GLOBAL CYBER TERROR ALERT (JULY 3, 2016): CIA Likely Plotting Unprecedented Wave of Cyber-Related Attacks on July 4-11, 2016—Cyber-Attacks on Airliners, Airports, Banks, CERN, NSA, Nuclear Missiles, Nuclear Reactors, Oil & Gas Facilities, Satellites, Social Media Platforms & Stock Markets Most Likely Cyber-Terror Attack Scenarios

Posted: July 3, 2016 in Breaking News

Obama China

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
July 3, 2016
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA Headquarters beneath Lake Geneva will attempt to stage a cyber-related terror attack on the New York Stock Exchange (NYSE), the US Security and Exchange Commission (SEC), the Federal Reserve Bank (FED). That being said, other global financial institutions may also suffer an attack.

That being said, cyber-related attacks on airliners, airports, banks, nuclear reactors, oil and gas facilities, retail entities, power facilities, and social media platforms (e.g., Facebook, Twitter, etc.) are also expected this week.

Although the impending attack could theoretically be scapegoated onto ISIS or rouge nation states such as Iran, North Korea, or Syria, the countries of China, Russia and the state-sponsored hacking group known as Anonymous are the most likely to be scapegoated for the unprecedented cyber-related attacks and cyber-heists.

Back on December 18, 2014, the U.S. House cybersecurity chairman warned that Wall Street may be the next cyber target of the state-sponsored Sony hackers. The warning confirms, albeit in a de facto manner, that a full-scale cyber-related attack on Wall Street is imminent.

The notion that the New York Stock Exchange (NYSE) is about to suffer a massive cyber-related attack was further highlighted on March 13, 2015, when the owner of the NYSE warned of cyber risks to the market. Any future cyber-attack on the NYSE will have the seal of approval of its owner who stands to gain from such an attack.

In May of 2015, the National Defense Magazine published a report entitled “DHS Rolls out Cyber Security Program for Federal Agencies”. Said program is likely cover for a backdoor whereby DHS can execute a cyber-related attack on any U.S. government agency, namely stock exchanges.

Roughly 2-months later on July 21, 2015, 4 people were reportedly arrested in Florida and Israel for the cyber-attack on JPMorgan. The arrests were designed to sell the notion that hackers are actively targeting financial institutions prior to an unprecedented cyber-heist of the NYSE.

Two days later on July 23, 2015, 3 Estonian men were reportedly sentenced for cyber-related attacks that reached 100 countries. Again, the arrests were designed to further sell the notion that hackers are actively targeting financial institutions prior to an unprecedented cyber-heist of the NYSE.

In what appears to be pre-banking terror propaganda, the Telegraph published a report on August 17, 2015, entitled “Doomsday Clock for Global Market Crash Strikes One Minute to Midnight as Central Banks Lose Control”. Needless to say, the Federal Reserve is the only central bank in America.

Two days later on August 19, 2015, traitorous Infowars published a report entitled “Federal Reserve Directly Responsible for Recessions, Depressions”, providing a timely motive for a so-called domestic terror attack on one or more Federal Reserve Banks.

Roughly a week later on August 25, 2015, a former J.P. Morgan analyst was reportedly charged with a $600,000 insider trading scheme. The indictment was designed to further sell the notion that insiders are actively targeting financial institutions just prior to an unprecedented financial-related cyber-heist.

Less than a week later on August 30, 2015, the Guardian published a report entitled “Central Banks Can’t Save the Markets from a Crash. They Shouldn’t Even Try”. The timely report was designed to foreshadow the notion that a central banks, namely the Federal Reserve, are about to crash.

That same day, August 30, 2015, the Blaze published a report stating that ISIS is now plotting a “Second Blow” to the U.S. financial system. Although an ISIS-related attack on the U.S. economy is theoretically possible, an attack by Anonymous, China, or Russia is far more likely.

Lastly, on August 31, 2015, traitorous Infowars published a report entitled “No Paychecks After Cashless Society “Glitch”” which was evidently designed to foreshadow the notion that banks will crash and people will lose access to their bank accounts, most likely in the aftermath of an unprecedented cyber-related attack.

I. TOP ATTACK SCENARIOS:

Anonymous Twitter

1.1: Twitter Cyber-Attack
Unable to execute a direct cyber-related attack on the New York Stock Exchange (NYSE), it now appears that the Obama administration (at the behest of the CIA in Switzerland) may resort to attacking Twitter instead, possibly with a fraudulent report that causes a massive stock market crash. This notion was foreshadowed back on July 14, 2015, when CNBC published a report entitled “Twitter Shares Jump on Fake Takeover Report”. The term “fake takeover” was evidently designed to foreshadow a real-life fake takeover, namely the terrorist hijacking of a major entity such as the New York Stock Exchange, White House or the U.S. Capitol Building. In the aftermath of this bogus report, investors would instantly lose all faith in America, dumping their collective stock and crashing the market. In order to foreshadow that Twitter will be used in an upcoming terror attack, Fox News published a report on July 24, 2015, entitled “Could Twitter Stop the Next Terror Attack?”. Properly translated, the headline should read “Twitter Will Start the Next Terror Attack”. This exact scenario was beta-tested back on April 23, 2015, when the Twitter account of the Associated Press (AP) allegedly suffered a cyber-attack. The state-sponsored hackers then tweeted: “Breaking: Two explosions in the White House and Obama is injured”. The fake tween caused a subsequent panic which ultimately resulted in a 3-minute plunge of the NYSE, wiping out a total of $136.5 billion of its value. Needless to say, a redux attack now appears to be in order, most likely by the state-sponsored hacking group known as Anonymous who is very active on Twitter.

Twitter NYSE

1.2: Flash Crash Cyber-Attack

It now appears that the CIA in Switzerland will attempt to execute an attack on the New York Stock Exchange (NYSE) another way—most likely via a false-flag power failure. This particular notion as foreshadowed on April 17, 2015, when Bloomberg screens went dark worldwide. Four days later on April 21, 2015, it was reported that a futures trader was charged for manipulating the stock market which contributed to the 2010 “Flash Crash”. Given the 5-year delay in the banker’s indictment, it can be deduced that the patsy was only charged in order to foreshadow the “Flash Crash” just prior to another one transpiring in reality, most likely post-power failure.

nyse1

1.3: NYSE Cyber-Attack
The latest New York Stock Exchange (NYSE) cyber-terror plot appears to be a redux of two previously foiled terror plots as depicted in the March 20, 2014 Truther.org report entitled “Impending Wall Street Banking Cyber-Heist to Transfer Billions to Bitcoin”, and the April 15, 2014 Truther.org report entitled “Feds Planning High Frequency Trading Cyber-Attack via “Heartbleed” Bug”. In short, hackers will cause a “High Frequency Trading” sell-off (which they will short-sell), the profits of which will be deposited in untraceable Bitcoin accounts. In order to provide a motive for a Bitcoin-related cyber-terror attack, the IRS declared that Bitcoin was not an official currency on March 25, 2014. Roughly 3-months later on June 13, 2014, it was revealed that the FBI will auction off seized Bitcoins worth $18m on June 27, 2014, the impending date of the attack. In order to raise the profile of banks prior to a debilitating cyber-terror attack that will likely bankrupt millions of investors, Vice President Joe Biden stated on June 23, 2014 that “I don’t have a savings account”. Two days later on June 25, 2014, the U.S. Federal Reserve warned that banks face “tougher tests” ahead, an ominous sign that a so-called “test” (i.e., attack) is imminent. Although impossible to prove, it appears that Bitcoin was specifically created to be an untraceable depository for stolen funds from a Wall Street cyber-attack. In other words, the hackers play the role of Robin Hood by stealing from the rich (i.e., Wall Street) and giving to the poor (i.e., Bitcoin)—the only catch being that Robin Hood is invisible.

II. TOP CYBER SCAPEGOATS:

hackers-cyber-crime-anonymousv1

2.1: Anonymous Cyber-Hijack of U.S. Economy
Although an unprecedented cyber-terror attack on the U.S. economy could be blamed on China, the Guardians of Peace, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack, funneling the stolen money into allegedly untraceable Bitcoin accounts. Coincidentally, on October 2, 2014, it was revealed that an FBI informant admittedly organized Anonymous attacks on government websites in 30 countries, further confirming that the group known as Anonymous is in fact state-sponsored. The timely report was designed to set the precedent for an Anonymous attack on government-related websites such as the FED, NYSE, SEC, etc. An Anonymous-based cyber-attack will enable the progenitors of terror (i.e., the CIA) to steal billions if not trillions of dollars from the U.S. economy without a trace. Should a sovereign country be deemed responsible for the heist, defrauded investors worldwide would collectively demand compensation from that particular country, something the CIA does not want to deal with. In what appears to be pre-Wall Street cyber-attack logistics, it was revealed back on July 8, 2014, that Wall Street has now hired a former NSA chief to help create a “cyber war council”. Translation: Wall Street and the NSA are teaming up together to execute a Wall Street cyber-hijack which will likely disappear trillions of dollars, bankrupting the U.S. economy. In the wake of the attack, the NSA chief will likely be scapegoated for the attack.

2.2: Anonymous Stock Market Attack
In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely an alleged member of Anonymous.

China Chinese Hack Cyber II

2.3: Chinese Cyber Attack
Back on July 7, 2015, Truther.org published a report entitled “Swiss CIA Plotting Chinese-Based Hack & Cyber-Heist of Global Stock Markets”, warning of an impending cyber-attack on the New York Stock Exchange (NYSE). Less than 24-hours later on July 8, 2015, trading at the NYSE was inexplicably shut down for 4-hours. According to the CEO of the NYSE, the shutdown was “probably” due to a cyberattack. That same day, July 8, 2015, the state-sponsored hacking group known as Anonymous published a tweet on Twitter “predicting” the NYSE glitch. Since Twitter is run by the CIA they can pre-date tweets as was evidently the case. By blaming Anonymous, it took the focus off of China which Truther.org predicted would be scapegoated for the cyber-attack on the New York Stock Exchange.

2.4: Russian Cyber-Scapegoat
In the aftermath of unprecedented cyber-related terror attacks on Europe and/or the United States, the Swiss CIA may finger Russia. In order to create the narrative in the media that Russia is actively targeting America with cyber-related attacks, it was reported back on April 8, 2015, that Russia hacked the Obama White House. Roughly 2-weeks later on April 23, 2015, it was revealed that Russians hacked the Pentagon’s network, a fraudulent notion to be sure. Two days later on April 25, 2015, it was reported that Russian hackers read Obama’s unclassified emails. Roughly 3-weeks later on May 14, 2015, it was reported that Russian hackers are now targeting U.S. banks, an apparent preview of things to come. Less than 2-week later on May 27, 2015, it was reported that the IRS now believes that a recent cyberattack on its network originated in Russia. Needless to say, these reports, taken collectively, suggest that Russia will be scapegoated in the aftermath of an unprecedented cyber-terror attack targeting the U.S. financial system, leading to a new Cold War.

III. THE SET-UP:

reign-malware-1000x520

3.1: Regin Malware
In what appears to be pre-financial cyber-attack hardware, on November 23, 2014. CNN published a report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure has been hijacked by the Regin malware and therefore any type of cyber-related attack on America’s financial infrastructure is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.2: Federal Security Breaches
If reports are to be believed, the U.S. federal government is highly susceptible to cyber-attacks, making the likelihood of a major financial cyber-hijack all the more believable. For example, on November 4, 2014, it was reported that a cyber-attack on a federal security contractor wasn’t noticed for months. Therefore, if the FED, NYSE or SEC is hacked in 2014, it won’t be noticed days or even weeks. This in essence allows the CIA to stage a financial-related attack whenever they want without any forewarning. Six days later on November 10, 2014, it was reported that federal firewalls are struggling against the increasing number of cyber-attacks. The timely report was designed to give the U.S. government plausible deniability in the wake of a financial-related terror attacks that bankrupt the U.S. economy. Also on November 10, 2014, the U.S, Postal Service was reportedly hacked, resulting in employee and customer information being compromised. Needless to say, the incident was designed to set the precedent for a far worse cyber-attack on the U.S. federal government, most likely the FED or SEC.

Ukraine’s-Election-Commission-Denies-Cyber-Attack

3.3: Financial Cyber-Attacks Trending
A preview of financial related cyber-terror recently occurred on July 10, 2014, when it was reported that Norwegian banks suffered the largest-ever DDoS attack in their history, an act which the state-sponsored terror group known as Anonymous predictably took credit for. Because all 206 countries are under the command and control of the CIA, events tend to happen in other countries before transpire in America on a much larger scale. Roughly 2-weeks later on July 25, 2014, the European Central Bank was allegedly hacked and personal data stolen. Roughly a month later on August 27, 2014, it was revealed that the FBI is now investigating a cyber-attack on JPMorgan. Roughly 3-weeks later on September 17, 2014, members from Anonymous and an Occupy Wall Street group reportedly abolishes nearly $4 million in student loan debt on September 17, 2014, foreshadowing the notion of Anonymous vanishing millions into thin air. Roughly 3-weeks alter on October 3, 2014, the New York Times published a report entitled “Hackers’ Attack Cracked 10 Financial Firms in Major Assault”, further foreshadowing financial-related cyber-terror. Also on October 3, 2014, it was reported that the JP Morgan data breach affected 76 million households, a laughable notion considering that the population of the U.S. is only 300 million people. A few weeks later on October 20, 2014, U.S. officials warned 500 million financial records may have been hacked. The timely propaganda report was evidently published in order to show that financial-related cyber-terror is imminent just prior to an unprecedented attack on the U.S. financial system. Taken collectively, these timely reports have set the precedent for future bank-related cyber-terror attacks, most likely targeting the FED, NYSE, or SEC.

VI. BANKING DRILLS & WAR GAMES:

Cyber War China

4.1: Banking Cyber-Attack War Games
Back on January 16, 2015, it was revealed that a so-called “cyber-attack war games” will be staged by US and UK at a future and undisclosed date. War games have a history of going “live” which is why they are staged in the first place. The first war game will reportedly involve the Bank of England and commercial banks, targeting the City of London and Wall Street. These war games will be followed by “further exercises to test critical national infrastructure”. In other words, the entire financial system of the West will likely suffer a massive cyber-related terror attack.

4.2: Bank Terror Drills
In what appears to be cover drills for the controlled demolition of the U.S. economy, it was reported on October 10, 2014, that the U.S. and the UK will execute a “big bank collapse” simulation. According to reports, officials will “get together in a war room next week to see if they can cope with any possible fall-out when the next big bank topples over”. The banking collapse drill will reportedly involve Federal Reserve Chair Janet Yellen and Bank of England Governor Mark Carney, and be hosted by the U.S. Federal Deposit Insurance Corporation (FDIC). The drill will involve the hypothetical failure of U.S. banks, most likely the Federal Reserve. Needless to say, key term such as “collapse” and “topples over” are designed to foreshadow that a controlled demolition of the U.S. economy is indeed planned. Roughly 2-weeks late on October 26, 2014, it was reported that four in five Eurozone banks pass European Central Bank health test. Interestedly, the very next day, October 27, 2014, it was reported that 25 European Union banks failed a “stress test” exposing a $31billion shortfall. The bi-polar reporting was evidently designed to insinuate that banks are on the verge stressed to the point of collapse.

Major-US-Financial-Institutions-to-Take-Part-in-Quantum-Dawn-2-Cyber-Exercise

4.3: “Quantum Dawn II″ Terror Drill
Prior to a major cyber-terror attack on the New York Stock Exchange (NYSE), one would expect there to be some stock-market related terror drills to prepare Wall Street insiders for the attack. Coincidentally, on June 13th, 2013, it was reported that Wall Street executed “Quantum Dawn 2”, a cyber-terror war-game apparently meant to give insiders an opportunity to make financial moves before the market crashes—for good. According to the report, Cyber Strategies oversaw a terror exercise which included Citigroup, Bank of America, the Department of Homeland Security, the Treasury Department, the Federal Reserve, the Securities and Exchange Commission, as well as 40 other firms. The drill, which featured a hacker, possibly from China, operating from a fake trading platform, prompted a response in which the participants facilitated a conference call to “figure out what was going on”. In other words, the drill simulated a real-life scenario in which insider firms received the “heads up” about an impending cyber-attack and subsequently shared this information accordingly so that their bank accounts and those of their clients would not be affected. The same sort of thing occurred just prior to 9/11 when “put options” or bets were taken out on United Airlines and American Airlines, the two airline companies involved in the attacks. According to the “9/11 Commission Report”, “some unusual trading did in fact occur”, however, it claimed that, “each such trade proved to have an innocuous explanation”.

4.4: “Quantum Dawn II” Fallout
In the October 23, 2013, Fox Business report entitled “‘White Hat’ Hackers Expose Flaws of U.S. Stock Market”, the details of the “Quantum Dawn 2”  cyber-attack exercise were revealed. According to the report, ethical “white hat” hackers intentionally “looking to expose the cyber vulnerabilities of U.S. equity markets”, were able to directly impact market performance by “forcing a mock market close”. According to the report, more than 50 entities and 500 people in the financial services sector participated in the cyber-attack which was executed by the Securities Industry and Financial Markets Association (SIFMA) on July 18, 2013. So called “ethical hackers” were told to give everything they had to try and cripple the U.S. stock market during the 6-hour exercise. “Quantum Dawn 2 demonstrated the industry’s resiliency when faced with serious cyber-attacks that aimed to steal money, crash systems and disrupt equity market trading,” SIFMA CEO Judd Gregg stated. According to Cedric Leighton, a former U.S. intelligence officer, “The more realistic the exercise the better prepared they’ll be if and when attacks from a cyber standpoint occur”.

V. ATTACK AFTERMATH:

5.1: DHS Banking Continuity
In the wake of a major U.S. bank or stock market, a global financial panic in respect to the U.S. dollar will likely ensure. According to a December 10, 2004, CRS Report for Congress entitled “Homeland Security: Banking and Financial: Infrastructure Continuity”, bank terror and financial collapse have been planned for accordingly. According to the report, “H.R. 2043 sought to address bank risks under terrorism” and the Terrorism Risk Insurance Act of 2002 (TRIA) “provides a federal backstop for insurers willing to provide terrorism insurance”, ultimately protecting insurance banks against “catastrophic payouts in case of terrorist attacks”.  In other words, if and when a bank related terror attacks occur resulting in financial panic, private banks will not have to foot the bill for their losses because the U.S. government has assumed all the risk and liability. This convenient set-up essentially guarantees that the U.S. government, not the banks, will go bankrupt in the aftermath of bank related terror attacks.

US-court-cyber-attack

5.2: Banking “Contagion Effect”
In the aftermath of U.S. bank failures (a bi-product of an irreversible U.S. stock market crash), other banks will begin to panic, setting off a chain reaction of banking collapses around the world. The aforementioned CRS Report for Congress found that when one bank goes, the rest will follow:  “Financial institutions face two categories of emergencies that could impair their functioning. The first is directly financial: danger of a sudden drop in the value of financial assets, whether originating domestically or elsewhere in the world, such that a global financial crisis might follow. The second is operational: failure of physical support structures that underlie the financial system. Either could disrupt the nation’s ability to supply goods and services and alter the behavior of individuals in fear of the disruption (or fear of greater disruption). They could reduce the pace of economic activity, or at an extreme, cause an actual contraction of economic activity”. The report went on to state that “Collapse of one prominent entity could evoke a contagion effect, in which sound financial institutions become viewed as weak — today’s equivalents of a bank run, in which panicked customers withdraw funds from many entities, causing others to fail as well”.

VI. INFRASTRUCTURE CYBER-ATTACK:

cyber hijack

6.1: Anonymous Airline Cyber-Hijack
The notion of airliner cyber-hijack was first raised by the Daily Mail back on March 16, 2014, when they published a report entitled “Is Missing Malaysian Jet the World’s First Cyber Hijack?”. The report cited an anti-terror expert who said that a plane’s altitude, speed and direction could be hacked by ‘codes’ and that planes could be landed using remote control. Roughly 8-months later on November 4, 2014, the software for a state-sponsored cyber-hijack of commercial airliners was evidently touted by Russia Today in a report entitled “Could Hackers Cyber-Hijack a Plane? UK Scientists Develop Tech to Fight Malware”. The software was likely built with a backdoor which specifically enables commercial airliners to be cyber-hijacked. In what appears to be pre-cyber-hijack attack propaganda, the Government Accountability Officer reported on April 14, 2015, that newer aircraft are vulnerable to hacking. A day later on April 15, 2015, Russia Today published a report entitled “Hijack Hack: Modern Planes Vulnerable to Remote Midair Takeover” which was designed to further sell the notion that airliners can now be hijacked by hackers. Roughly a week later on April 26, 2015, it was reported that an iPad glitch grounded two dozen American Airlines flights in America. The grounding was likely executed by the CIA in order to rig the planes with an electronic device and/or explosives which can be activated at a later date in order to bring the fleet of planes down simultaneously in the first-ever cyber-hijacking. Less than 2-weeks later on May 9, 2015, it was reported that an A400M Airbus cargo plane crashed near the Seville airport in Spain. According to follow-up report dated May 20, 2015, the Airbus A400M crash was linked to faulty software that had been installed. The Airbus A400M was evidently crashed by the CIA in order to set the precedent for a software-related airliner disaster. Post cyber-hijack attack, the May 2015 crash of the Airbus A400M will likely be touted as the first-ever cyber-hijack. Less than a week later on May 15, 2015, Wired magazine published a report entitled “Feds Say That Banned Researcher Commandeered a Plane”, further selling the notion that hackers could cyber-hijack commercial airliner just prior to it actually transpiring in reality. Three days later on May 18, 2015, Fox News published a report entitled “FBI Affidavit Claims Security Expert Admitted to Briefly Hacking Flight Controls”, confirming, albeit in a de facto manner, that the future cyber-hijack of commercial airliners will be executed by so-called “security experts” at the behest of the Swiss CIA. In order to associate Boeing (and thereby airplanes) with hackers just prior to an unprecedented cyber-attack on airliners, the Washington Post published a report on August 4, 2015, entitled “Hacked E-Mails: Boeing Wants its Drones to Hack Computers from the Sky”. A day later on August 5, 2015, Russia Today published a report entitled “‘Funtenna’ Uses Sound Waves, Radio to Hack Internet of Things”. Needless to say, airports and airliners are considered to be part of the so-called “Internet of Things”, a term used to describe real-world objects which are linked to the internet. The notion of a cyber-related attack on air travel was witnessed two days later on August 7, 2015, when Chinese hackers reportedly attacked the U.S. travel industry. The incident was likely staged or fabricated in order to sell the notion that China will target U.S. airliners in the future. Lastly, three days later on August 10, 2015, Yahoo News published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”, further associating aerial-related machines with hacking just prior to an unprecedented cyber-hijack attack on commercial airliners. Lastly, in what appears to be pre-airplane and/or airport cyber-hijack attack programing, it was reported on October 28, 2015, that the runaway military blimp landed in Pennsylvania. Needless to say, post cyber-attack on hundreds of airliners and/or airports, there will be scores of so-called runaway planes which subsequently are forced to crash-land around the world.

6.2: Airline “Glitches” Trending
Prior to a high-profile cyber-related terror attack on the airline industry, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, airline-related glitches and outages are now at an all-time high which suggests that a state-sponsored cyber-terror attack on the airline inducts

AIR TRAVEL GLITCH TIMELINE:

1. August 15, 2015: Computer outage at FAA center in D.C. delays flights in Northeast
2. August 15, 2015: Computer glitch grounds flights in New York, DC
3. September 17, 2015: American Airlines resolves issue that led to grounded flights at several hubs
4. October 12, 2015: Southwest says it has fixed glitch, expects flights to return to normal
5. October 15, 2015: Terror watch list program glitch blamed for flight delays at major airports
6. October 15, 2015: Customs computers crash at airports across US

[Does not purport to be a complete list of airline/airport-related glitches]

euroairport

6.3: Anonymous Airport Cyber-Attack
Based on breaking news and events, it appears that the CIA is plotting an airport-related cyber-attack that will bring the world busiest airports to a screeching halt, costing billions in damages. However, in the event that air traffic control loses contact with thousands of planes, chaos will ensue, possibly leading to numerous airplane-related crashes. In order to foreshadow the loss of human control over thousands of aircraft, the AP published a report back on September 14, 2015, entitled “Now Arriving: Airport Control Towers with No Humans Inside”. Roughly a month later on October 13, 2015, the AP published another report entitled “Union: Chronic Shortage of Air Traffic Controllers a Crisis”, foreshadowing that an air traffic control-related crisis is imminent. In what appears to be a beta-test for the impending air traffic control-related blackout via cyber-attack, Fox News published a report on October 15, 2015, entitled “Terror Watch List Program Glitch Blamed for Flight Delays at Major Airports”. The incident, which reportedly affected customs computers, was evidently staged in order to associate terrorism with airport computer malfunctions and flight delays just prior to a staged cyber-attack on airports across the world. Lastly, in what appears to be pre-airplane and/or airport cyber-hijack attack programing, it was reported on October 28, 2015, that a runaway U.S. military blimp landed in Pennsylvania. Needless to say, post cyber-attack, there will be scores of so-called runaway planes which subsequently are forced to crash-land around the world.

VII. INFRASTRUCTURE ATTACK:



7.1: Nuclear Reactor Attack
The notion that terrorists want to attack nuclear reactors was recently witnessed back on July 9, 2014, when Hamas attempted to attack the Israeli nuclear reactor in Dimona. Two days later on July 11, 2014, a report entitled “Response to ‘Attack’ on Nuclear Reactor Is Praised” was published in response to U.S. government terror drills on nuclear reactors. According to the timely report, “Other mock attacks have been conducted at a handful of the nation’s 62 nuclear power plants”. Evidently, the U.S. federal government is perfecting their respective nuclear terror attack scenarios. Exactly when and where the attacks will take place is not known, but practice makes perfect. Back on August 20, 2014, it was revealed that hackers attacked Nuclear Regulatory Commission 3 times in 3 years, a report designed to show that cyber-terrorists are actively targeting American nuclear reactors. Four days later on August 24, 2014, an Israeli spy drone was shot downed near Iran’s Natanz nuclear plant, foreshadowing the notion of aerial attack on nuclear reactors. Roughly 7-months later on March 17, 2015, it was reported that South Korea is blaming North Korea for a nuclear reactor cyberattack, ultimately setting the precedent for a North Korean cyber-attack on nuclear reactors within the United States. That same day, March 17, 2015, it was also reported that a South African who previously attacked a nuclear power plant is now a hero to his government and fellow citizens. The timely report was evidently published in order to highlight nuclear reactor terror attacks just prior to another transpiring in reality. Lastly, a day later on March 18, 2015, the BBC published a report entitled “Chernobyl: Containing the World’s Worst Nuclear Accident”. The timely propaganda report was evidently published in order to acclimate the public for another nuclear reactor-related “accident”, possibly the worst in history. Lastly, in order to associate hackers with nuclear terrorism just prior to an unprecedented cyber-attack on nuclear reactors, the Express published a report back on October 25, 2015, entitled “Cyber Hackers are Greater Threat to UK Security than Nuclear Weapons”. Needless to say, these reports, taken collective, suggest that a state-sponsored cyber-attack on nuclear reactors is imminent.

NSAutah

7.2: Anonymous NSA Attack
An Anonymous cyber-attack, should it happen, will most likely target the NSA’s new Utah Data Center which will likely result in the collapse, malfunction and/or explosion of U.S.-related infrastructure on the west coast of America (e.g., the electoral grid, dams, oil, gas, nuclear, water and sewer facilities). Known as the “Utah Data Center“, the NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, was completed in September of 2013. The $1.5B data center is located at Camp Williams, Utah, just 25 miles (40 km) south of Salt Lake City.

Oil Gas Hack Cyber

7.3: Oil & Gas Cyber-Attack
As originally depicted in the August 16, 2015, Truther.org report entitled “Obama Plotting Environmental Disasters & Global Oil Crisis via Hacks on US Gas Stations, Oil Refineries & Oil Rigs”, it appears that the Obama administration (at the behest of the CIA in Switzerland) is preparing to execute a wave of cyber-related terror attacks on U.S. oil/gas-related facilities, namely their Automated Tank Gauges (see below). Needless to say, a hack on hundreds of U.S. oil/gas-related facilities would cause an environmental disaster as well as a global oil-crisis that would likely lead to war in the Middle East. In the aftermath of said attacks, the state-sponsored terror group ISIS or rouge states like Iran, Saudi Arabia or Syria would likely be blamed. The notion of a gas-related hack was witnessed back on May 11, 2011, when hackers tapped a California gas pump, making off with off with 528 gallons. Roughly 15 months later in 2012, the Saudi Aramco Hack (see below) was executed, crippling over 30,000 oil/gas-related workstations. Although a redux of the aforementioned oil/gas-related hacks is indeed possible, it’s far more likely that the CIA has more nefarious intentions. Although only conjecture, it’s highly likely that the CIA will execute cyber-related attacks on U.S. oil/gas-related entities such as gas stations, oil refineries and oil rigs. In the aftermath of said oil/gas-related cyber-attacks, hardware and software present at said entities will likely malfunction, causing oil and gas-related explosions and/or spills that could result in potentially hundreds of environmental disasters across America. In order to psychologically prepare the masses for a wave of oil/gas-related cyber-attacks that spawn an international oil crisis and subsequent wars in the Middle East, it was reported on January 23, 2015, that thousands of U.S. gas stations are vulnerable to cyberattacks. Roughly 6-months later on August 5, 2015, CNN published a report entitled “The Inside Story of The Biggest Hack in History”, rehashing the aforementioned Saudi Aramco Hack that crippled over 30,000 oil/gas-related stations just prior to a redux attack transpiring in reality. That same day, August 5, 2015, the EPA purposely caused the 2015 Gold King Mine Waste Water Spill near Silverton, Colorado. According to reports, a total of 3,000,000 U.S. gallons (11 ML) of polluted mine waste water including cadmium, lead, and arsenic were released. The spill was admittedly executed by EPA personal (at the behest of the CIA in Switzerland) in order to psychologically prepare Americans for massive oil/gas-related spills in the aftermath of a state-sponsored cyber-related attack on U.S. oil/gas-related facilities. Two days later on August 7, 2015, it was reported that hackers are now attacking U.S. gas stations. Needless to say, the propaganda report was spawned by the CIA in order to further sell the notion that America’s oil/gas-related infrastructure is now being targeted. This very notion was confirmed less than a week later on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. The headline confirms, albeit in a de facto manner, that an oil crisis will follow the impending wave of state-sponsored cyber-attacks. In what appears to be an ominous sign that oil/gas-related terror is imminent, it was reported on August 14, 2015, that a series of explosions rocked a Texas oil field chemical supplier. In the event of an attack, Galveston Bay, Texas (Port of Houston , Port of Texas City & Port of Galveston) will likely be destroyed. Lastly, in order to provide a timely motive for Islamic/Middle Eastern cyber-related terror attacks on America’s oil/gas-related infrastructure, MarketWatch published a report on August 15, 2015, entitled “Why Gas Prices are Rising as Oil Falls to 6-year Lows”. Needless to say, post oil/gas-related cyber-attacks, oil prices will skyrocket.

Oil Gas Terror

7.4: Cyber-Attack on Automated Tank Gauges (ATGs)
Back on January 22, 2015, a report entitled “The Internet of Gas Station Tank Gauges”, was published, foreshadowing exactly what the CIA has planned in respect to an oil/gas.-related cyber-terror attack. Needless to say, it’s not pretty. The report states that “Automated Tank Gauges (ATGs) are used to monitor fuel tank inventory levels, track deliveries, raise alarms that indicate problems with the tank or gauge (such as a fuel spill), and to perform leak tests in accordance with environmental regulatory compliance”. Because ATGs are used by nearly every fueling station in the U.S. and tens of thousands of systems internationally, a hack on them could theoretically cripple the oil and gas industry. In all likelihood, ATGs were likely put in place specifically so that a cyber-related attack could commence at a future date. The report goes on to state that “Approximately 5,800 ATGs were found to be exposed to the internet without a password. Over 5,300 of these ATGs are located in the United States, which works out to about 3 percent of the approximately 150,000 fueling stations in the country. An attacker with access to the serial port interface of an ATG may be able to shut down the station by spoofing the reported fuel level, generating false alarms, and locking the monitoring service out of the system. Tank gauge malfunctions are considered a serious issue due to the regulatory and safety issues that may apply”. In other words, a state-sponsored hacker could single-handedly decimate the oil industry which is evidently why the ATGs were installed in the first place.

hackers-cyber-crime-anonymousv1

7.5: Anonymous Gas Station Hack
In order to sell the notion that gas pumps and gas stations are vulnerable to cyber-terror attacks just prior to their fruition in reality, a rash of reports were published back in February of 2012 which were designed to sell the notion that the state-sponsored hacking group known as Anonymous is targeting America’s oil/-related infrastructure. This narrative was first identified on February 10, 2015, when a report entitled “Is Anonymous Attacking Internet Exposed Gas Pump Monitoring Systems in the US?”, was published. Although Anonymous could be scapegoated, a Middle Eastern country is far more likely. A day later on February 11, 2015, it was reported that a U.S. gas station pump was hacked with an ‘Anonymous’ tagline. The incident was likely executed at the behest of the CIA in order to set the precedent for a future gas station-related cyber-attack. That same day, February 11, 2015, the Register published a report entitled “Anonymous Hacked Gas Station – Could Cause Fuel Shortages”, further confirming the notion that the CIA is plotting an oil/gas-related cyber-attack in order to cause an oil crisis in America.

FLASHBACK: Saudi Aramco Hack
The notion that the CIA is plotting an oil/gas-related cyber-terror attack was witnessed back on August 15, 2012, during the Saudi Aramco Hack when the state-sponsored hacking group entitled “Cutting Sword of Justice” allegedly attacked 30,000 Saudi Aramco workstations, virtually crippling the company. According to reports, the Saudi state-owned oil company’s computers, unleashed a computer virus that “erased data on three-quarters of Aramco’s corporate PCs (documents, spreadsheets, e-mails, files), replacing all of it with an image of a burning American flag”. Predictably, U.S. intelligence officials stated that the hackers were from Iran, although they offered no specific evidence to support the claim.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Comments are closed.