STANLEY CUP FINALS ATTACK/INVASION ALERT (MAY 31, 2016): CIA Likely Plotting June 1, 2016, Pearl Harbor-Like Chinese, ISIS, North Korean and/or Russian-Related Attack and/or Invasion of US During on ‘Sharks vs. Penguins’ Game in Pittsburgh, Pennsylvania

Posted: May 31, 2016 in Breaking News

China pearl harbor

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history and may try and assassinate me Switzerland, especially since I have decifered.

SHOCK: 10 Reasons Why the Paris Terror Attacks Were Executed by the CIA

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
May 31, 2016
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is preparing to stage a Pearl Harbor-like surprise Chinese, ISIS, North Korean or Russian-related attack and/or invasion of the United States during the 2016 Stanley Cup Finals which commenced on May 30, 2016.

The impending Chinese or North Korean attack will likely involve one or more of the following: a) conventional nuclear attack; b) a TV-related cyber-hijack and subsequent nuclear attack; c) an EMP attack; d) Special Forces-related attack/invasion and/or e) the full-scale Chinese or North Korean invasion of Hawaii and/or the continental United States.

That being said, the U.S. Navy began Annual Exercise 16 back on November 16, 2015, a naval war game between Japan and the United States which featured the USS Ronald Reagan aircraft carrier. Consequently, a made-for-TV Chinese or North Korean  attack on iconic aircraft carrier is also highly likely.

In order to foreshadow the aforementioned attack on the USS Ronald Reagan aircraft carrier, the Washington Free Beacon published a report on December 15, 2015, entitled “Chinese Submarine Practiced Missile Attack on USS Reagan“. The incident  violated China’s 2014 commitment to the multinational Code for Unplanned Encounters at Sea, known as CUES, designed to reduce the risk of a shooting incident between naval vessels.

The notion that the Chinese are plotting a nuclear attack on the United States was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

The notion that North Korea is about to launch a WMD-related missile strike was foreshadows on Janaury 28, 2016, when it was reported that North Korea is reportedly readying to launch long-range missile that will most likely target Hawaii or mainland United States.

 

I. CHINESE ATTACK/INVASION:

 

Red Dawn

1.1: Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

1.2: China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

II: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

2.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

2.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

2.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

2.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

2.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

2.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

III. CHINESE NUCLEAR ATTACK:

3.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

3.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

 

3.3: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Hawaiian nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

IV. CHINESE CYBER-ATTACK:

Obama China

4.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

4.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

4.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

V. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

5.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

5.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

VI. NORTH KOREAN ATTACK/INVASION: 

North Korea

 

5.1: North Korean Sub Terror Trending
In order to sell the notion that North Korea has the ability to launch a nuclear, bio-chemical or EMP laden missile from a submarine in the Pacific Ocean, it was reported back on September 15, 2014, that South Korea has confirmed that North Korea has modified their subs to launch missiles. Nine days later on September 24, 2014, it was reported that North Korea may launch a ballistic missile from one of their submarines. Roughly 2-months later on November 2, 2014, North Korea reportedly modernized its Soviet missile-capable submarines, confirming that a submarine-based nuclear strike by North Korea is now in play. The notion that North Korea is planning a nuclear strike on the United States was confirmed by NORAD on April 8, 2015, when they officially stated that North Korea is capable of launching a “mobile” nuclear missile into the United States, most likely via a submarine in the Pacific Ocean. Roughly a month later on May 9, 2015, it was reported that North Korea has tested submarine-based ballistic missiles, raising the specter of a submarine-related nuclear strike by North Korea just prior to its fruition in reality. This notion was confirmed by Reuters two days later on May 11, 2015, when they published a report entitled “North Korea Seen Years from Sub-Launched Missile to Threaten the U.S.”. Needless to say, post-North Korean nuclear attack, it will predictably be said that U.S. intelligent on North Korea was outdated. Lastly, on May 20, 2015, Reuters published another report entitled “North Korea Modified Submarine Missile Launch photos, Says U.S. Official”, confirming, albeit in a de facto manner, that a submarine-based missile strike by North Korean is imminent.

North Korea MIssile launch

5.2: North Korean Attack Imminent
Recent news in respect to North Korea suggests that the regime is preparing for war, possibly with the U.S. or South Korea. This latest North Korean attack narrative was identified back on May 28, 2015, when Fox News published a report entitled “Major Construction at North Korea Rocket Site, US Research Institute Says”, highlighting North Korea’s alleged missile program just prior to an unprecedented missile-based strike. A few days later on June 3, 2015, new photos of Kim Jong Un surfaced, showing the dictator’s weight gain and raising health concerns. The timely propaganda report was designed to show that Un is losing control of himself and his country, making the notion of an unprovoked attack seem all the more plausible. Roughly a month later on July 11, 2015, it was reported that North Korea named a new defense minister. The change was evidently designed to show that the North Korean military is under new management just prior to an unprecedented and unprovoked attack upon Japan, South Korea or the United States. Roughly 2-weeks later on July 21, 2015, Fox News published a report entitled “North Korea Says it Won’t Do Iran-Style Nuclear Deal with US”. The timely report was designed to show that North Korea is defiant just prior to a surprise missile strike, possibly nuclear in nature. Lastly, a day later on July 22, 2015, Fox News published a report entitled “North Korea Reportedly Modifying Missile Facility for Possible New Launch” which was designed to sell the notion that North Korea is getting ready to launch a wave of missiles, possibly outfitted nuclear or bio-chemical weapons.

5.3: North Korea’s Missile Program Active
In order to show the world that North Korea’s missile program is active prior to an earth-changing nuclear/ EMP attack upon the United States, it was reported back on November 26, 2013, that Iran and North Korea are secretly developing long-range rocket boosters for nuclear ICBM missiles. Roughly a year later on October 2, 2014, it was reported that North Korea has completed an upgrade to its space center in order to house larger rockets. The report stated that a fresh launch by North Korea is expected within the year of 2014. Roughly a month later on September 23, 2014, it was reported that North Korea is developing new missiles capable of carrying tactical nuclear warheads. In what appears to be the North Korea flexing its military muscle just prior to an unprecedented nuclear attack upon the United States, it was reported back on March 17, 2015, that North Korea fired missiles into the China Sea amid tensions with South Korea, America’s #1 ally in the region. Roughly 3-weeks later on April 8, 2015, it was reported that hundreds of North Korean missiles now pose a bigger threat to Asia than the United States. The propaganda report was designed to highlight North Korean missiles emanating out of Asia just prior to an attack on America. Lastly, on May 18, 2015, The Week published a report entitled “Mystery Threat to American Warships is Likely North Korean Missile”, foreshadowing the notion that North Korean plans to attack the United States, most likely from an underwater ship, otherwise known as a submarine.

130411184420-tsr-lawrence-north-korea-missiles-nuclear-capable-00002010-story-top

5.4: North Korea’s Missile Activity Reaching Crescendo
Escalating missile and rockets tests by North Korea are increasing in proximity and well as distance. If the reports and propaganda is to be believed, North Korea now has the capability to launch missiles into outer space as well as strike America. To date, North Korea has allegedly conducted at least 12 missile tests and 2 rocket tests that will likely culminate in an unprecedented and unprovoked biological and/or chemical attack by North Korea on South Korea or its neighbors using the agents known as anthrax or smallpox.

History of North Korea’s Missile & Rocket Tests:

1. May 29/30, 1993: 1st Missile Test: Result: Success: Type: Rodong-1/Nodong-1
2. August 31, 1998: 2nd Missile Test: Result: Success: Type: Taepodong-1
3. March 10, 2003: 3rd Missile Test: Result: Unknown: Type: Unknown
4. October, 2003: 4th Missile Test: Result: Unknown: Type: Unknown
5. May 2005: 5th Missile Test: Result: Unknown: Type: Unknown
6. March 8, 2006: 6th Missile Test: Result: Unknown: Type: Unknown
7. July 5, 2006: 7th Missile Test: Result: Fail: Type: Taepodong-2
8. April 5, 2009: 1st Rocket Test: Result: Success: Type: Unha-2
9. May 26, 2009: 8th Missile Test: Result: Unknown: Type: Unknown
10. July 4, 2009: 9th Missile Test: Result: Success: Type: Scud
11. December 19, 2011: 10th Missile Test: Result: Unknown: Type: Unknown
12. January 11, 2012: 11th Missile Test: Result: Unknown: Type: Unknown
13. April 12/16, 2012: 2nd Rocket Test: Result: Fail: Type: Unha-3
14. December 12, 2012: 12th Missile Test: Result: Unknown: Type: Unknown

Kim Jon-un visits submarine

5.5: Kim Jong-Un Under Swiss CIA Mind Control
Shortly after the mysterious death of North Korean President Kim Jong-il on August 24, 2012, his son, Kim Jong-un was placed into power. Since then, Jong-un has been routinely portrayed in the media as being mentally unstable, highly insecure, and willing to attack anyone at a moment’s notice. Not surprisingly, Kim Jong-un exhibits all the telltale signs of being brainwashed and under state-sponsored mind-control. Jong-un was reportedly spotted with his “handler” on numerous occasions while attending a “private school” in Switzerland which is home to the CIA. According to Wikipedia, “mind control” was first developed in Korea during the Korean War and involves a process in which a group or individual “systematically uses unethically manipulative methods to persuade others to conform to the wishes of the manipulator(s), often to the detriment of the person being manipulated”. Needless to say, Un is a patsy of the CIA who holds no real power. Like his father, he will be assassinated once he fulfills his respective mission which evidently consists of an unprovoked attack on the United States while Obama is in office.

VI. NUCLEAR ATTACK:

Nuclear-Threats-from-North-Korea

6.1: North Korean Nuclear Attack
Prior to executing a North Korean nuclear attack upon the United States, the CIA must establish a believable narrative through their respective governments and media platforms that North Korea has an active nuclear weapons program. This narrative originally began back on October 24, 2014, when a U.S. general stated that North Korea may have nuke missile knowhow. U.S. generals have evidently been instructed to speak publically about the impending attack so that the public will already be acclimated to the idea when it actually happens. Showing the duplicity of the U.S. government, a United Nations report from March 29, 2014, found that U.S. parts are now in North Korean rockets. In the wake of a North Korean nuclear/EMP attack, parts of the rocket will be blown across the U.S. Consequently, the report was published premeditatively in order to counter any “conspiracy theories” that the rocket was made and launched by the U.S. military. More recently, on April 4, 2014, North Korea allegedly told the world “wait and see” in respect to its latest nuclear test. Roughly a month later on May 10, 2014, North Korea threatened to conduct a “counter-measure” nuclear test. A few months later on July 28, 2014, North Korea threatened a nuclear strike on White House, showing that they are indeed planning to attack America while Obama is in office. Even more recently, on March 20, 2015, it was reported that North Korea is now “prepared” to fire a nuclear missile. The timely propaganda report was designed to show that North Korea is now preparing to launch a nuclear attack, most likely using an Intercontinental Ballistic Missile (ICMB). Roughly a month later on April 8, 2015, NORAD confirmed that North Korea is now capable of launching a “mobile’ nuke” missile into the United States: Roughly 2-weeks later on April 23, 2015, CNN published a report entitled “North Korea’s Troubling Nuclear Progress”, foreshadowing the notion that North Korean nuclear terror is on the horizon. That same day, April 23, 2015, China reportedly issued a warning over North Korea’s nuclear production, highlighting their nuclear program on an international level just prior to the impending attack. Two weeks later on May 7, 2015, CNN published a report entitled “Exclusive: North Korea Would Use Nukes if ‘Forced,’ Official Says, confirming that a North Korean nuclear attack is imminent. Roughly 3-weeks later on May 20, 2015, CNN published another report entitled “North Korea Says it Can Miniaturize Nuclear Weapons”, potentially foreshadowing a submarine-related nuclear terror attack. Lastly, that same day, May 20, 2015, the BBC published a report entitled “What Lies Behind North Korea’s Nuclear Claims”, raising the specter of a North Korean nuclear attack just prior to it transpiring in reality. Needless to say, these reports, taken collectively, suggest that an unprecedented nuclear attack on the United States by North Korea is imminent.

6.2: Nuclear Tests by North Korea
As evidenced, North Korea has continued their nuclear tests regardless of the sanctions imposed by the United Nations. With each passing nuclear test, the respective yield of the test jumps considerably higher. Therefore, the 4th nuclear test (or the 1st North Korean nuclear attack) should yield somewhere in the neighborhood of 25-40 kilotons of TNT, an amount on par with Pakistan’s nuclear program. According to physicists who testified before a U.S. Congress hearing back on October 7, 1999, nuclear weapons with yields of 10 kilotons or less can produce a large EMP that is capable of destroying America’s electrical grid.

North Korean Nuclear Test Timeline:

1. October 9, 2006: 1st Nuclear Test: Device: Fission: Type: Underground: Yield: 0.5 kilotons of TNT
2. May 25, 2009: 2nd Nuclear Test: Device: Fission: Type: Underground: Yield: 2.35 kilotons of TNT
3. February 12, 2013: 3rd Nuclear Test: Device: Fission: Type: Underground: Yield: 6-9 kilotons of TNT

VII. BIO-CHEMICAL ATTACK:

North Korean Bio-Terror

7.1: North Korean Bio-Terror Propaganda
The notion that the Swiss CIA is actively plotting a North Korean bio-terror attack via missile was first exposed back on March 31, 2013, in a Truther.org report entitled “North Korea’s False-Flag Bio-Terror Attack Plan Revealed”. If the news and propaganda in respect to North Korea is to be believed, North Korea has an “active” and “secretive” bioweapons program which has been allegedly testing bioweapons on children. Also, North Korea attempted to launch a biochemical attack against South Korea prior to the G20 Summit in Seoul, and has the ability to produce upwards of 1.25 million chemical bombs. They also have approximately 200,000 troops, which are reportedly ready to carry out military operations, including the dispersal of anthrax spores with specialized equipment. North Korea was also “caught” shipping approximately 14,000 anti-chemical weapons suits along with reagents used to identify chemical substances that become airborne after a chemical weapons attack. Lastly, North Korea plans to use recently purchased American-made drones to target South Korean troops stationed on border. In the event that North Korea executes a bio-terror attack on the U.S., it will most likely come from a missile laden with anthrax (Bacillus anthracis) and/or smallpox (Variola major). Although the impending North Korean bio-terror missile attack could theoretically target Alaska, Hawaii, Nevada, Oregon or Washington, California is the most likely target. Regardless of the location struck, the outbreak will spread, sparking the bio-terror pandemic planned for 2015. Back on June 6, 2015, it was reported that a South Korean Air Force member at a U.S. military base in Korea has MERS, a highly contagious pathogen. The timely propaganda report was designed to associate Korea with biological outbreak just prior to a North Korean bio-terror missile attack. Lastly, in order to associate North Korea with Anthrax just prior to an unprecedented Anthrax-laden missile strike by North Korea, Fusion published a report on June 4, 2015, entitled “North Korea is Very, Very Mad at the U.S. for Sending Anthrax to South Korea”.

7.2: North Korean’s “Active” Bio-Weapons Program
Back on September 7, 2005, a U.S. government report stated that there was an “active” biological weapons program in North Korea. The findings were outlined in the State Department’s “Adherence to and Compliance with Arms Control, Nonproliferation, and Disarmament Agreements and Commitments” report. According to the report, North Korea has a “dedicated, national-level effort to develop a Bio-Weapons capability”.

7.3: North Korea “Tests [Bio] Weapons on Children”
Back on July 24, 2009, it was reported that an ex-North Korean special forces captain named Im Chun-yong had confirmed that biological and chemical weapons were being tested on children in North Korea, specifically those who were mentally retarded or physically handicapped. Im is quoted as saying, “If you are born mentally or physically deficient, the government says your best contribution to society… is as a guinea pig for biological and chemical weapons testing.” Im also stated that he was trained how to use biochemical weapons against the “enemy” – including how to fire them from short-range “bazooka-style” weapons. The report went on to state that North Korea has 5,000 tons of biochemical weaponry including mustard gas, nerve agents, sarin, anthrax and cholera.

7.4: North Korea’s “Secret” Bioweapons Program
Back on October 1, 2009, it was reported that North Korea has developed a vast bioweapons (BW) research and development program in secrecy. According to the report, the top-secret BW program is located within the infrastructure of a civilian research organization which encompasses at least 20 facilities throughout the country, including 12 chemical weapons plants. The report further stated that the North Korea’s BW program has 5000 tons of biological agents including smallpox, pneumonic plague, cholera, botulism, sarin, mustard gas and hydrogen cyanide.

7.5: North Korea’s “Anthrax Missile”
Back on October 1, 2009, it was reported that an anthrax attack by North Korea “might use a modified missile that cruises at low altitude to spray a fine mist of weaponized germs over its target area” which could have the “potential to decimate South Korea and the 28,000 U.S. troops” stationed in the DMZ. North Korea is the only world government that has never signed, acceded to or even responded to invitations to join the Chemical Weapons Convention.

7.6: North Korea’s “13 Types” of Bio-Weapons

Back on October 5, 2009, it was reported that North Korea allegedly has 5,000 tons of chemical weapons including 13 types of viruses and germs which could be used in a future bio-terror attack. According to the report, the list of North Korean chemical and biological weapons includes cholera, yellow fever, smallpox, eruptive typhus, rickettsia, mustard gas, phosgene, colorless poison gas, blood agents, sarin, and tabun (a liquid chemical compound used as a nerve gas), all of which could theoretically  “be deliverable by artillery or missile to cause massive civilian casualties in South Korea”.

7.7: North Korea’s “G20 Bio-Terror Attack” Plan
Back on August 13, 2010, it was reported that North Korea had attempted to launch a biochemical attack against South Korea prior to the G20 Summit in Seoul, South Korea. According to Choi Sung-yong, the head of Family Assembly Abducted to North Korea, North Korea was preparing to send “20 different deadly biochemical weapons attached to balloons and parachutes across the border”. Choi allegedly received the information about the impeding attack from “an active soldier in the North Korean Army”. Three months later on November 12, 2010, Sung-yong’s original report was confirmed when British diplomats also raised concerns that North Korea could strike South Korea with biological weapons during the G20 Summit in order to create an attention grabbing event. According to diplomatic sources within the U.K., a North Korean attack could consist of an incursion into South Korean waters, missile testing in South Korean airspace, or the use of biological weapons filled balloons against the Seoul.

7.8: North Korea’s “1.25 Million Chemical Bombs”
Back on October 14, 2010, it was reported that Kwon Yang-Joo, an official with Korea Institute for Defense Analyses (KIDA), had stated that North Korea could easily manufacture up to 12,000 tons of chemical weapons as well as produce upwards of 1.25 million chemical bombs, all of which could be deliverable by aircraft, missiles or artillery shells. Yang-Joo went on to state that North Korea’s chemical weapons stockpile is South Korea’s number one security priority and that, “The international community must show its strong will in seeking disarmament of North Korea’s chemical weapons”.

7.9: North Korean “Anthrax Attack Could Kill 600,000”
Back on October 27, 2011, it was reported that an American defense expert warned that North Korean could kill between 20,000 and 600,000 South Koreans if it released anthrax over Seoul. According to Bruce Bennett of the RAND Corporation, a North Korean attack using an aerosolized form of anthrax would leave many with respiratory anthrax, the most difficult form of the illness to treat. Bennett also stated that North Korea would most likely use several means of dispersing anthrax spores, including missiles, aircraft and Special Forces equipped with specialized equipment. Bennett warned that the use of biological weapons by North Korea would occur as a prelude to an attack and encouraged South Korea to investigate domestic terror groups with connections to North Korea that were capable of spreading chemical materials over a large area.

7.10: North Korean Chemical Attack Would “Cause Panic”
Back on December 20, 2011, it was reported that U.S. and allied military planners believe that although South Korea would ultimately win in a conventional war, North Korea would seek to cause panic by using its chemical and biological arsenal. South Korean defense estimates that the army of North Korea is in possession of 2,500 to 5,000 tons of chemical weapons, including mustard, phosgene, blood agents, sarin, tabun, V-agents, botulinum toxin and anthrax. According to the report, North Korea’s chemical agents could be delivered by aircraft, ballistic missiles, long-range artillery, rocket launchers or naval vessels.

7.11: North Korea’s Bio-Chemical Attack Plan Exposed
Back in 2012, the International Institute for Strategic Studies (IISS) released a suspicious report in respect to North Korea’s chemical and biological weapons program. Despite the fact that North Korea is rogue terrorist nation, the IISS think-tank of London, England, curiously reveal “North Korea’s offensive military plans”, with no mention of how they are privy to such information: “North Korean forces could use chemical weapons against US and South Korean forces to reduce these forces’ combat effectiveness, deny the use of mobilization centers, storage areas, and military bases…chemical agents could be used to help break through defensive lines or to hinder an allied counterattack…chemical agents could be used against fixed targets, including command and control centers, logistics hubs, and airbases…North Korean offensive military plans include the use of chemical agents delivered by a variety of traditional means, such as ballistic missiles, artillery rockets and shells, mortars, and aerial bombs and sprays, against both military and civilian targets…North Korea is capable of producing significant amounts of common biological agents, such as anthrax, and delivering these agents through a variety of conventional and unconventional means…North Korea possesses chemical weapons and is prepared to use them against military and civilian targets in offensive operations or in retaliation for an attack on North Korea…At the strategic level, the potential delivery of large quantities of chemical or biological agents to nearby targets (such as Seoul) and smaller quantities to more distant targets (such as Tokyo) could cause significant civilian casualties.”

7.12: U.N. Investigates North Korea for Exporting Chemical Weapons
Back on January 6, 2012, it was reported that the United Nations is looking into allegations that North Korea attempted to export chemical weapons to Syria in 2009. According to the report, Greek authorities allegedly seized a shipping container from a Liberia-registered freighter stuffed with approximately 14,000 anti-chemical weapons suits along with multiple types of ampules believed to be made of glass containing powdered or liquid reagents used to identify chemical substances that become airborne after a chemical weapons attack. These reagents can either be used during a chemical weapons attack or in the defense against them. The Greek government reported the seizures of the ampules and suits in September of 2011 as a violation of the U.N. Security Council’s Sanctions Committee’s resolution banning North Korea from exporting arms-related materials.

7.13: Korean Smallpox Outbreak “Risk Is Double”
Back on May 14, 2012, it was reported that North Korea has the biological ability to create the smallpox deadly virus. According to a report in the Korea Herald, Jacob Cohn, a representative of Danish vaccine maker Bavarian Nordic, stated that, “Anyone who has the intent and the capability can now create the smallpox virus, which is the most devastating disease we have ever seen…Here the risk (of a smallpox outbreak) is double, in the sense that you have a next door neighbor and you have the international community risk.”

VIII: EMP ATTACK:

nk-emp

8.1: North Korean EMP Attack
Prior to executing an alleged North Korean nuclear EMP attack on the United States, the CIA must establish a believable narrative through their governments and media platforms that North Korea has an active EMP weapons program. For example, on June 16, 2011, it was reported that North Korea tested a “super-EMP” nuclear weapon. Roughly 18-months later December 19, 2012, the Washington Times reported that a North Korean EMP attack could destroy United States and that Obama must take immediate action to avoid this scenario (which he obviously has not). Roughly a year later on November 5, 2013, it was revealed that North Korea is indeed developing “electromagnetic pulse weapons”. Less than a year later on April 9, 2014, a DHS study found that North Korea is indeed capable of launching an EMP attack on the United States. Roughly a month later on May 8, 2014, a hearing on Capitol Hill found that America’s electric grid is vulnerable to an EMP attack. In order to provide plausible deniability for the U.S. government after an EMP attack, it was reported on August 19, 2014, that the U.S. is defenseless against a North Korean EMP attack. Needless to say, these reports, taken collectively, suggest that an unprecedented nuclear EMP attack by North Korea is imminent.

8.2: Blackout Terror Trending
Prior to a high-profile nuclear/EMP attack by North Korea, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced electricity-related terror is now at an all-time high which suggests that a state-sponsored terror EMP attack is imminent.

Blackout Timeline (2014-2015):

1. November 2, 2014: Country-wide blackout in Bangladesh after power grid collapses.
2. December 2, 2014: Detroit goes dark after a massive power outage
3. December 15, 2014: Car knocks out power in 2 North Carolina counties
4. March 27, 2015: Major Power Outage in Amsterdam Halts Trains, Hits Flights
5. March 31, 2015: Nationwide blackout throws Turkey into chaos
7. April 7, 2015: Power loss hits Washington, DC: Government left in dark
8. May 18, 2015: San Francisco suffers two hour blackout

[Does to purport to be a complete list of blackouts]

8.3: Blackout Terror Propaganda
As depicted in the August 16, 2013, New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow”, American electricity companies (at the behest of the Swiss CIA) have been drilling for EMP-related blackouts. More recently, on March 24, 2015, USA Today published a report entitled “Bracing for a Big Power Grid Attack: ‘One is Too Many’”, confirming, albeit in a de facto manner, that an attack on the power grid is imminent. Roughly 2-weeks later on April 6, 2015, it was reported that a U.S. court is mulling the release of a “secret government plan” to cut cell phone service, a scenario which would actually transpire in the wake of an EMP-related attack. In order to further psychologically program the masses for the demise of America’s electrical power grid, the Washington Examiner published a report a few weeks later on April 21, 2015, entitled “DOE Warns ‘Modern Life’ Threatened by Terror, Climate Threats to Electric Grid”. Roughly a month later on May 19, 2015, the World Bank published an ominous report which found that one in seven people still live without electricity. The timely report was designed to highlight the notion of people living without electricity just prior to a state-sponsored attack on the power grid.

20130605_emp_attack_large

8.4: What is an EMP?
A Nuclear EMP is a burst of electromagnetic radiation which usually results from a high energy nuclear explosion that suddenly fluctuates the magnetic field. Theoretically, an EMP could wipe out everything electronic (planes, trains, cars, computers, internet, etc.) in a flash. EMP terror has gained popularity of late and has been featured in movies such as “The Matrix” and television shows such as “24” and the #1 show on NBC entitled “Revolution”, which eerily features a post-EMP America with no electricity. Aside from the Hollywood EMP propaganda, there has been recent EMP terror legislation by the U.S. congress, a number of EMP terror conferences, and EMP terror scholarly whitepapers which have all been preparing local, state and federal officials for an upcoming EMP terror attack on America. Based on the 12 major power outages in 2012 alone, it appears that the U.S. government is programming the public for the permanent loss of electricity. Coincidentally, in September of 2012, Alex Jones of Infowars released a new magazine which indicates that the STRATFOR intelligence operation known as Infowars knows that the internet is about to expire and have planned ahead by launching a new propaganda magazine. In the propaganda film entitled “Red Dawn” (2012), (See: Trailer) a group of American youth out partying after a football game, suddenly find themselves in the middle of a major blackout, likely from an EMP attack.

grid2exfp

8.5: “GridEx II” Power Grid Drill
Considering that on November 13-15, 2013, a massive power grid terror drill entitled “GridEx II” was executed on the East Coast of America, there is a real possibility that a massive nuclear EMP attack could turn the lights out on America for good. According to the August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

 

 

Comments are closed.