Chinese Drone Attack

Download & Forward PDF

David Chase Taylor
June 30, 2014

SWITZERLAND, Zurich — Sometime prior to on July 4, 2014, America’s 238th birthday, the CIA will likely attempt to trigger World War III between the U.S. and China with a wave of “surprise” attacks, starting from East to West. In the aftermath of the unprovoked attacks, a full-scale war between the U.S. and China will commence, possibly ending in all-out nuclear war.

The opening salvo by China will likely feature an aerial attack on Clark Air Base in the Philippines, a strategic U.S. military base in the Asia-Pacific Theater. Shortly thereafter, China will launch an attack on Pearl Harbor in Hawaii where the Chinese Navy is currently executing joint war games with the U.S. Navy. The third phase will feature the unprecedented Chinese cyber-hijack of multiple armed U.S. drones over California skies. Once the U.S. drones are under the command and control of China, the fourth and final phase will commence with deadly drone strikes across California, namely within the city of San Francisco.

In order to provide a timely motive for a surprise attack on America, China demanded that the U.S. stop spying after the latest Snowden leak. Since the U.S. openly refused to comply, China has no choice but to take matters into their own hands. Roughly two weeks later on take April 8, 2014, China warned that it could not be contained. The provocative statement was made during U.S. Secretary of Defense Chuck Hagel’s visit to China. Interestingly, on June 5, 2014, it was reported that China’s navy and air force are rapidly expanding their size and reach, a report which infers that China now has the ability to strike within the continental United States.

Chinese Attack Phases:

Phase I: Attack on the Philippines (Clark Air Base)
Phase II: Attack on Hawaii (Pearl Harbor)
Phase III: Cyber Hijack of U.S. Drones
Phase IV: Attack on California (San Francisco)

In order to bring unprecedented media attention to the act of cyber-hijacking prior to the cyber-hijacking of U.S. drones by China, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first cyber hijack. Shortly thereafter on May 5, 2014, the television series entitled “24: Live Another Day” (2014) debuted, featuring the cyber-hijacking of 6 U.S. drones over Europe. Said drones were subsequently used to attack London, killing hundreds of innocent people.

It is imperative to note that once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

In what appears to be Chinese “surprise” attack propaganda, Nike released a television commercial entitled “Ball Handles” on June 15, 2014, featuring an overweight Chinese basketball player wearing a t-shirt with the California state flag. In the commercial, the Chinese player brags about how good he is before repeatedly punching the other players in the groin in order to score. The state-of-the-art propaganda was evidently designed to foreshadow the notion that California is about to get sucker punched in the balls by China via the cyber-hijacking of U.S. drones.

The notion that the CIA is actively trying to trigger World War III between the U.S. and China has been exposed ad nauseam by To date, at least 5 different of Chinese “surprise” attack plots have been identified and exposed, the cyber-hijack of drones being the latest. In the wake of these Chinese attack plots being exposed, roughly 60 Chinese officials suddenly died due to unnatural causes. Although impossible to confirm, it appears that these Chinese officials were executed due to their first-hand knowledge of the foiled war plots.


“Sting of the Drone”
The notion that the U.S. and China are on a irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.


1.1 Chinese Attack on the Philippines
In order to provide a timely motive for a Chinese attack on the Philippines, namely Clark Air Base, President Barack Obama signed a 10-year agreement with the Philippines on April 28, 2014, which gives the U.S military access to Philippine military bases. “The Enhanced Defense Cooperation Agreement” essentially allows for U.S. forces to operate out of “Agreed Locations,” which are defined as: “facilities and areas that are provided by the Government of the Philippines through the Armed Forces of the Philippines (AFP) and that United States forces, United States contractors, and others as mutually agreed”. The Agreement hands over all operational controls of these “Agreed Locations” to the United States, and allows U.S. forces to preposition and store defense materiel, equipment, and supplies. In other words, the Philippines are about to become the main U.S. military base in Asia once a full-scale war with China commences. Roughly 3-weeks later on May 20, 2014, Philippine President Aquino stated that China is in violation of informal sea code, providing yet another timely motive for a Chinese attack on the Philippines. In order to raise the notion of an impending attack on the Philippines, it was reported on June 26, 2014, that the U.S. plans to downsize its “anti-terror” group in the Philippines. Three days later on June 29, 2014, the Philippines were officially put on alert for a terror attack, one that should come courtesy of China any day now. Since the U.S. and the Philippines are strategic allies, an attack on the Philippines is considered an attack on the U.S. Consequently, the U.S. can be drawn into a war in a matter of days.


2.1 Chinese Navy in Hawaii
In what appears to be the drill for an upcoming Chinese attack on the U.S., China reportedly held war games in the East China Sea on May 20-26, 2014. According to reports, Chinese and Russian naval vessels executed joint missions involving hijacked ships as well as joint air and joint sea assaults. In other words, the Chinese were perfecting both hijacks and attacks. Exactly 1 month later on June 26, 2014, China began participating in the world’s largest naval drills entitled “Rim of the Pacific Exercise” (RIMPAC), a biannual U.S.-led naval exercise off the coast of Hawaii. RIMPAC, which is scheduled to take place from June 26, 2014 until August 1, 2014, reportedly involves 47 surface ships, 6 submarines, over 200 aircraft, and 25,000 troops from 22 countries. It is during these elaborate war games that the Chinese are expected to attack U.S. ships and/or Pearl Harbor, resulting in catastrophic casualties in and around Hawaii, Obama’s alleged birth state.



3.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

3.2 China Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

3.3 Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.


4.1 Chinese Attack on California
In order to make China’s drone attack on San Francisco be more explosive in nature, the CIA ordered three former U.S. Navy fleet oilersto be moved to Mare Island, just outside San Francisco Bay. Although the USS Hassayampa, the USS Kawishiwi, and the USS Ponchatoula were allegedly moved to the island for “cleaning”, it’s highly likely that they were actually filled with gasoline and/or explosives. That way, when they are struck with a drone missile, a massive explosion will erupt, creating a made-for-TV moment reminiscent of the December 7, 1941 Japanese attack on Pearl Harbor. California also has two nuclear reactors that may come under Chinese drone attack: The Diablo Canyon Power Plant located in San Luis Obispo County (just 231 miles from San Francisco), and the San Onofre Nuclear Generating Station in San Diego County. In the event that China is able to hijack U.S. drones, one or more of these nuclear reactors may be attacked, causing a Fukushima-like disaster in America. Interestingly, a similar nuclear reactor disaster if featured in the recent Hollywood propaganda film entitled “Godzilla” (2014), which also features an attack on San Francisco by an Asian-based monster.


4.2 Golden Gate Bridge Attack
To make a Chinese attack on the U.S. even more psychologically terrorizing, a well-known landmark such as the Golden Gate Bridge in San Francisco must be destroyed in order to serve as life-long reminder of that horrific day (e.g., Twin Towers on 9/11). Back on February 23, 2012, it was reported that the Golden Gate Bridge will undergo a renovation project that will “take years to complete”. According to reports, the project involves the repainting of the two main suspension cables which are responsible for holding the bridge in place. Whether the lengthy “renovation” project has undermined the structural integrity of the bridge is not known, but the timely construction project may have provided the necessary cover for the installation of demolition explosives in and around the Golden Gate Bridge. Said explosives could be detonated at a later date via remote control in order to give the appearance of a successful Chinese attack on the bridge using drone missiles. In other words, the bridge would be demolished with shaped explosives while the government and media publicly blame China.

4.3 Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

4.4 Asian “Surprise” Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to July 4, 2014.



5.1 Vice Admiral Jan E. Tighe
In what appears to be pre-Chinese cyber-attack personal logistics by the U.S. Navy, it was revealed on April 3, 2014, that Vice Admiral Jan E. Tighe has been appointed head of the U.S. Fleet Cyber Command and the U.S. 10th Fleet, making her “the first female commander of a numbered fleet in U.S. Navy history”. The U.S. Fleet Cyber Command is an operating force of the United States Navy responsible for the Navy’s cyber warfare programs, while the United States Tenth Fleet executes the full spectrum of cyber, electronic warfare, information operations and signal intelligence capabilities across the cyber, electromagnetic and space domains. In the wake of a successful Chinese cyber-attack against the U.S. Navy, Vice Admiral Tighe, a woman, will be publically scapegoated for the unprecedented attack. The U.S. government and the media will predictably state that Tighe was over her head and not qualified for the position, making the issue about a woman serving in the military rather than the fact that the entire Chinese attack was a false-flag courtesy of the CIA.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR. Legal Disclaimer’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a false-flag terror plot is exposed (e.g., 2011 Super Bowl Nuclear Terror Plot), it is immediately canceled or postponed (e.g., 2014 Super Bowl Nuclear Terror Plot). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste


Comments are closed.