SWITZERLAND, Zurich — Based on breaking news and events, it appears that international intelligence agencies have once again green-lit a Chinese-based nuclear attack on the United States of America. With a recent poll finding that China is now America’s top enemy and revelations that a new U.S. versus China cold war is imminent, the pretext for a “Digital Pearl Harbor” has quietly been established.
The impending Pearl Harbor-like surprise attack will likely commence with an EMP (Electromagnetic Pulse) attack on U.S. satellites and defense systems in the Pacific theater, ultimately rendering U.S.-based radar and electronic warning systems useless. Shortly thereafter, autonomous drones armed with nuclear weapons will likely be launched from Chinese ships and nuclear subs in the Pacific Ocean. Although targets are always subject to change, twin nuclear drone strikes against the West Coast cities of San Diego and San Francisco, California are the most likely attack scenario.
Although reports in respect to China’s EMP program have been public since 2011 (see below), it was revealed on January 30, 2014, that China’s EMP weapons are an “ace” against U.S. defense systems and that the Chinese military is looking to use an EMP attack as part of a “one-two punch to knock out – literally within seconds – all defensive electronics”. The one-punch being the EMP attack followed by a two-punch nuclear attack. The notion that China plans to target the U.S. with an EMP strike was reiterated in the February 3, 2014, report entitled “U.S. Evaluates China’s EMP Threat”. Predictably, the Department of Defense (DOD) publically stated that they are “unaware of any increase in the threat of a deliberate destructive use of an EMP device”.
As depicted in the January 8, 2014, report entitled “Strategic Military Satellites Vulnerable to Attack by China in Future Space War”, U.S. satellites are no match for a space-based Chinese cyber-attack. The notion that U.S. computers could suddenly be rendered useless by an unseen and undetectable force such as an EMP strike was recently highlighted in a February 25, 2014, report which revealed that the first contagious airborne Wi-Fi computer virus has now been detected. Unbeknownst to most, digital backdoors, which allow for “Zero Day Attacks”, have been built into all military software to specifically allow for EMP and cyber-like attacks.
Back on November 19, 2013, it was reported that retired U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the Internet. In other words, Chinese computer viruses could theoretically attack U.S. military defense systems (even those not connected to the internet), ultimately rendering them useless.
Despite growing evidence that nuclear bombs likely do not even exist (see: February 4, 2014 Truther.org report) U.S. President Barack “O-Bomb-A”, (i.e., Barry Soetoro) is without a doubt the anointed nuclear doomsday president. Therefore, until Obama is ousted from public office, the world will be under the threat of state-sponsored nuclear terrorism. In the aftermath of a Chinese or Iranian nuclear attack, Obama will institute martial law and declare himself dictator. This was all but confirmed in the February 27, 2014, Fox News report which stated that Obama is about ready to make a “government unto himself“, a Hitler-like move if there ever was one.
Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.
Chinese Space Attack
In order to attack U.S. satellites and defense systems, the Chinese government had to first prove to the world that they are smart enough technologically-wise to do so. This was all but confirmed on December 14, 2013, when China allegedly became the third country to land on moon. Roughly 2 weeks later on December 29, 2013, a report entitled “NASA Beware China’s Red Space Storm Rising” sounded the alarm in respect to China’s offensive space program. A month later on January 29, 2014, defense experts warned that China has boosted its space warfare capabilities. Although not yet confirmed, it does appear that China’s “Jade Rabbit” moon rover is military cover for the EMP-attack program which will take out U.S.-based military satellites and defense systems.
Chinese Drone Launch
Should Chinese drones nuke U.S. cities, they will most likely takeoff from Chinese ships in or near U.S. waters. According to a February 11, 2014, report published in respect to two Iranian warships off the coast of the U.S., the Pentagon stated that they may sail wherever they like, a reckless gesture at best. Four days later on February 15, 2014, a North Korean ship which had previously transported illegal weapons to Cuba returned to the island, unabated. A few weeks later on February 26, 2014, it was reported that a Russian spy ship was docked in Havana, Cuba, just 90 miles off the coast of America. These reports were published in order to: a) show that enemy war ships are sailing just off the coast of America, and b) that Chinese ships will be able to get close enough to U.S. shores in order to launch their nuclear drone strikes.
The “Invisibility Cloak”
In order for China to pull off a “stealth” nuke attack on America, they will have to, at least theoretically speaking, employ some sort of technology which renders America’s defenses useless. Coincidentally, on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat about the development of an invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when the Chinese attack America, they may do so with the aid of superior technology which in will in essence have allowed their military equipment to become invisible to American defense systems (e.g., radar, satellites, sonar, etc.).
Asian Sneak “Attack” Propaganda
Prior to a high-profile Asian based West Coast attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. On July 12th, 2013, the film “Pacific Rim” (2013) (see trailer) was released which features a story line in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, their first 3 attacks target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico. If and when this Hollywood terror programming will manifest in reality is unknown, but the precedent for a surprise attack on the West Coast of America definitely has been set.
I: EMP ATTACK:
1.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.
1.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.
II. CYBER TERROR:
2.1: U.S. Vulnerable to Chinese Cyber Attack
Aside from the fact that Chinese hackers reportedly crashed Federal Election Commission website on December 19, 2013, recent reports in respect to cyber-security (or lack thereof) suggests that cyber-attacks against U.S. governmental institutions are imminent. For example, on February 4, 2014, it was revealed that a U.S. Senate report found that federal agencies often fail to take basic preventive cyber-security measures. That same day, it was also reported that “password” is the password on many U.S. government computer accounts, furthering the notion that feds are an easy target for hackers. A day later on February 5, 2014, a U.S. government report found that 4 in 10 government security breaches go undetected, suggesting that cyber-attacks are much more prevalent than originally thought. Needless to say, these propaganda reports have been disseminated with the goal of making the American public believe that the U.S. government is highly vulnerable to a cyber-attack, possibly emanating from China.
2.2: Cyber Doomsday
Since June of 2012, numerous propaganda articles have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, “Threat Of ‘Spectacular’ Cyberattack Looms” and “U.S. Homeland Chief: Cyber 9/11 Could Happen “Imminently“, all indicate that an unprecedented act of state-sponsored cyber-terror upon the United States is imminent. Exactly how a cyber-Doomsday will manifest itself is unknown, but a Chinese-based EMP strike followed by twin nuclear attacks appears to be the working terror scenario.
2.3: China & Cyber Terror
As previously reported, the nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. China, more than any other nation, is sure to be scapegoated in the aftermath of a cataclysmic cyber-terror attack against the United States. On October 5, 2011, U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two U.S. satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyber espionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta recently stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to clamp down on aggressive Chinese cyber-attacks against American companies and the U.S. government. On October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.
2.4: Cyber-Related Nuclear Terror
Prior to a high-profile EMP attack followed by twin nuclear attacks, the public must be psychologically prepared to accept that this is in fact possible. Based purely on research conducted to date, the marriage between cyber-terror and nuclear terror was first made on February 19, 2013, when a CNN headline entitled “Former CIA Official: Cyber War ‘More Sinister Than Nuclear Age’” first paired the terms “cyber” and “nuclear” together in the same sentence. Roughly a month later on March 22, 2013, the propaganda film entitled “Olympus Has Fallen” (2013) was released (see trailer) in which Washington D.C., America’s capital is attacked by an ex-North Korean terrorist who wants to hack the White House computer network and detonate American nuclear warheads while in their respective missile silos. Exactly a month later on April 22, 2013, the Wall Street Journal ran a headline entitled “China: Cyberattacks Are Like Nuclear Bombs”, ultimately linking the words “China”, Cyberattacks” and “Nuclear Bombs” in the same sentence. Roughly two months later on June 28, 2013, another propaganda film entitled “White House Down” (2013), was released (see trailer) in which Washington D.C., America’s capital, was attacked by hackers attempting to breach the U.S. Department of Defense’s computers to access the “Nuclear Football”, the briefcase used by the President of the United States to initiate nuclear war.
3.1: China’s Drone Attack
China is building one of the world’s largest drone fleets aimed at attacking the United States in the event of a war. According to the report, “The Chinese military envisions its drone swarms scouting out battlefields, guiding missile strikes and overwhelming opponents through sheer numbers. China’s military-industrial complex has developed homegrown drones to accomplish these goals, according to the report released on March 11, 2013, by the Project 2049 Institute. “The PLA now fields one of the world’s most expansive UAV [unmanned aerial vehicle] fleets,” said Ian Easton and L.C. Russell Hsiao, researchers at the Project 2049 Institute and authors of the new report. The Project 2049 Institute report warned that China could consider “plausibly deniable” drone attacks blamed upon mechanical failure or cyberhackers. The Chinese drones could act as decoys, use electronic warfare to jam communications and radar, guide missile strikes on carriers, fire missiles at U.S. Navy ships, drop nuclear bombs, or dive into U.S. ships like kamikaze robots.
3.2: China’s “Stealth” Drones
If and when Chinese drones execute nuclear strikes against American cities, the drones will have to be stealth drones in order to circumvent U.S. aerial defense systems (in the event that they are not disabled due to an EMP attack). Another possibility is that the Chinese may cyber-hijack (commandeer) U.S. drones and arm them with Chinese-made nuclear weapons in order to get them past U.S. defense systems. Based on the following reports, both drone scenarios are possible, at least theoretically speaking. On March 11, 2013, Easton and L.C. Russell Hsiao, researchers at the Project 2049 Institute, stated that “The PLA [China] now fields one of the world’s most expansive UAV [unmanned aerial vehicle] fleets” and that China could consider “plausibly deniable” drone attacks blamed upon mechanical failure or cyberhackers. The drones could act as decoys, use electronic warfare to jam communications and radar, guide missile strikes on carriers, fire missiles at U.S. Navy ships or dive into ships like kamikaze robots. Project 2049 went on to state that China is developing drones such as the rumored “Dark Sword” stealth drone that have low radar profiles to escape radar detection and that Chinese engineers have even begun working on drones that have the software brains to fly in formation, do aerial refueling and takeoff and land autonomously. The report cautions the U.S. military to prepare for the worst-case scenario by hardening its existing air bases in Asia. On March 13, 2013, it was reported that China is building one of the world’s largest drone fleets aimed at attacking the United States in the event of a war. As of November 22, 2013, it was reported that China’s first stealth combat drone has taken its maiden flight.
IV. U.S. VERUS CHINA:
4.1: Red China Rising
Aside from the fact that China openly called for the world to be “de-Americanised” on October 13, 2013, it was revealed on December 12, 2013, that a group of U.S. defense analysts told a prominent House subcommittee that the U.S. military needs a more focused war plan specific to China, especially after China’s declaration of an air defense zone over the East China Sea. A week after this shocking revelation, Chinese hackers reportedly crashed Federal Election Commission website on December 19, 2013, a direct attack on the U.S. and its democratic form of government. As of February 19, 2014, China cut its U.S. Treasury holdings the most since 2011, an ominous sign that a Chinese attack is imminent. After all, China holds most of America’s debt and therefor a nuclear strike against America may be a sign to pay up.
4.2: U.S. Versus China
Inflammatory war propaganda, rising diplomatic tensions between the U.S. and China along with unprecedented U.S. propaganda against China indicates that World War III scenario between the United States and China is on the horizon. On June 4th, 2012, it was reported that the Australian government’s Defense White Paper published in 2009 contained a “secret chapter” that assessed “Australia’s ability to fight an air-sea battle alongside the United States against China”. A few weeks later on June 27th, 2012, Chinese Maj. Gen. Peng Guangqian stated that a future conflict with the United States is coming as a result of U.S. “containment” policy. Guangqian was then quoted as saying, “The United States has been exhausting all its resources to establish a strategic containment system specifically targeting China” and that “The contradictions between China and the United States are structural, not to be changed by any individual, whether it is G.H.W. Bush, G.W. Bush or Barack Obama, it will not make a difference to these contradictions”.
4.3: U.S. Military Vulnerable to Attack
Prior to an unprovoked and unabated attack by China against the West Coast of America, the public must first be led to believe through propaganda and alleged whistleblowers that U.S. military equipment and weapons systems are vulnerable to Chinese cyber-related espionage. That way, in the aftermath of a Chinese invasion whereby U.S. defense systems such as missiles, planes and radars are suddenly rendered useless, the narrative of a Chinese cyber-attack can be floated to the American public and military as the reason for the deadly attack which will surely take America to war. If the following reports are to be believed, Chinese hackers have gained access to U.S. weapons secrets, stole blueprints from Australia’s intelligence agency, stole a number of the latest U.S. weapons, hacked the NSA chairman’s accounts, targeted U.S. missile systems, hacked the Obama campaign, and hacked the head of the Nuclear Security Agency. The notion that the Chinese military is “smarter” than the U.S. military and therefore vulnerable to an attack was basically confirmed on January 16, 2014, when it was reported that a U.S. admiral conceded that the U.S. is losing dominance to China.
Chinese Espionage Headlines:
1. March 29, 2013: Report: China Gained U.S. Weapons Secrets Using Cyberespionage
2. May 27, 2013: Chinese Hackers Steal Australian Security Intelligence Blueprints
3. May 28, 2013: Pentagon: The Chinese Stole Our Newest Weapons
4. May 28, 2013: Chinese Infiltrated Top U.S. Weapons Systems, Confidential Report Claims
5. May 28, 2013: Report Lists U.S. Weapons Compromised By Chinese Cyberspies
6. May 29, 2013: Pentagon Aircraft, Missile Defense Programs Target Of China Cyber Threat
7. May 29, 2013: China to Hold Digital War Games
8. May 31, 2013: Hagel Says Chinese Cyberthreats Pose ‘Stealthy’ Danger To US
9. June 5, 2013: China Claims ‘Mountains Of Data’ On Cyber Attacks By US
10. June 6, 2013: Chinese Hacked Obama, McCain Campaigns, Took Internal Documents
[Does not purport to be a complete list of events of headlines]
4.4: U.S. Weapon Systems Compromised by Chinese Hackers
Based on multiple reports, Chinese hackers have compromised numerous U.S. military weapons systems, ultimately making U.S. military personal and equipment vulnerable to a Chinese attack. According to a May 28th, 2013, report by the Washington Post, the following is an “expanded partial list” of compromised DOD system designs and technologies:
I. U.S. System Designs
Terminal High Altitude Area Defense, Patriot Advanced Capability-3, Extended Area Protection and Survivability System (EAPS), F-35, V-22, C-17, Hawklink, Advanced Harpoon Weapon Control System, Tanker Conversions, Long-term Mine Reconnaissance System, Global Hawk, Navy antenna mechanisms, Global Freight Management System, Micro Air Vehicle, Brigade Combat Team Modernization, Aegis Ballistic Missile Defense System, USMC Tracked Combat Vehicles, Warfighter Information Network-Tactical (WIN-T), T700 Family of Engines, Full Authority Digital Engine Controller (FADEC), UH-60 Black Hawk, AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile), Affordable Weapons System, Littoral Combat Ship, Navy Standard Missile (SM-2,3,6), P-8A/Multi-Mission Aircraft, F/A and EA-18, RC-135 Detect./Collect, and the Mk54 Light Weight Torpedo.
II. U.S. Technologies
Directed Energy, UAV video system, Specific Emitter identification, Nanotechnology, Dual Use Avionics, Fuze/Munitions safety and development, Electronic Intelligence Processing, Tactical Data Links, Satellite Communications, Electronic Warfare, Advanced Signal Processing Technologies for Radars, Nanostructured Metal Matrix Composite for Light Weight Ballistic Armor, Vision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV), Space Surveillance Telescope, Materials/processing technologies, IR Search and Track systems, Electronic Warfare systems, Electromagnetic Aircraft Launch, Rail Gun, Side Scan sonar, Mode 5 IFF, Export Control, ITAR, Distribution Statement B,C,D Technical Information, CAD drawings, 3D models, schematics, Software code, Critical technology, Vendor/supply chain data, Technical manuals, PII (email addresses, SSN, credit card numbers, passwords, etc.), and attendee lists for program reviews and meetings.
About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the 2014 global bio-terror pandemic. To date, David Chase Taylor has blown the whistle on 50+ state-sponsored terror plots, including the man-made comet ISON hoax, the drone strike on “Fast and Furious” star Paul Walker, and he was the first to expose Alex Jones’ links to STRATFOR.
Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. State-sponsored terror alerts, warning, assertions and forecasts made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically occur based on the cited date. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl XLV Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Blessed are the Peacemakers. Namaste