2014: Man stabs two passengers on tour bus, trooper fatally shoots suspect
8. October 20, 2014: Obama: You Can’t Get Ebola on a Bus—Day After Bus Quarantined in D.C.
9. October 23, 2014: Bus Crashes Onto Sidewalk in Brooklyn, 7 Hurt: MTA
10. October 30, 2014: MTA bus fatally strikes man as he crosses Queens street
11. October 31, 2014: Halloween night bus fight breaks out aboard S52 in New Brighton
12. November 1, 2014: Teenager killed after running in front of bus with stolen Halloween goods
13. November 11, 2014: Scores reported dead in Pakistan bus crash
14. November 24, 2014: California tour bus crash kills at least 1, injures dozens
15. November 17, 2014: Dropkick Murphys’ tour bus in fatal accident
16. November 22, 2014: Police: Al-Shabab militants kill 28 in Kenya bus

[Does not purport to be a complete list of bus-related terror headlines]

III: TRAIN ATTACK:

AP_canada_train_derailment_jt_130707_16x9_992

3.1: Rail Terror 101
The first general rule of rail-related terror is that if it’s an underground rail system like a subway, the attack will most likely be of a bio-chemical nature (e.g., sarin, smallpox, anthrax, etc.). Since passengers are already below sea-level, it’s far easier for them to be trapped and suffocated by the bio-chemical agent, making the likelihood of them contracting the infectious disease all the more likely. This particular scenario was witnessed in the Tokyo Subway Sarin Attack of March 20, 1995, and will likely be witnessed once again in New York City under the Obama administration. The second general rule of rail-related terror is that if it’s an above ground rail system like Amtrak, the attack will most likely be of a conventional nature (e.g., guns, explosives, etc.). Conventional attacks create a gruesome scene for all the public to see which provides a staging ground for government-owned media camp out and salivate over the attacks. In essence, the scene of the crime becomes a round-the-clock news center. This particular scenario was witnessed during the Madrid Train Bombings of March 11, 2004, and the London Train Bombings of July 7, 2005, both of which share distinct earmarks of state-sponsored terror (see: “7/7 Ripple Effect” and “Madrid 3/11”).

3.2: Train Hijackings Trending
Considering that it takes years of training and experience to properly operate a train, any future scenario in which a train is hijacked is without a doubt an act of state-sponsored terror. Nevertheless, the CIA has spawned a number of recent train-hijackings and propaganda reports in order to make this particular scenario more believable. For example, on October 14, 2014, it was reported that a disgruntled employee stole a train in order to “play chicken” with another train. The hijack ended when the train crashed into another train. Roughly a week later on October 22, 2014, a man stole and train in Moscow before crashing it. That same day, October 22, 2014, a train-like BBQ grill was stolen from the University of South Carolina. Six days later on October 28, 2014, a story was published about how an Egyptian train just vanished into the desert some 8 years ago. As evidenced, hijacked and stolen trains are trending in an unprecedented manner which suggests that a state-sponsored train hijacking may be imminent.

3.3: Train Terror Trending
Prior to a high-profile train-related terror attack, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced train-related terror is now at an all-time high which suggests that a state-sponsored terror attack on trains, and/or train stations is imminent.

Train Terror Timeline:

1. May 9, 2014: 13 assault rifles stolen from Chicago rail yard
2. October 6, 2014: Cleanup continues after train derailment in Louisiana
3. October 8, 2014: Canada train derailment forces evacuation of dozens
4. October 10, 2014: One Killed, One Injured In Shooting Near Union Station
5. October 10, 2014: Man, child struck and killed by train in Mississippi
6. October 10, 2014: Chicago man charged in ‘L’ train shooting; stolen assault rifle used
7. October 12, 2014: Train hits 3 people on California coast, 1 killed
8. October 13, 2014: Police Investigate Fight On Train Captured On Video
9. October 14, 2014: Disgruntled employee steals train to ‘play chicken’, crashes into another train
10. October 22, 2014: Gamecocks train grill stolen, deputies seek info
11. October 22, 2014: Palestinian driver kills baby at Jerusalem train station
12. October 22, 2014: Off the rails: Mystery man steals, crashes Moscow train
13. October 22, 2014: Run-over terror attack kills 1 injures 8 at light rail station in Jerusalem
14. October 28, 2014: Sleepy engineer caused NYC train derailment, feds say
15. October 28, 2014: 8 hurt in Amtrak train, semitrailer collision in Indiana
16. October 28, 2014: How does an Egyptian train just vanish into the desert
17. October 29, 2014: Man Beheads Woman in New York Before Jumping in Front of Train
18. October 29, 2014: CISF men stop Metro train to recover stolen bag of cash
19. October 30, 2014: 4 subway workers burned, 1 seriously at Union Square station
20. October 31, 2014: 3 killed after train strikes vehicle in Illinois
21. November 1, 2014: ISIS leaflets in Virginia: “We are here from Mexico and came by train”
22. November 2, 2014: Small fire at Disney World’s Seven Dwarfs Mine Train ride
23. November 8, 2014: Train slices tractor-trailer carrying lettuce in NC; lettuce goes flying
24. November 10, 2014: Model dies after catching fire atop moving train
25. November 10, 2014: Epic brawl on NYC subway goes viral after ‘man slaps soul out of girl’
26. November 16, 2014: Police hunt suspect who pushed man onto NYC subway tracks
27. November 19, 2014: Suspect in deadly New York City subway shove case arrested
28. November 19, 2014: Commuter chaos as fire alarm closes London’s Victoria Station
29. November 24, 2014: Truck torn apart by two trains at rail crossing in Kazakhstan

[Does not purport to be a complete list of train-related terror headlines]

FLASHBACK: NEC Amtrak Terror Plot
Back on November 26, 2013, Truther.org published a report entitled, “Amtrak Train Attack (SSTTA): Northeast Corridor (NEC) Terror Attack Imminent”. Low and behold, 5 days later on December 1, 2013, 4 people were killed and 48 injured in an alleged “derailment” of Metro-North passenger train in New York City, which is coincidentally located in the Northeast Corridor (NEC).  Evidently, the “accidental” train crash was orchestrated in order to provide the necessary cover for intelligence agencies to dispose of the explosives which had been inserted onto the track for the impending attack. The wreck provided a convenient window whereby the train tracks could be cleaned up without drawing any suspicion.

IV. SUBWAY ATTACK:

385539_630x354

4.1: Subway Attack
Exactly what type of subway attack is planned is not known, but it will either involve a train hijacking, bio-chemical attack, suicide bombing, or prolonged hostage situation. Out of these four terror scenarios, the most likely is a bio-chemical attack which will be scapegoated onto the state-sponsored terror group known as ISIS. As depicted in the Bio-Terror Bible, the genesis of the 2014 bio-terror pandemic will be a “made-for-TV event” whereby millions will witness a bio-terror outbreak in person and on “live” television. This staged bio-terror “event” will likely occur when the agents known as anthrax (Bacillus anthracis) or smallpox (Variola major) are released into a controlled environment such as a subway system. In what appears to be the slated New York bio-terror target, it was reported on November 7, 2014, that an electrical fire triggered an evacuation of the 181st Station in New York City. According to reports, the 181st Street subway stop in Manhattan was evacuated after it was filled with smoke. Although the Fire Department of New York (FDNY) stated there was an electrical fire on a train, an MTA spokesperson stated that the smoke appeared to have emanated from a transformer and did not involve a train. The conflicting reports over the basic diagnosis suggest that foul play is afoot. In what appears to be pre-New York subway bio-chemical attack programming, one of the alleged witnesses tweeted that there were explosions and chemical-like smells on the A train. The tweet, which was evidently executed by an agent on the ground, was predictably picked up by the press, programming New Yorkers for the impending bio-terror attack. Whether the timely evacuation of the 181st Street (IND Eighth Avenue Line) provided the necessary cover for the installation of explosives and/ bio-chemical weapons is not known, but it’s highly likely. Said explosives and/or weapons could be utilized at a later date in a coordinated state-sponsored bio-terror attack. In what appears to be a CIA-spawned publicity stunt in order to draw unprecedented attention to the New York City subway just prior to a bio-terror attack, it was reported on November 16, 2014, that the NYPD was hunting a suspect who pushed man onto NYC subway tracks. Predictably, three days later on November 19, 2014, the suspect in the deadly New York City subway shove case was arrested.

4.2: FLASHBACK: NYC Bio-Terror Terror Plot
Less than 24-hours after Truther.org published a report on June 8, 2014, entitled “Obama Plotting Bio-Terror Attack on New York City Subway — Again”, it was revealed that a “power outage” interrupted Staten Island Railway between the and St. George stations. Whether the outage provided the necessary cover for removal of weapons and/or explosives from the track is not known, but it is highly likely. The St. George station was one three rail-related targets slated for attack.

4.3: FLASHACK: Super Bowl Transit Terror Plot
Back on February 2, 2014, Truther.org published a terror alert in respect to an impending bio-terror attack on mass transit during Super Bowl XLVIII in New York City. Coincidentally, in what appears to be the “clean-up” job, it was reported on February 2, 2014, that an emergency situation occurred at the Seaucius train station in New Jersey due to a “collapsed” Super Bowl fan. The train station, which is only 2.6 miles from Met-Life Stadium, appears to have been the chosen bio-terror attack location and therefore a fabricated “emergency” was orchestrated in order to provide the necessary cover for intelligence agencies to dispose of the explosives and/or bio-terror agents which has been inserted into the mass-transit station. The emergency provided a convenient window whereby the train station could be cleaned up without drawing any suspicion.

About the Author

David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Basel, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

chinainvadesamerica

Download & Forward PDF

David Chase Taylor
November 26, 2014
Truther.org

SWITZERLAND, Basel — As originally depicted in the June 30, 2014, Truther.org report entitled “China Plans to Cyber-Hijack U.S. Drones for Attack on America”, the CIA (which is in command and control of all 206 counties) is plotting a surprise drone attack on the U.S., most likely using American drones allegedly hijacked by the Chinese government.

In what appears to be a warning of a Chinese attack, Fox New published a report on November 26, 2014, entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat.

In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”

In order to make the United States vulnerable just prior to the slated Chinese attack, U.S. President Obama fired Secretary of Defense Chuck Hagel a day prior on November 25, 2014, making a spectacle of it while doing so. The timely firing was designed to make America look weak, thus inviting a surprise attack by China.

Back on November 9, 2014, the Financial Times of London published a report entitled “Beijing Sees the U.S. President as a Weak Leader in the Autumn of His Presidency”. The firing of the Secretary of Defense with no replacement will predictably be touted as the straw which broke the camel’s back.

That same day, November 25, 2014, Fox News published a report entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China.

The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”.

Two days prior on November 23, 2014, CNN published a report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus.

“Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks?

In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

Although this modern Pearl Harbor-like attack scenario has been exposed in the past, breaking news and events suggests that a redux attack is imminent. Although a drone-related attack by China could theoretically transpire in any U.S. city, the following are most likely due to their proximity to the Pacific Ocean.

Potential Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada.
4. Los Angeles, California
5. San Diego, California

It is imperative to note that once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will likely become the norm. This futuristic drone war scenario essentially allows the CIA to attack whomever and whatever they want—whenever they want.

The notion that the CIA is actively trying to trigger World War III between the U.S. and China has been exposed ad nauseam by Truther.org. To date, at least 6 different of Chinese “surprise” attack plots have been identified and exposed, the cyber-hijack of drones being the latest.

In the wake of these “surprise” Chinese attack plots being exposed, roughly 60 Chinese officials suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots.

Chinese Cyber Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Chinese Drone Attack

Revenge Drone Attack
In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

“Sting of the Drone”
The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

Asian “Surprise” Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

??????????????????

Vice Admiral Jan E. Tighe

In what appears to be pre-Chinese cyber-attack personal logistics by the U.S. Navy, it was revealed on April 3, 2014, that Vice Admiral Jan E. Tighe has been appointed head of the U.S. Fleet Cyber Command and the U.S. 10th Fleet, making her “the first female commander of a numbered fleet in U.S. Navy history”. The U.S. Fleet Cyber Command is an operating force of the United States Navy responsible for the Navy’s cyber warfare programs, while the United States Tenth Fleet executes the full spectrum of cyber, electronic warfare, information operations and signal intelligence capabilities across the cyber, electromagnetic and space domains. In the wake of a successful Chinese cyber-attack against the U.S. Navy, Vice Admiral Tighe, a woman, will be publically scapegoated for the unprecedented attack. The U.S. government and the media will predictably state that Tighe was over her head and not qualified for the position, making the issue about a woman serving in the military rather than the fact that the entire Chinese attack was a false-flag courtesy of the CIA.

I: DRONE CYBER-HIJHACK:

drone

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2 China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.3 Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

II: CALIFORNIA:

2.1 Chinese Attack on California
In order to make China’s drone attack on San Francisco be more explosive in nature, the CIA ordered three former U.S. Navy fleet oilers to be moved to Mare Island, just outside San Francisco Bay. Although the USS Hassayampa, the USS Kawishiwi, and the USS Ponchatoula were allegedly moved to the island for “cleaning”, it’s highly likely that they were actually filled with gasoline and/or explosives. That way, when they are struck with a drone missile, a massive explosion will erupt, creating a made-for-TV moment reminiscent of the December 7, 1941 Japanese attack on Pearl Harbor. California also has two nuclear reactors that may come under Chinese drone attack: The Diablo Canyon Power Plant located in San Luis Obispo County (just 231 miles from San Francisco), and the San Onofre Nuclear Generating Station in San Diego County. In the event that China is able to hijack U.S. drones, one or more of these nuclear reactors may be attacked, causing a Fukushima-like disaster in America. Interestingly, a similar nuclear reactor disaster if featured in the recent Hollywood propaganda film entitled “Godzilla” (2014), which also features an attack on San Francisco by an Asian-based monster.

Kaiju_Attack_SF_Aftermath_01

2.2 Golden Gate Bridge Attack
To make a Chinese attack on the U.S. even more psychologically terrorizing, a well-known landmark such as the Golden Gate Bridge in San Francisco must be destroyed in order to serve as life-long reminder of that horrific day (e.g., Twin Towers on 9/11). Back on February 23, 2012, it was reported that the Golden Gate Bridge will undergo a renovation project that will “take years to complete”. According to reports, the project involves the repainting of the two main suspension cables which are responsible for holding the bridge in place. Whether the lengthy “renovation” project has undermined the structural integrity of the bridge is not known, but the timely construction project may have provided the necessary cover for the installation of demolition explosives in and around the Golden Gate Bridge. Said explosives could be detonated at a later date via remote control in order to give the appearance of a successful Chinese attack on the bridge using drone missiles. In other words, the bridge would be demolished with shaped explosives while the government and media publicly blame China.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Basel, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

 

impact_intro

Download & Forward PDF

David Chase Taylor
November 25, 2014
Truther.org

SWITZERLAND, Basel — Back on December 10, 2013, Truther.org published a terror warning in respect to a man-made asteroid attack from the alleged comet known as ISON. Less than 24-hours later, comet ISON was officially declared dead by NASA.

Although the brazen attack was ultimately thwarted, the plot to terrorize humanity with a man-made asteroid is unfortunately alive and well. Based on breaking news and events, namely the 22 asteroids, comets, fireballs, meteoroids and meteorites (see list below), which have entered or passed by planet Earth within the last year, another man-made asteroid attack now appears imminent.

Aside from the plethora of space rock attack propaganda (see below) which has been disseminated by the government and media, CNN reported on May 27, 2014, that a giant asteroid is possibly on a collision course with Earth. The report was uploaded onto CNN’s iReport in order to further acclimate the public to the notion of an asteroid attack.

After CNN’s asteroid story went viral on the internet, television and social media, NASA confirmed on May 28, 2014, that an asteroid is not on a collision course with Earth. By working in tandem, CNN and NASA were able to spread the false notion of an asteroid attack globally by first claiming that it was true and then quickly stating it was a hoax.

When the European Space Agency (ESA) allegedly landed the Philae spacecraft on the 67P/Churyumov–Gerasimenko comet which was reportedly traveling 84,000 MPH, it was a publicity stunt designed to program the masses for the impending asteroid attack. The November 12, 2014, comet landing is completely debunked in the Truther.org report entitled “10 Reasons Why the Rosetta Comet Landing was a Hoax”.

If and when a Doomsday asteroid strikes planet Earth, it will most likely land in the Pacific Ocean and the so-called Ring of Fire, causing earthquakes, tsunamis and volcanoes. The man-made asteroid would never strike land because there it could be located, examined and tested by scientists for its authenticity. This obviously cannot be allowed to happen so it must quickly sink into the abyss of the ocean never to be seen again.

cnnasteroid

Space Rock Activity at All-Time High
Reports in respect to asteroids, comets, fireballs, meteors, meteorites and streaking lights are currently at an all-time high. This phenomenon commenced on November 28, 2013, just prior to the slated arrival of the man-made comet ISON on December 10, 2013. This sudden influx of space rocks confirms that there is a concerted agenda to develop a believable asteroid narrative prior to an unprecedented and earth changing Doomsday asteroid-like attack.

2013-2014 Space Rock Timeline:

1. November 28, 2013: Meteor confirmed as cause of loud boom in Quebec, Ontario
2. December 29, 2013: Blinding fireball meteor caught on CCTV shooting across night sky
3. February 13, 2014:
Mysterious fireball in the sky caught on camera
4. February 24, 2014: Biggest meteor ever recorded hits Moon
5. March 4, 2014: 98-foot asteroid flashes between moon and Earth within 24 hours
6. March 19, 2014:
Asteroid 163 Erigone blots out star
7. April 3, 2014:
Meteorite narrowly misses Norwegian skydiver
8. April 21, 2014: Dazzling Meteor Fireball Streaks Across the Sky in Northern Russia
9. May 3, 2014: Bus-Size Asteroid Buzzes Earth, Comes Closer Than the Moon
10. May 5, 2014: Bright daytime meteor seen over Canada and U.S. Northeast
11. May 16, 2014: Australia: Flaming Ball Falls from Sky and Crashes ‘Like a Bomb’
12. May 24, 2014: Comet to pass by Earth closely after meteor shower
13. June 6, 2014: Enormous ‘Beast’ Asteroid to Fly Past Earth on Sunday
14. July 11, 2014: Mystery ‘meteor’ burning over Australian sky baffles eyewitnesses
15. September 8, 2014: Large space object slams Nicaragua’s capital as asteroid passes Earth
16. September 8, 2014: Great balls of fire: Meteor illuminates Spanish skyline
17. September 12, 2014: Strange Streak Of Light In San Francisco Area Sky on Friday Morning
18. September 15, 2014: ‘Fireball’ reported along East Coast Sunday night
19. October 9, 2014: Man Believes Debris Fell From Sky Onto Secaucus
20. November 3, 2014: Meteor streaks over eastern US Monday night
21. November 9, 2014: Fireball lit up Texas sky, residents say; was caught on camera
22. November 18, 2014: Massive flash over Russia’s Urals stuns locals & scientists

[Does not purport to be a complete list of space activity]

itokawa06_hayabusa21

The Beast
In the event that Earth is struck by a man-made asteroid in 2014, it will most likely be the 2014 HQ124 which is a near-Earth asteroid roughly 370 meters (1,210 feet) in diameter which coincidentally passed 3.25 lunar distances (LD) from Earth on June 8, 2014. It was allegedly discovered on April 23, 2014, by the NASA program NEOWISE (Near-Earth Object WISE). According to the Scientific America, an impact event featuring 2014 HQ124 would produce the equivalent of 2,000 megatons of TNT and create a 5 km (3 mi) impact crater. The fact that this statistic exists confirms that the hypothetical asteroid will be scapegoated in an upcoming man-made asteroid attack. Also, the government and media have nicknamed the asteroid “The Beast”, a name designed to invoke “The Beast” as depicted in the book of Revelation in the Holy Bible. Although 2014 HQ124 allegedly passed close to Earth in 1952, it is not scheduled to return until 2307. However, there is a caveat because radar imaging suggests that 2014 HQ124 appears may be a contact binary, meaning that it is allegedly constructed of two separate stones which previously collided. Therefore, it’s highly likely that NASA and the ESA will state that one of the rocks peeled off, staying within Earth’s orbit. In order to draw unprecedented media attention to 2014 HQ124 prior to its arrival on Earth, Discovery.com published a reported on June 12, 2014, entitled “Radar Reveals Beautiful Face of an Asteroid ‘Beast’”. In the event that “The Beast” is not used as the man-made asteroid culprit, a backup asteroid known only as 2014 UR116 has also been primed. Similar to “The Beast”, scientists estimate that if 2014 UR116 strikes Earth, the explosion would be 1000 times more potent than the Chelyabinsk meteor explosion in 2013.

20140605_asteroid2014HQ124-640

I. ASTEROID ATTACK SET-UP:

1.1: Surprise Asteroid Attack
In order to gain plausible deniability in the aftermath of Doomsday asteroid, comet or meteoroid strike, NASA has created a media narrative whereby they will be “taken by surprise” when an alleged space rock suddenly appears out of the east, directly in the Sun’s glare. This is likely why reports on ISON were so ambiguous since ISON’s all alleged trip around the sun. An indication of exactly how this particular scenario would play out occurred on March 7, 2013, when it was reported that an asteroid the size of a city block would pass Earth that weekend. According to the report, “The asteroid was only discovered Sunday because search telescopes can’t find objects of that size until they get close.” Wikipedia further stated that the “2013 ET is a Near-Earth asteroid that was discovered on March 3, 2013, six days before its closest approach to Earth”. If and when the Doomsday asteroid, comet or meteoroid hoax is finally triggered, the world will likely have only a few days to panic prior to its alleged impact. A few weeks later on March 21, 2013, it was revealed that White House science adviser John Holdren reportedly wanted to put “an infrared telescope in a Venus-like orbit to spot asteroids that can’t be seen from the ground because they’re lost in the Sun’s glare” and that “the Chelyabinsk meteorite was exactly that kind of meteor, which came in from a direction that Earthbound telescopes can’t look in.” Bolden then stated, “If [the asteroid] is coming in three weeks…pray”. The January 10, 2013 propaganda report by Forbes entitled, “We Probably Wouldn’t Even See A Doomsday Asteroid Until It Was Too Late” indicates that the sneak attack by a wayward asteroid, comet or meteoroid is in fact part of the working Doomsday space terror script. The notion of a rogue asteroid was recently highlighted in a January 19, 2014 report entitled, “NASA says Mars Mystery Rock ‘Appeared’ from Nowhere”. Eleven days later on January 31, 2014, Christian Science Monitor published a report entitled, “Going Rogue could be the Norm for Asteroids, say Astronomers”. Although these reports were not directly made in respect to asteroids per se, they do confirm that a “surprise” asteroid attack is in play.

Asteroide-2014-HQ124-bestia-2

1.2: Asteroid Hunter Lost
If and when a Doomsday asteroid strikes Earth, government agencies like NASA will need plausible deniability to excuse their gross maleficence. Coincidentally, on September 10, 2013, it was reported that NASA conveniently lost contact with the comet-hunting Deep Impact spacecraft sometime between August 11 and August 14, 2013. This news was confirmed yet again 11 days later on September 21, 2013, when it was reported that NASA had officially closed the books on the most-traveled comet-hunter in history due to a “software bug” which subsequently cut off communication with the 9-year old spacecraft. The timely loss of the world’s greatest comet hunter suggests that the space attack depicted in “Deep Impact” (1998), a film (see trailer) about an apocalyptic asteroid strike on Earth, is now imminent. As of August 14, 2013, NASA is conveniently and officially blind to incoming Earth threatening asteroids, comets or meteoroids. In order to pretend that there is a real asteroid problem and that they are actively trying to thwart an impending asteroid attack, a number of propaganda reports have been disseminated in order to give governments and their respective space programs the excuses they will need in the aftermath of an asteroid attack that kills millions.

1.3: “Chelyabinsk” Asteroid Beta-Test
In what appears to have been a beta-test for an impending Doomsdays asteroid, comet, o meteoroid strike, on February 15, 2013, a small asteroid struck in Chelyabinsk, Russia, allegedly injuring 1,500 people. This suspicious event was made even stranger because it happened on the same day that the asteroid known as “2012 DA14” flew by within 17,200 miles of Earth. According to Wikipedia, the Chelyabinsk asteroid was the largest known object to have entered Earth’s atmosphere since the 1908 Tunguska event, and it’s the only asteroid to date which has caused a large number of injuries. The “Chelyabinsk” event appears to have been nothing more than a staged beta-test to assess the hoax-ability of a future Doomsday asteroid, comet or meteoroid. Although this alleged asteroid strike was completely unexpected, there were numerous video cameras shooting its entry from almost every conceivable angle (all of which were recovered, downloaded, uploaded, edited, produced, uploaded again and broadcast within minutes of the event on February 15, 2013). The fake asteroid also appeared to burn out prior to ever hitting the ground, making the hoax even easier to pull off. A year later on February 15, 2013, it was reported that “conspiracy theorists” have claimed that the Russian meteorite was shot down by a military missile. Like most intelligence reports, the information was presented backwards. The reality is that the Chelyabinsk Asteroid was most likely a missile itself, albeit a doctored one designed to look like a meteorite. In order to rehash the Russian meteorite narrative just prior to an impending asteroid strike, it was reported on November 19, 2013, that a new meteor has once again struck Russia.

2.2: “Chelyabinsk” Asteroid Odds: 1 in 100 Million 
Aside from the question posed in the headline “Where Exactly Did The Russian Meteor Come From?”, there are other pressing questions in respect to Chelyabinsk asteroid of February 15, 2013, that demand answers. What are the chances of 2 major astrological events occurring on the same day? Where these 2 astrological events related to each other? In a February 19, 2013, CNN report entitled “A Meteor And Asteroid: 1 In 100 Million Odds”, the  notion that the two events were related was openly dismissed: “…the time between the two events, the Earth moved roughly 300,000 miles, meaning the asteroid and the meteor were in completely different places. So there is no way the meteor and the asteroid are connected. It has to be a coincidence that the two events happened on the same day….the chance of both events happening on any one day are indeed very small…about 1 in 100 million”. As luck would have it, the alleged manifestation of these two mathematically impossible asteroids just happened to coincide with hundreds of propaganda articles warning Earth of an impending asteroid strike.

Meteor Strike Illuminati Card Game

2.3: Doomsday Asteroid Programming
Hollywood movies blockbusters such asArmageddon” (1998) (see trailer) and “Deep Impact” (1998) (see trailer) were made with the sole purpose of psychologically preparing humanity for the notion that an asteroid could in fact strike Earth and that its aftermath would be apocalyptic in nature. Although there will likely be plenty of video footage of a Doomsday asteroid, comet or meteoroid striking Earth (people have to see it to believe it), the asteroid will quickly and conveniently disappear beneath the Pacific Ocean, never to be seen again. After all, a Doomsday asteroid will never strike land because there it can be located, examined and tested for its authenticity; that obviously cannot be allowed to happen. The notion of a man-made asteroid or meteor attack was ominously depicted in the “Meteor Strike” card of the Illuminati Card Game (1995). The game was created in order to program the conspiracy minded for upcoming events (e.g., 9/11) as well as to discount their man-made nature in the aftermath.

2.4: Asteroid Attack Propaganda
Prior to a high-profile man-made asteroid attack, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, space rock-related terror is now at an all-time high which suggests that a man-made asteroid attack is imminent.

Asteroid Propaganda Timeline:

1. April 17, 2014: Astronauts to reveal sobering data on asteroid impacts
2. April 19, 2014: Far More Asteroids Have Hit The Earth Than We Thought, Astronauts Say
3. April 20, 2014: Huge meteor explosion a “wake-up call” to Earth
4. April 21, 2014: Pat Robertson Says Doomsday Asteroid Could Hit Next Week
5. April 23, 2014: Group: Deadly asteroids more frequent than thought
6. April 23, 2014: Nuclear-scale asteroid blasts in atmosphere ’10 times more common’ than thought
7. April 23, 2014: Time-lapse video shows powerful asteroids strike Earth with surprising frequency
8. April 24, 2014: Risk of asteroid hitting Earth higher than thought
9. May 16, 2014: NASA’s Asteroid-Capture Mission May Test New Method to Defend Earth
10. May 27, 2014: Giant Asteroid Possibly on Collision Course with Earth
11. May 28, 2014: An Asteroid Is Not On A Collision Course With Earth, Despite CNN Report
12. October 2, 2014: US stores old nukes…to fight off asteroid threats
13. November 3, 2014: New asteroid discovered that may threaten Earth

[Does not purport to be a complete list of asteroid attack propaganda]

I. THE SPACEX PROGRAM:

2.1: SpaceX Program
Just as asteroid rhetoric and propaganda is reaching an all-time high, the mysterious space program entitled “SpaceX”  is working overtime. On May 25, 2012, SpaceX made history as the world’s first privately held company to send a spacecraft to the International Space Station (ISS). Curiously, almost everything SpaceX does, it does wrong, or at least that’s the way the alleged space transport company would like to be publicly perceived. Starting with its launch reported on October 8, 2012, SpaceX was allegedly sent into the wrong orbit because of a booster problem during launch. Four days later on October 12, 2012, the communications satellite flying piggyback aboard a SpaceX’s Falcon 9 rocket allegedly fell out of orbit and burned up in the atmosphere following another problem during liftoff. Five months later on March 1, 2013, it was reported that SpaceX, allegedly on route to the ISS, ran into thruster trouble shortly after liftoff and consequently missed its docking date with the ISS. These are rocket scientists, not armatures. A truly private company could never afford to do business in such an unprofessional manner further raising suspicions that there is more than meets the eye in respect to SpaceX. On March 21, 2013, it was reported that SpaceX’s “Dragon” supply spacecraft was set to leave the ISS and return to Earth while three new crew members are scheduled to arrive at the ISS shortly. Whatever is going on up there with SpaceX and the ISS is still unknown, but it is anything but kosher. Although only time will tell, it appears that SpaceX may be the private space program set-up to attack Earth with a man-made Doomsday asteroid.

2.2: Space X Grasshopper VTVL Rockets
The fuel cells needed for a man-made asteroid appear to be SpaceX’s Grasshopper VTVL Rockets which have been launched at least 5 times in 2013 in so-called tests. However, since SpaceX has a private launch site in McGregor, Texas, there is no way to confirm just how many Space X-related rockets have been launched into space. While most rockets are designed to burn up in the atmosphere during reentry, SpaceX’s Grasshopper rockets are designed to return intact to the launch pad for a vertical landing so it can be reused for future launches, possibly involving man-made asteroids.  According to SpaceX themselves, “Grasshopper … continues SpaceX’s work toward one of its key goals—developing fully and rapidly reusable rockets, a feat that will transform space exploration by radically reducing its cost”. Although the true mission of the Grasshopper program is not public, in the event that a massive man-made asteroid, comet, or meteoroid-like structure was being constructed in space just above the Earth, reusable fuel cells would be needed to project the given object back into the Earth’s atmosphere in a slow, fiery and believable fashion. The command and control exerted over the Grasshopper rockets is quite extraordinary as they can launch and land upright in the exact same fashion. As witnessed on August 14, 2013, when a SpaceX’s Grasshopper test rocket successfully flew sideways, the Grasshopper is essentially a massive remote-controlled rocket that can be directed any which way. This type of fluidity and control would definitely be needed in order to guide a fake Doomsday asteroid or comet across the sky and into the ocean in a manner which does not draw any suspicion by the billions watching around the world with baited breath. As witnessed on November 18, 2013, when NASA’s Atlas V rocket was loaded with 50,000 gallons of liquid oxygen and launched into space, the fuel within this rocket and that of the 10 or so rockets which have launched thus far in 2013 could be used to fuel the man-made Doomsday asteroid. One in space, the rocket fuel could theoretically be transferred and stored in a secondary location such as International Space Station (ISS) for future use. Once the Doomsday asteroid mission was given the official green light, the fuel could then be injected into the 50 or so Grasshopper-like rockets that will likely make up the Doomsday comet. Coincidentally, the Grasshopper VTVL vehicle uses many of the same rocket parts that SpaceX employs for its official spaceflight missions with NASA and the ISS, making the likelihood of collusion on a undercover project such as a man-made asteroid all the more feasible. In a telling sign that a “Deep Impact” strike in the Pacific Rim of Fire is upon us, the official video released by SpaceX of a Grasshopper launch was accompanied by Johnny Cash’s “Ring of Fire”.

2013 SpaceX Grasshopper Launches:

1. March 12, 2013: SpaceX ‘Grasshopper’ Reusable Rocket Breaks Record (McGregor, Texas)
2. April 23, 2013: SpaceX Showcases Grasshopper VTVL Rocket Test (McGregor, Texas)
3. July 9, 2013: SpaceX Grasshopper Reusable Rocket Soars to New Heights (McGregor, Texas)
4. August 14, 2013: SpaceX’s Grasshopper test rocket flies sideways successfully (McGregor, Texas)
5. October 14, 2013: SpaceX Reusable Grasshopper Rocket Climbs to 2,440 Feet (McGregor, Texas)

[Does not purport to be a complete list of launches]

2.3: Asteroid Exhaust
The easiest way to tell if an asteroid is fake is by looking at its vapor trail (or lack thereof) . Because real asteroids are driven by gravity, they has no exhaust or vapor trail. However, in order to program scientists for a fire breathing asteroid, it was reported on January 22, 2014, that the Ceres asteroid vents a water vapor, a laughable notion to be sure. This pseudo-science report was quickly followed by another on March 26, 2014, which stated that astronomers found the first asteroid with rings. Aside from the fact that these finding go against everything known about asteroids, they have been disseminated because a man-made asteroid attack will produce a noticeable exhaust trail. This is because a man-made asteroid is in essence many rockets which have been molded together to look like an asteroid.

2.4: Rocket Launches Trending
Including the aforementioned SpaceX rocket launches, there have been at least 51 other rockets which have taken places in various counties around the world. These launches have involved such entities as the European Space Agency, NASA, SpaceX and Orbital Sciences. What exactly is causing the space rush is not clear, but that fact that these rockets are being launched at an unprecedented rate suggests that there is a sinister plan in the works. If the following reports are to be believed, there are a total of 2 probes, 2 explorers and over 40 satellites which have left planet Earth since September 6, 2013. There have also been at least 6 trips to the alleged International Space Station (ISS) which suggests that the ISS may be the official cover for the black operation that is the man-made Doomsday asteroid.

2013-2014 Space Launches:

1. March 1, 2013: SpaceX Falcon 9 SpaceX CRS-2 Launches to ISS
2. June 14, 2013: SpaceX’s new Falcon 9 v.1.1 test mission launch
3. September 6, 2013: Orbital’s Minotaur V launches LADEE mission
4. September 29, 2013: SpaceX Launches Falcon 9 Rocket on Test Flight
5. November 5, 2013: India launches rocket with Mars satellite
6. November 18, 2013: NASA launches MAVEN on Atlas V rocket to Mars
7. November 20, 2013: Orbital launches 29 satellites into orbit for DOD
8. November 22, 2013:EAS launches 3 satellites to study magnetic field
9. November 25, 2013: Russian rocket transports satellite en route to space station
10. December 1, 2013: China’s Chang’e-3 rocket blasts off carrying moon probe
11. December 4, 2013: SpaceX Falcon 9 rocket lifts off with SES-8 satellite
12. December 6, 2013:
U.S. launches Atlas V on classified NROL-39 mission
13. December 27, 2013: SpaceX Falcon 9 rocket will light up Florida
14. December 27, 2013: Russia launches upgraded Soyuz rocket
15. January 6, 2014:
SpaceX Falcon 9 rocket launch successful
16. January 5, 2014: India has successful launch of cryogenic rocket
17. January 9, 2014: Orbital launches rocket to space station after solar scare
18. January 10, 2014: SpaceShip “Two” hits new heights during rocket test
20. January 24, 2014: NASA Launches Relay Satellite Into Orbit
21. February 6, 2014: Russian spaceship docks with International Space Station
22. March 25, 2014: Soyuz Rocket Launches US-Russian Crew toward Space Station
23. April 3, 2014: $518M military weather satellite launches after 15-year wait
24. April 5, 2014: Indian navigation satellite soars into orbit
25. April 14, 2014: SpaceX Falcon 9 rocket launch moved to April 14
26. March 25, 2014: Soyuz Rocket Launches New US-Russian Crew Toward Space Station
27. April 3, 2014: $518M military weather satellite launches after 15-year wait
28. April 5, 2014: Indian navigation satellite soars into orbit, step closer to own GPS-like system
29. April 10, 2014: Israel launches cutting-edge satellite to spy on MidEast adversaries
30. April 16, 2014: Weather 40% favorable for Friday’s SpaceX Falcon 9 launch
31. May 15, 2014: Proton-M rocket carrying Russia’s most advanced satellite crashes
32. May 17, 2014: United Launch Alliance rocket brings $245 million GPS satellite into orbit
33. May 22, 2014: ULA Atlas 5 Rocket Launches Classified Satellite Into Space Today!
34. May 28, 2014: French satellite Eutelsat 3B successfully launched from Russian sea platform
35. June 19, 2014: Russian-Ukrainian ‘Satan’ rocket blasts into orbit with 33-satellite load
36. June 25, 2014: NASA to Test Rocket Technologies During Wallops Launch
37. June 26, 2014: Satellite that measures carbon dioxide to launch July 1
38. June 30, 2014: NASA to launch global warming satellite after loss
39. July 2, 2014: Do-over satellite launch called success
40. July 2, 2014: Morning Wallops Launch Ends in a Crash
41. July 9, 2014: Russia test launches first newly designed ‘Angara’ space rocket
42. July 13, 2014: Space station shipment launched from Virginia
43. July 29, 2014: Delta IV rocket vaults off launch pad to orbit
44. August 2, 2014: Atlas V rocket vaults GPS satellite into orbit
45. September 6, 2014: AsiaSat 6 poised to launch atop Falcon 9 rocket this weekend
47. September 15, 2014: NASA ready to Launch ISS-RapidScat on Saturday, September 20th
48. September 24, 2014: India successfully sends ‘MOM’ to Mars
49. October 24, 2014: China’s first ‘moon & back’ mission blasts off
50. October 26, 2014: Spectacular rocket launch on Monday should be visible in NC
51. October 29, 2014: Antares rocket on ISS resupply mission explodes seconds after launch

[Does not purport to be a complete list of rocket launches]

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Basel, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

dwts-season-19-banner

Download & Forward PDF

David Chase Taylor
November 25, 2014
Truther.org

SWITZERLAND, Basel — On Tuesday, November 25, 2014, the finale of Season 19 of Dancing with the Stars will commence at CBS Television City in Hollywood, California. As previously reported by Truther.org back on October 6, 2014, it appears that the Obama administration is looking to execute a terror attack during the popular show.

Based on the current political climate in America, especially in respect to guns, the most likely the Season 19 of Dancing with the Stars terror scenario is a gun-related massacre which cuts down scores of celebrities and dancing fans in attendance. Grenades, IED’s or suicide bombers could also be employed as well.

The feds could also engineer a so-called “accident” or “natural disaster” during the finale of Season 19 of Dancing with the Stars (e.g., fire, gas explosion, melee, stampede, stage collapse, vehicular manslaughter, etc.) which would kill and terrorize thousands of fans in attendance.

Since “Dancing with the Stars” is being streamed online in real time, a gun-related massacre would be seen “live” by millions of viewers around the world. Needless to say, the horrific images of the dead and dying celebrities would be subsequently uploaded onto social media platforms (e.g., Facebook, Twitter, etc.) and replayed ad nauseam, effectively terrorizing the world for years to come.

In order to provide a motive for a gun-related attack in California, it was reported on September 30, 2014, that California Governor Jerry Brown signed a gun restriction bill which allows family members to ask a judge to remove firearms from a relative who appears to pose a threat. In the wake of the attack, a so-called anti-Obama gun owner upset with the new law will predictably be scapegoated.

The notion of reality TV-based terror was coincidentally witnessed back on September 28, 2014, when a bomb squad was called into LAX to investigate reality TV equipment. Needless to say, the CIA-spawned incident was staged in order to foreshadow the notion of a reality TV terror attack in the Los Angeles area.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Basel, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

Obama Assassination

Download & Forward PDF

David Chase Taylor
November 25, 2014
Truther.org

SWITZERLAND, Basel — On Tuesday, November 25, 2014, U.S. President Obama will give an immigration speech in his hometown of Chicago. His speech comes on the heels of a November 20, 2014, White House speech where he bypassed congress via an executive order, giving amnesty to millions of illegal immigrant children.

Therefore, during Obama’s immigration speech in Chicago, it is highly likely that members of the KKK, a state-sponsored terrorist organization, or other “racist” people or groups acting on behalf of the state will launch a wave of “race war” attacks against Mexican Americans, likely targeting Obama in the process.

In order to set the precedent for an attack on Obama in Las Vegas, it was reported on November 21, 2014, that Secret Service agents arrested a woman with a gun outside the White House on November 20, 2014, shortly after President Obama delivered his address to the nation on immigration.

Therefore, a copy-cat scenario in which “racist” anti-immigration persons or organizations take matters into their own hands in a case of vigilante justice is now expected. Exactly what type of attack is planned is not known, but will most likely be gun-related in nature.

An elaborate assassination “event” will do the same for Barack Obamas as it did for one Adolf Hitler. Back on July 20, 1944, Hitler was targeted in an unsuccessful bombing, resulting in 5,000 executions and 7,000 arrests. In the wake of an Obama assassination “event”, the attack will be used as an excuse to round up “disloyal” Americans in the U.S. government, bringing about the naked dictatorship of Obama.

Considering Obama’s poll numbers are at an all-time low, an assassination event would boost his popularity as well as the Democrats who suffered historic losses in November’s election. An attack could also be used to institute some form of martial law, possibly to find the alleged assassin, making every American gun owner a suspect.

The notion that Obama is vulnerable to an attack was recently witnessed on October 3, 2014, when it was revealed the Secret Service allowed a fake congressman to sneak backstage at Obama event in Washington, D.C. Needless to say, the event was staged in order to set the precedent for a similar event that will likely culminate with an attack on Obama’s person.

Obama Targeted
Prior to an attack on Obama, the public must be convinced through fabricated events that this is indeed possible. Consequently, a number of events regarding Obama have occurred in the last few weeks which have set the stage for an assassination “event”. For example, on October 15, 2014, an official from Missouri called for military coup against Obama. The timely and shocking statement was evidently made in order to foreshadow a military-related attack on Obama, possibly via a sniper. In what appears to be pre-Obama assassination terror conditioning, it was reported on October 23, 2014, that a man was stopped after scaling White House fence. Whether the man was planning to attack Obama is not known, but the event was likely staged in order to show that Obama is under threat. Three days later on October 26, 2014, it was reported that the man who drove his car into a Ten Commandments monument made statements about President Obama, included threats to kill him. The incident was likely staged as well in order to show that white American males want to kill Obama. Four days later on October 30, 2014, USA Today published a report entitled “Love Triangle Led to Obama Visit Threat, Feds Say”. The timely report was in respect to a Yonkers man who was plotting to kill President Obama during his August 2014 visit to Westchester County, New York. The incident was evidently rehashed in order to show that Obama is being targeted. In order to set the precedent for an attack on Obama’s person while in Las Vegas, it was reported on November 21, 2014, that Secret Service agents arrested a woman with a gun outside the White House Thursday night, November 20, 2014, shortly after President Obama delivered an address to the nation on immigration.

sddefault

Secret Service in Chaos
In what appears to be pre-Obama assassination programming, The Telegraph published a report on September 29, 2014, entitled “Is Barack Obama’s Life Safe in the Secret Service’s Hands?“. The ominous report was evidently designed to foreshadow that an attack on Obama’s person is imminent. With the resignation of Chief Julia Pierson, the director of the Secret Service, on October 1, 2014, the Secret Service has never looked more vulnerable to an attack. Pierson’s resignation came in the wake of several security breaches that were designed to set the precedent for an attack on the Obama White House. In what appears to be pre-Obama assassination terror programming, the Huffington Post published a report on October 1, 2014, entitled “Politico Piece Says Obama’s Assassination Might Be Only Thing That Could Improve Secret Service”. Two days later on October 3, 2014, it was reported that the Secret Service allowed a fake congressman to sneak backstage at Obama event in Washington, D.C., ultimately setting the precedent for a similar event in California. Roughly a week later on October 9, 2014, a former agent stated that the Secret Service is now in collapse. Needless to say, the aforementioned reports have made the U.S. Secret Service look weak, making the likelihood of an attack on President Obama all the more likely.

Obama Under Threat
Since 2007, there have been over 100 Obama assassination threats and plots in which individuals were either questioned, arrested, detained or convicted for making death threats against Obama. It appears that most if not all of these Obama-related assassination events were staged in order to give the impression that Obama is in tremendous danger, especially due to his race. Whether people like Obama or not, the staged or real assassination of Obama must be stopped at all costs. An assassination “event” of Obama would ultimately divide America between black and white, Democrat and Republican, and would inevitably cause riots, looting, violence, bloodshed and chaos across America.

FLASHBACK: White House Dinner Assassination Plot
Back on May 2, 2014, Truther.org issued a terror warning in respect to the 2014 White House Correspondences’ Association (WHCA) which took place on May 3, 2014. Interestingly, three days later on May 6, 2014, a car allegedly trailing President Obama daughters’ motorcade prompted a White House lockdown. What exactly a suspicious car had to do with the White House is not known, but evidently the subsequent lockdown provided the necessary cover needed so that weapons and/or explosives could be removed from the White House premises without drawing any suspicion.

FLASHBACK: MSNBC Assassination Plot
Back on December 4, 2013, Truther.org published a report entitled, “Live TV Obama Assassination “Event” Planned for December 5, 2013 on MSNBC?” in respect to a possible “live” Obama terror event planned for American University (AU). Two weeks later on December 16, 2013, it was reported that American University went into lockdown after an alleged gunman was reported on campus. Predictably, the gunman turned out to be an off-duty police officer but that fact wasn’t reported until the entire AU campus was locked down for 2 full hours. The gunman at American University was evidently staged in order to create a major diversion on campus so that intelligence agencies (i.e., the ATF, FBI, CIA, etc.) could dispose of any incriminating evidence (i.e., weapons and/or explosives) planted on campus in preparation for the planned attacks. In order to remove said incriminating evidence without drawing any suspicion from students and staff, a mini-false-flag was executed in order to provide the necessary cover needed to clean-up the now foiled false-flag. In other words, since the terror plots were exposed, a second operation had to be executed under the cover of an emergency in order to tie up loose ends.

FLASHBACK: Smithsonian Assassination Plot
Back on November 20, 2013, Truther.org published a report entitled, “Obama Assassination “Event” May Be Planned for JFK Legacy Dinner at the Smithsonian’s National Museum of American History”. Coincidentally, three days later on November 23, 2013, it was confirmed that an unidentified man fell to his death from the fourth floor railing at the Smithsonian National Museum of the American Indian in Washington, D.C. Whether or not this man was involved in an Obama assassination “event” is not known, but his death is highly suspicious and has all the earmarks of a foiled state-sponsored terror attack.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Basel, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

race-war

Download & Forward PDF

David Chase Taylor
November 24, 2014
Truther.org

SWITZERLAND, Basel — According to breaking news, the grand jury will reportedly make a decision on November 24, 2014, in the case of Michael Brown, the unarmed black teenager who was allegedly executed by a white St. Louis, Missouri police officer.

As previously reported by Truther.org, the Obama admiration (at the behest of the CIA) is planning to stage race riots and “race war” attacks in the aftermath of the grand jury decision. The attacks will likely transpire in Ferguson, Missouri, as well as in other predominantly African-American cities such as Atlanta, Georgia, and Los Angeles, California.

Regardless of the decision rendered by the Ferguson grand jury, someone or some group will allegedly take matters into their own hands in a case of vigilante justice. A future terror scenario in which racist “white” people attack African-American protests or celebrations (which are expected nationwide in the aftermath of the grand jury decision) is expected.

In what appears to be a publicity stunt designed to invoke gun-related violence just prior to a series of gun-related terror attacks in the wake of the grand jury decision, it was reported on November 23, 2014, that a woman who bought a gun for Ferguson-related violence was killed by her own gun.

Five days prior on November 18, 2014, it was reported that police and protesters are arguing over the “rules of engagement” in respect to the grand jury decision. The “rules of engagement” is a military term whose use suggests that deadly violence is planned for the Missouri town.

Also on November 18, 2014, it was reported that watchdog groups are warning that Muslim groups are seeking to co-opt Ferguson protests. Therefore, it’s possible, although unlikely, that the feds could stage a wave of Islamic terror attacks in Ferguson, possibly featuring suicide bombings.

It was also reported on November 18, 2014, that a panel of 16 people have been “empowered” to study the Ferguson “fallout” . The fact that the group has been formed suggests that violence is indeed planned, hence the use of the term “fallout”.

Also on November 18, 2014, it was reported that the FBI has warned that the Ferguson grand jury decision “will likely” lead to violence. Translation: the FBI is planning to provocateur riots and race war attacks in the aftermath of the grand jury decision, possibly in Ferguson and Los Angeles, home of the Rodney King riots.

A day prior on November 17, 2014, Missouri Governor Jay Nixon issued a state of emergency ahead of Ferguson grand jury decision. The premature state of emergency was designed to give government officials plausible deniability in the wake of violence, a definite red flag that state-sponsored terror attacks are indeed planned.

This particular notion was confirmed 48-hours prior on November 15, 2014, when it was reported that police nationwide are bracing for protests after grand jury decision. According to reports, police departments from Boston to Los Angeles are bracing for large demonstrations when the grand jury decides whether to indict a white police officer for the murder of Brown.

In order to bring global attention to grand jury decision just prior to a wave historic “race war” terror attacks, Michael Brown’s parents address U.N. in Geneva, Switzerland on November 12, 2014, where they reportedly stated, “We need the world to know”.

A day prior on November 11, 2014, STRATFOR intelligence operative Alex Jones of Inforwars published a report entitled “Ferguson Residents Arm Themselves”. The report was in respect to the impending grand jury decision, ultimately foreshadowing gun-related violence.

In order to racially hype the impending Ferguson grand jury decision, it was reported on November 10, 2014, that a Texas teacher will be fired over a racially-charged tweet on the Ferguson. The unprovoked verbal attack on “whites” was designed to serve as a timely motive for a revenge-like attack, possibly by white Texans.

KKK-Ku-Klux-Klan

KKK Attack

Exactly what type of race riots and “race war” attacks are planned is not known, but it’s highly likely that the state-sponsored terror group known as the Ku Klux Klan (KKK) will be involved. In a publicity stunt designed to bring unprecedented media attention to the KKK just prior to a wave of “race war” attacks, it was reported on November 12, 2014, that Blacks, Hispanics, Gays and Jews are now welcomed by Ku Klux Klan. Five days later on November 17, 2014, Anonymous reportedly publishes the names of Ferguson’s KKK members. A day later on November 18, 2014, the KKK was allegedly hit by cyber-attacks after issuing Ferguson threats. The notion of Anonymous attacking the KKK is comparable to the White House attacking the Pentagon, a laughable notion to sure. Nevertheless, the KKK hype surrounding Ferguson is being propagated by the media just prior to a wave of KKK-related attacks in the wake of the Ferguson grand jury decision.

FLASHBACK: Michael Brown Execution
The racial tension in Ferguson was originally in respect to the Michael Brown execution which was designed to spark a “race war” in Missouri. However, due to the August 14 2014, Truther.org report entitled “Obama Plotting Gun-Related “Race War” Massacre in Ferguson, Missouri”, and the August 22, 2014, Truther.org report entitled “Obama Plotting “Race War” Attack at Michael Brown Funeral and Protests”, the feds have thus far been unable to stage an attack. However, on October 8, 2014, a second black male was executed by an off-duty Missouri police officer, resulting in massive protests. The unarmed teenager was allegedly shot 17 times, a clear case of over-kill. The assassination was designed to enrage the Africans-American population once again, just prior to a state-sponsored “race war” attack in Ferguson.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Basel, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

Neuron-Syndicate

Download & Forward PDF

David Chase Taylor
November 24, 2014
Truther.org

SWITZERLAND, Basel — Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA) is looking to execute a wave of cyber-related terror attacks in the United States surrounding the official and unofficial holidays of Thanksgiving, Black Friday, and Cyber Monday.

Potential cyber-targets include but are not limited to: the NSA Data Center Utah in Bluffdale, Utah; the U.S. power grid; U.S. nuclear reactors; U.S. oil and gas facilities; U.S. airports and train stations; the International Space Station (ISS); national retailers (Target, Wal-Mart, etc.), Google Inc. (California); and the Hoover Dam in Clark County, Nevada.

In what appears to be pre-holiday cyber-terror programming, it was reported on November 20, 2014, that hackers accessed 500 webcams in the UK and thousands worldwide. Less than a day later on November 21, 2014, hundreds of web cams within the Tri-State Area were hacked. The latter incident was evidently staged in order to show that U.S. government computer networks are vulnerable to attack.

That same day, November 21, 2014, America’s Admiral Michael Rogers, director of the National Security Agency and commander of the U.S. Cyber Command, stated that adversaries of the U.S. conduct regular electronic reconnaissance to reveal weaknesses in America’s industrial control systems, ranging from power plants to sewage facilities

Two days later on November 23, 2014., CNN published a report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus.

“Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks?

In other words, the entire internet infrastructure has been hijacked by the Regin malware and therefore any type of cyber-related attack on America’s infrastructure is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

Although a wave of unprecedented cyber-terror attacks could be scapegoated onto China, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack. This will essentially make anyone with a computer a potential suspect.

State-Sponsored Cyber-Terror Targets:

1. NSA Data Center Utah (Bluffdale, Utah)
2. U.S. Power Grid
3. Nuclear Reactors (U.S.)
4. Oil & Gas Facilities (U.S.)
5. Mass Transit (U.S. Airports, Bus and Train Stations)
6. International Space Station (ISS)
7. National Retailers (U.S.)
8. Google Inc. (California)
9. Hoover Dam (Clark County, Nevada)

[Does not purport to be a complete list of cyber-related targets]

APTOPIX-NSA-Phone-Rec_Horo

Cyber Doomsday
The notion of a Cybergeddon has been promulgated in the media since 2012 via numerous propaganda articles which have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, and “Threat Of ‘Spectacular’ Cyberattack Looms”, all indicate that unprecedented state-sponsored cyber-terror with the United States is imminent.

Cyber-Attack Warning

In a 2007 CRS Report for Congress entitled “Terrorist Capabilities For Cyber-Attack: Overview And Policy Issues”, the U.S. government states that, “If terrorists were to launch a widespread cyberattack against the United States, the economy would be the intended target for disruption” and that “Many security experts also agree that a cyber-attack would be most effective if it were used to amplify a conventional bombing or CBRN (chemical, biological, radiological or nuclear attack). Authorities have expressed concerns about terrorists combining physical attacks such as bombings with hacker attacks to disrupt rescue efforts, known as hybrid or “swarming” attacks”. Therefore, cyber-attack will likely be executed along with real-world attacks.

Teenage Cyber-Attack
If and when Cybergeddon occurs, a teenager affiliated with “Anonymous” will likely be scapegoated. However, prior to this occurring, the public must first be psychologically programed to accept that this is in fact possible. Starting in September of 2013, there has been an unprecedented amount of news and events in respect to teenagers which has been subconsciously programming the masses for teen-related cyber-attack. A preview of this type of pasty programming was reported on September 26, 2013, when England arrested a 16-year old boy for a distributed-denial-of-service (DDoS) attack which was touted as ““biggest cyber-attack in the history of the internet.” Roughly a month later on October 27, 2013, a 12-year old Canadian boy plead guilty to hacking government websites and giving the information to Anonymous. A major teenage cyber-terror attack effectively turn every kid with a computer into a suspected terrorist and would undoubtedly usher in draconian internet regulation—most likely starting with the RFID micro-chip which will be used to identify internet users.

1. NSA DATA CENTER ATTACK:

ap132411996867

1.1: Utah Data Center Cyber-Attack
In order to create a formidable target prior to an “Anonymous”-related cyber-terror attack, the NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center“, was completed in September of 2013. The $1.5B data center is located at Camp Williams, Utah, just 25 miles (40 km) south of Salt Lake City. In order to bring unprecedented media attention to the Utah Data Center just prior to a major cyber-terror attack on it, it was reported on November 14, 2014, that Utah Considers cutting off water to the NSA’s Utah Data Center. The timely report was designed to show that the NSA center is a target as well as foreshadow that fact that U.S. utilities are about to be cut off.

2. POWER GRID ATTACK:

20130605_EMP_attack_large

2. 1: Power Grid Cyber-Attack
If and when a major state-sponsored cyber-terror attack targets the U.S. power grid, it will most likely involve a lengthy blackout that may never be restored. Back on April 26, 2013, it was revealed that former CIA Director stated that the U.S. electrical grid is vulnerable to attack. Roughly 6 months later on October 17, 2013, it was reported that U.S. utilities are a “soft underbelly” for hackers. Most recently, on November 20, 2014, it was reported that the U.S. government thinks that China could take down the power grid. That same day, November 20, 2014, the NSA admitted that China and other unnamed entitled can cripple US power grid. Three days later on November 23, 2014, “Business Insider” published a report entitled “Here’s What Chinese Hackers Can Actually Do To The US Power Grid”. Although China could be scapegoated in a high-profile cyber-terror attack, Anonymous is the most likely culprit.

2.2: Cyber-Terror Drill: “GridEx II”
In apparent preparation for a massive cyber-terror attack targeting the U.S. power grid, on August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “…Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”

3. NUCLEAR REACTOR ATTACK:

3.1: Nuclear Reactor Cyber-Attack
Back on December 13, 2011, it was reported that U.S. officials were investigating whether Iranian and Venezuelan diplomats in Mexico were involved in planned cyber-attacks against U.S. targets, including nuclear power plants. Needless to say, the report confirms that a cyber-attack on U.S. nuclear facilities is indeed planned. Aside from blatant programming of the 2012 Hollywood nuclear reactor disaster film entitled “Chernobyl Diaries”, a recent Nuclear Regulatory Commission (NRC) panel recommended that the U.S. government customize emergency plans for each of America’s 65 nuclear power plants, a change that would “expand” the standard 10-mile evacuation zone around U.S. nuclear reactors. In what appears to be pre-nuclear reactor attack logistics, it was revealed on July 11, 2014, via the headline “Response to ‘Attack’ on Nuclear Reactor Is Praised” that the U.S. government is holding terror drills on nuclear reactors. According to the report, “Other mock attacks have been conducted at a handful of the nation’s 62 nuclear power plants”. Evidently, the U.S. federal government is perfecting their nuclear terror attack scenarios. When and where they will strike is not known, but practice makes perfect. Roughly a month later on August 20, 2014, it was revealed that hackers attacked Nuclear Regulatory Commission 3 times in 3 years, a report designed to show that cyber-terrorists are actively targeting nuclear reactors. Most recently, on November 21, 2014, it was reported that a radioactive leak occurred at a Scottish nuclear plant. Whether the alleged leak caused by a cyber-terror attack is not known, but it will likely be stated as such after a high-profile nuclear reactor cyber-terror attack.

3.2: Target: California Nuclear Plants
California has two main nuclear reactors on its coastline: The Diablo Canyon Power Plant in San Luis Obispo County, and the San Onofre Nuclear Generating Station in San Diego County. Should a state—sponsored cyber-terror attack be executed, both nuclear reactors may be targeted. The notion that these plants ae slated for disaster was revealed back on June 19, 2012, it was reported that “San Onofre nuclear plant could become California’s Fukushima”. To date, there have several highly suspicious incidents surrounding the nuclear plant including a radiation leak on February 1, 2012, a radioactive gas escape on April 7, 2012,a hydrogen leak on October 23, 2012, and a 700,000-pound steam generator which was allegedly removed on November 5, 2012. Back on September 9, 2011, there was a massive power outage in San Diego whereby 1.4 million people lost electricity, exactly the same amount of people which lost electricity on February 1, 2012, when the San Onofre plant was shut down. Whether or not the blackout was a beta-test of the eventual San Onofre nuclear cyber-attack is not known, but San Onofre appears fully prepared to go offline.

4. OIL & GAS ATTACK:

4.1: Oil & Gas Terror Cyber-Attack
Aside from the 6 terror attacks on oil and gas pipelines internationally, there have been 3 oil and gas pipeline terror cases within the U.S. since 9/11. Needless to say, a cyber-related terror attack would predictably cause an ecological disaster. The notion that terrorists are targeting oil and gas facilities in America was witnessed back on September 29, 2004, when it was reported that two New Caney, Douglas Lloyd Crosby and Dennis Wade Durrenberger Jr., were arrested and charged with criminal mischief, a first degree felony, in connection with a pipeline explosion that caused many to be evacuated from their New Caney homes. Three years later on June 2, 2007, it was reported that four would-be terrorists had hatched a plot to blow up Kennedy Airport and swaths of Queens by attacking fuel tanks and an underground pipeline by igniting a catastrophic explosion that would eclipse 9/11. According to the report, one of the suspects boasted to a federal informant that “he had a vision that would make the World Trade Center attack seem small“. Roughly six weeks later on July 13, 2007, it was reported that a Pennsylvania man, Michael C. Reynolds, was convicted of providing material support to terrorists in trying to help al-Qaida blow up U.S. oil pipelines and refineries.

4.2: TSA Pipeline Threat Assessment (2008)
An October 23, 2008, report from the Transportation Security Administration Office of Intelligence and the U.S. Department of Homeland Security entitled “TSA Pipeline Threat Assessment” stated that “Improvised explosive devices have been the preferred method of attack against gas and oil facilities worldwide” and that “the U.S. system and its related infrastructure remain an attractive target to both terrorists and domestic extremists alike, as long stretches of open unattended pipeline are difficult to protect and the economic impact of attacks would be significant…Al-Qa’ida, in particular, has noted the potentially damaging impact pipeline attacks—both in the United States and abroad—would have on the Homeland’s economy, national security, and public health and psychology. Al-Qa’ida’s demonstrated capability and intent to target oil and gas infrastructure overseas, and the group’s desire to continue attacks in the Homeland, suggest similar attacks could occur inside the United States.

4.3: TSA Liquid and Natural Gas Pipeline Threat Assessment (2011)
A January 18, 2011, report from the TSA Office of Intelligence Pipeline Modal Threat Assessment and the U.S. Department of Homeland Security entitled “TSA Liquid and Natural Gas Pipeline Threat Assessment 2011” stated that “There were 44 suspicious pipelines, and related oil and natural gas SARs reported to TSA-OI from January 2010 to October 2010.21 Suspicious activities near pipelines and related infrastructure may indicate an interest to collect information for a future attack, or the desire to identify vulnerabilities or test a pipeline facility’s security and response operations”. The report further states that “Terrorist groups have discussed attacks on unspecified SCADA systems, but it is uncertain whether al-Qa’ida or any other group has the capability to conduct a successful cyber-attack.19 TSA-OI is not aware of any credible, specific threat reporting targeting U.S. pipelines’ industry control systems or the supervisory control and data acquisition networks.

5. U.S: MASS TRANSIT ATTACK
:

can

5.1: Mass Transit Cyber-Attack
Since Thanksgiving weekend is the busiest travel time of the year, U.S. airports, bus stations and train station terminals will be packed with people, a very lucrative state-sponsored terror target. The notion of airport-related cyber terror was witnessed back on November 9, 2012, when 17 flights were diverted from Manila’s international airport due to an alleged air traffic equipment “glitch”. What role these 64 planes were slated to play in the wake of a cyber-terror attack is unknown, but they were likely remotely “programmed” to lose all power at a future date. Since the TSA has now expanded their duties beyond airport security to train terminals, there is even a greater chance that Amtrak trains will be targeted by the Obama administration in the near future. Back on December 29, 2011, it was reported that Professor Stefan Katzenbeisser of Technische Universität Darmstadt had told a security conference in Berlin that new train systems are vulnerable to hackers and “Denial of Service”. Future cyber-terror attacks could rhetorically target train switching systems, which enable trains to be guided from one track to another at a railway junction. Although these switching systems have historically been separate from the online world, this is no longer the case.  The Israeli cyber-terror worm entitled the “Duqu virus”, has already wreaked havoc worldwide and could be used to target trains in the U.S. and Europe. Based on recent and inexplicable train crashes, this virus may already be attacking trains worldwide. Acting as a Trojan horse, the Duqu virus has the ability to essentially hijack its victim and then allow for the remote control of whatever entity is hijacked. If the Duqu virus hijacked a train, it could theoretically control train acceleration, braking and track switching.

6. SPACE STATION ATTACK:

6.1: Space Station Cyber-Attack
Back on March 1, 2012, it was reported that the laptop which was stolen from NASA last year was unencrypted and contained command and control codes for the International Space Station (ISS) on it. The laptop in question was one of 48 NASA notebooks or mobile devices stolen between April 2009 and April 2011. Needless to say, one or more of these stolen laptops could be used to crash the ISS. In an ominous sign that space-related cyber-terror is imminent, it was reported on November 12, 2013, that the Israeli made Stuxnet virus has now infected the ISS. In order to bring unprecedented media attention to ISS just prior to an attack, it was reported on November 12, 2014, that the International Space Station allegedly dodged Chinese space junk, a laughable notion to be sure. Nevertheless, roughly 2-weeks later on November 24, 2014, it was reported that a new crew arrived at International Space Station. In the event that the ISS is hacked, it will predictably fall from orbit onto a major city, most likely within the United States.

7. RETAIL CYBER-ATTACK:

960-fccb3cdc9acc14a6e70a12f74560c026-cyber-hacking-is-your-money-safe

7.1: Retail Cyber-Attack
Based on the 2013 Back Friday Attack, an attack on Black Friday in 2014 is all but expected. In yet another example of how state-sponsored terror drills always precede real-life terror events, back on November 27, 2013, Truther.org published a report entitled, “Black Friday-Cyber Monday 2013 (SSTTA): NATO Executing “Largest Ever” Cyber-Terror Drill on Black Friday—Attack Imminent”. As revealed in the report, NATO was executing their largest cyber-terror drill ever and therefore the likelihood of state-sponsored cyber terror was extremely high. Predictably, it was later revealed that a major cyber-attack did in fact take place on “Black Friday” and that up to 40 million Target shoppers had their credit card information compromised. According to Brian Krebs, a journalist who specializes in computer security, the Target computer breach occurred on or around Black Friday, the busiest shopping day of the year. Needless to say, another attack on U.S. retailers this Black Friday is expected.

8. GOOGLE CYBER-ATTACK:

8.1: Google Cyber-Attack
Back on June 26, 2014, Truther.org published a report entitled “CIA Likely Planning “Anonymous” Cyber-Terror Attacks on June 27-28, 2014” which listed Google’s corporate headquarters (i.e., Googleplex) in Mountain View, California as one of three primary targets. Low and behold, less than 24-hours later on June 27, 2014, it was reported that 4 people were found dead in Turlock, California home, less than 100 miles away from Googleplex in Mountain View. Evidently, once the cyber-terror attack was exposed, the would-be terrorists (i.e., Special Forces, Blackwater, Mossad, etc.) where subsequently executed.

8.2: Moffett Airfield Attack
Back on November 11, 2014, it was reported that Google has now taken control of Moffett Airfield in California from NASA. Therefore, an explosive attack on Google computer equipment inside the airport buildings may be used to sell the notion of a real-life cyber-attack. In other words, if and when a cyber-terror attack is executed, Google’s real-world facilities will suffer a real-world attack, selling the notion that a real cyber-attack was executed. This particular angle was attempted once before with the Google barges. In order to sell the notion of a Google attack to the public, Google previously placed “secret” barges off the shore of the U.S. in at least 4 locations (e.g., San Francisco, California; Portland, Maine; New London, Connecticut; and a second barge in San Francisco, California). In order to bring unprecedented attention to the Google Barges prior to their slated during a cyber-terror attack, the U.S. Coast Guard reportedly visited the two San Francisco Google Barges on November 2, 2013. In order to answer the question posed by the Boston Globe as to why Google went to sea, the simple answer is that it’s all part of an elaborate state-sponsored cyber-terror plot. Although the Google Barges were never attacked, their sheer existence confirmed that Google is indeed a target.

9. HOOVER DAM CYBER-ATTACK:

9.1: Hoover Dam Attack
The Hoover Dam is a concrete arch-gravity dam in the Black Canyon of the Colorado River, on the border between the U.S. states of Arizona and Nevada. Back on January 15, 2013, it was reported that the federal Occupational Safety and Health Administration (OSHA) had found 58 violations at Nevada’s Hoover Dam, the hydroelectric power plant east of Las Vegas. According to the report, OSHA found numerous superficial violations but stated that “none of the violations jeopardized the safety of the public or threatened the structural integrity of the dam or its operations”. Therefore, if and when the 79-year old year Hoover Dam is hit by a state-sponsored cyber-attack, it will likely “crack” (with a little help from demolition explosives) resulting in a massive local tidal wave and an electrical power blackout blanketing California, Arizona and Nevada. With no power, no airport, no gambling, no air conditioning, no sewage system and no way out, tourists and locals alike would begin looting as riots and mayhem would breakout almost instantaneously.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Basel, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss