Chinese “Kamikaze” Drone Attack On Pearl Harbor Hawaii Imminent

Posted: March 31, 2013 in China, Cyber-Terror, EMP Terror, SKYNET Terror
Chinese Drone Attack

Download & Forward PDF

David Chase Taylor
March 31, 2013

Based on recent news and events, it is highly likely that China will launch a “surprise” attack against the United States. For those who think a Chinese attack on the U.S. is laughable, consider the following: On September 30, 2012, it was reported that the White House was attacked by hackers allegedly linked to China’s government.

This unprecedented cyber-terror attack targeted the U.S. government’s most sensitive computer networks, ultimately breaching a system used by the White House Military Office for nuclear commands. The Chinese sneak attack is slated to be eerily reminiscent of the December 7, 1941, Japanese attack on Pearl Harbor, and will undoubtedly be the spark which ignites the World War III scenario between the U.S. and China.

Download & Forward PDF

This multifaceted attack will most likely involve a cyber-attack against U.S. financial interests (stock markets and banks), and an EMP attack targeting U.S. military radar and satellites ultimately leaving the U.S. electronically blind to a Chinese stealth drone attack on U.S. military bases in the Pacific, namely Pearl Harbor in Hawaii, the home state of U.S. President Obama. This sneak attack was first exposed in the November 31, 2012, report entitled “Red Dawn Scenario: Chinese Attack On America Imminent”. Since this watershed report was released, there have been countless accusations by the U.S. against China in respect to cyber espionage and cyber-attacks allegedly stemming from the Chinese military. To add more fuel to the fire, it was reported on March 21, 2013, that China had conducted a massive cyber-terror attack on South Korea, a close U.S. ally in the region.

Since June of 2012, numerous propaganda articles have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, “Threat Of ‘Spectacular’ Cyberattack Looms” and “U.S. Homeland Chief: Cyber 9/11 Could Happen “Imminently“, all indicate that an unprecedented act of state-sponsored cyber-terror upon the United States is imminent.


1. Chinese Drone Attack
2. Chinese Cyber-Terror Attack
3. Chinese EMP Attack
4. World War III Scenario: U.S. Versus China  

1. Chinese Drone Attack:

1.1: Surprise “Aerial Attack” Propaganda Films

Prior to a high-profile aerial attack on the Pacific Coast of the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are taken by surprise and viciously attacked. If and when this terror programming will manifest in reality is unknown, but it is definitely in the terror cards.

1.2: China’s Cyber/Drone Attack
On March 13, 2013, it was reported that China is building one of the world’s largest drone fleets aimed at attacking the United States in the event of a war. According to the report, “The Chinese military envisions its drone swarms scouting out battlefields, guiding missile strikes and overwhelming opponents through sheer numbers. China’s military-industrial complex has developed homegrown drones to accomplish these goals, according to the report released on March 11, 2013, by the Project 2049 Institute. “The PLA now fields one of the world’s most expansive UAV [unmanned aerial vehicle] fleets,” said Ian Easton and L.C. Russell Hsiao, researchers at the Project 2049 Institute and authors of the new report. The Project 2049 Institute report warned that China could consider “plausibly deniable” drone attacks blamed upon mechanical failure or cyberhackers. The drones could act as decoys, use electronic warfare to jam communications and radar, guide missile strikes on carriers, fire missiles at U.S. Navy ships or dive into ships like kamikaze robots.

1.3: China’s “Stealth” Drones
The report by Project 2049 goes on to state that China is developing drones such as the rumored “Dark Sword” stealth drone that have low radar profiles to escape radar detection and that Chinese engineers have even begun working on drones that have the software brains to fly in formation, do aerial refueling and takeoff and land autonomously. The report goes on to cautions the U.S. military to prepare for the worst-case scenario by hardening its existing air bases in Asia.

1.4: South Korea Developing “Kamikaze” Attack Drones
China is not alone in its quest for kamikaze drones. October 9, 2012, it was reported that a suicide drone capable of striking North Korea is under development in South Korea. According to the report, the “Devil Killer” can reach speeds of approximately 250 mph, carry an explosive payload, automatically identify targets, as well as undertake an automatic strike or a manually executed one. The Devil Killer can theoretically strike a target 25 miles away in about 10 minutes and is expected to be deployed by 2015. This development is an obvious threat and provocation to North Korea and will likely be cited as one of the main justifications for a future North Korean biological and/or chemical attack on South Korea.

1.5: North Korea’s “American-Made” Drones
North Korea is also attempting to secure “kamikaze” like drones. On February 6, 2012, it was reported that North Korea, by way of Syria, had purchased numerous high-speed American-made target drones with the intent of developing new drones based off the technology. According to the report, North Korea has already conducted numerous tests on high-speed drones mounted with high explosives and that the “North appears likely to deploy [the drones] near the inter-Korean border to target South Korean troops stationed on border islands in the Yellow Sea”.

1.6: Chinese Attack on Hawaii?

On November 5, 2012, it was reported in an article entitled “Red Flag Over The Atlantic: China Is Angling To Take Over A U.S. Airbase In The Azores” that “Chinese planes could patrol the northern and central portions of the Atlantic and thereby cut air and sea traffic between the U.S. and Europe” and that “China could target the American homeland…Lajes is less than 2,300 miles from New York, shorter than the distance between Pearl Harbor and Los Angeles”. While the aforementioned scenario is laughable and an obvious decoy, Pearl Harbor in the U.S. state of Hawaii is the most likely target. After all, history has a tendency to repeat itself.

1.7: A New Pearl Harbor
Based on recent military drills and maneuvers, an attack by China on the U.S. island of Hawaii (President Obama home state) is highly likely. A new Pearl Harbor would destroy a key U.S. foothold in the Pacific as well as remind Americans of when the Japanese attacked Pearl Harbor on December 7, 1941. In order to pull this sneak attack off, the Chinese would have to blind America electronically with an EMP/cyber-attack prior to any aerial drone attack. On August 13, 2012, it was reported that China had launched the “Bahai Sea Green Pearl”, a 36,000-ton ferry and cruise  ship commissioned in August of 2012 at Yantai Port in China’s northeastern Shandong Province. The ship is intended to ferry cars and passengers across the Yellow Sea, but when needed by the People’s Liberation Army, the “Green Pearl” can double as a troop carrier. Visually, the “Green Pearl” looks just like any other civilian cruise ship and could easily be used to secretly transport Chinese troops to Hawaii or the U.S. mainland in a surprise attack. Two months later on October 15, 2012, it was reported that one of China’s seven military command groups had held a joint military drill involving infantry, artillery and air forces to improve the ability of paratroops to land on and capture an island.

2. Chinese Cyber-Terror Attack:

2.1: China & Cyber Terror
The nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. Based on recent news and events, China, more than any other nation, is sure to be scapegoated in the aftermath of a cataclysmic cyber-terror attack against the United States. On October 5, 2011, U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two U.S. satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyber espionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta recently stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to clamp down on aggressive Chinese cyber-attacks against American companies and the U.S. government.  On October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.

2.2: Cyber Terror Target: U.S. Economy
Since 2010, there has been literally hundreds of cyber-attacks, a good many of them against the U.S. financial sector. In a 2007 CRS Report for Congress entitled “Terrorist Capabilities For Cyber-Attack: Overview And Policy Issues”, the U.S. government states that, “If terrorists [China] were to launch a widespread cyberattack against the United States, the economy would be the intended target for disruption” and that “…many security experts also agree that a cyber-attack would be most effective if it were used to amplify a conventional bombing or CBRN (chemical, biological, radiological or nuclear attack)”. Authorities have also expressed concerns about terrorists combining physical attacks such as bombings with hacker attacks to disrupt rescue efforts, known as hybrid or “swarming” attacks.

2.3: Financial Cyber Terror Blinking Red
Based on unprecedented financial cyber-terror propaganda and the recent rash of suspects and patsies arrested for financial cyber-terror related crimes, financial cyber-terror is blinking red on every level. On April 24, 2012, it was reported that Osama bin Laden was looking for a follow-up terror attack to doom the American economy, so a cyber-terror attack targeting U.S. banks and Wall Street hijacking trillions of dollars and dooming the American economy is definitely in the cards. To date, individuals have been arrested for numerous cyber-terror related crimes such as credit and debit card PIN theft, theft of proprietary software code from the Federal Reserve Bank of New York, illegal reproduction and distribution of more than 100 copyrighted commercial and financial business software programs, malware SpyEye used to steal and use personal banking and credit card data from unsuspecting victims’ online accounts, and the former head of fraud and security for digital banking at Lloyds Bank admitted to committing £2.5 million fraud. In other words, everything needed to commit the greatest bank heist ever is conveniently in place. Coincidentally, governments around the world have been executing financial cyber-terror drills in which hackers hijack trillions of dollars with no trace.

2.4: The Chase Bank “$0.00” Balance Beta-Test
On March 18, 2013, it was reported that millions of Chase Bank customers across the U.S. who use online and mobile banking saw their checking and savings accounts with a zero balance. Although this unprecedented electronic banking event was chalked up to being an “internal glitch”, it was most likely a beta-test to gage the American public’s reaction to a future cyber terror attack in which they are suddenly faced with the reality of losing their entire life’s saving. The beta-test was then used as a psychological marker of things to come as media operatives worldwide collectively prepped their respective audiences for an upcoming financial related cyber-heist that will most likely be blamed on China. “We have a technology problem regarding customers’ balance information,” Chase said in a statement. “It has nothing to do with cyber threats. It is an internal issue. We are very sorry to our customers for the inconvenience…It is not confined to the West Coast.”

3. Chinese EMP Terror Attack:

3.1: Chinese EMP Terror Attack
If the EMP terror propaganda is to be believed, a single Chinese EMP could destroy America, ultimately causing a nightmare worse than 9/11 and would result in an America with no power, no food, no transportation, no banking and no internet. Based on the recent news and events, it is highly likely that the Chinese EMP attack will target U.S. military radar and satellite installations in the Pacific, ultimately leaving the U.S. electronically blind to a Chinese aerial attack.

3.2: China’s EMP Quest

In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it is stated that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Adm. Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If U.S. propaganda is to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

3.3: Chinese “Mystery Missile” EMP Attack?
On November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. The U.S. government denied that they were responsible for the missile, but a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. or Chinese military attacked the “Carnival Splendor” with an EMP missile and the U.S. sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. fired EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

4. The World War III Scenario:

4.1: United Stated Versus China  
Inflammatory war propaganda, rising diplomatic tensions between the U.S. and China along with unprecedented U.S. propaganda against China indicates that World War III scenario between the United States and China is on the horizon. On June 4, 2012, it was reported that the Australian government’s Defense White Paper published in 2009 contained a “secret chapter” that assessed “Australia’s ability to fight an air-sea battle alongside the United States against China”. A few weeks later on June 27, 2012, Chinese general Peng stated that a future conflict with the United States is coming as a result of U.S. “containment” policy. Peng was then quoted as saying: “The United States has been exhausting all its resources to establish a strategic containment system specifically targeting China” and that “The contradictions between China and the United States are structural, not to be changed by any individual, whether it is G.H.W. Bush, G.W. Bush or Barack Obama, it will not make a difference to these contradictions.”

About the Author
David Chase Taylor, the editor-in-chief of, is an American journalist living in Zürich, Switzerland, where he has applied for political asylum after the release of The Nuclear Bible, a book credited with stopping a false-flag/state-sponsored nuclear terror attack upon America. Taylor has also released The Bio-Terror Bible, a book and website exposing the coming global bio-terror pandemic. Taylor has also been credited with exposing the 2012 DNC Terror Plot, the “Twilight” Premier Terror Plot, and the Alex Jones links to STRATFOR. Legal Disclaimer’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. Terror related assertions, forecasts and predictions made by DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically happen based on the cumulative terror related data. Historically, once a major false-flag terror plot is exposed (see: Super Bowl Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Namaste.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s