Archive for the ‘China’ Category

May Pac Nuke Attack Las Vegas

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, am currently in the process of applying for political asylum in Switzerland, which is coincidentally home to the CIA, none of the terror plots or so-called “natural disasters” I expose come to fruition. In short, the Swiss CIA does not want to afford me any more attention or credibility than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. That being said, there is a wealth of evidence, namely dead Special Forces (e.g., the Terrorgate Scandal), which tend to appear once a respective terror plot is foiled. In order to protect themselves against Truther.org exposing a terror plot which has gone beyond the point of no return (e.g., man-made asteroid attack), the CIA has staged electrical blackouts across Europe (e.g., 2015 Amsterdam Blackout, 2015 Turkey Blackout, etc.) which have set the precedent for a future blackout in Switzerland. Said blackout will only be executed once an irreversible terror plot is exposed by Truther.org at the very last minute. The impending blackout will serve as the necessary cover for a direct attack on Truther.org by the CIA in Switzerland which was exposed globally for the first time in history on March 31, 2015.

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
May 1, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears the CIA in Switzerland will attempt to stage a Chinese surprise invasion and/or nuclear attack during the super-hyped Floyd Mayweather, Jr. vs. Manny Pacquiao boxing match in Las Vegas, Nevada on May 2, 2015.

Due to the 30 to 60-second nature of a nuclear explosion, live sporting events such as the Super Bowl, World Cup or Olympics are the desired targets mainly because they have a sitting audience of hundreds of millions. Evidently, the Mayweather vs. Pacquiao fight also qualifies as a bona fide nuclear terror target.

The impending Chinese attack will most likely involve one or more of the following: a) a cyber-attack on the U.S. military; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Hawaii or mainland United States.

That being said, the most likely Chinese attack scenario is a drone-related attack on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, etc.) followed by a full-scale nuclear attack on Las Vegas and/or Los Angeles.

As reported ad nauseam, the CIA in Switzerland desperately trying to trigger World War III between the United States and China. To date, at least 10 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

In the event that a Chinese nuclear attack is launched against the United States, it will most likely emanate form a Chinese submarine in the Pacific Ocean. Coincidentally, the notion of a rogue submarine lurking off the coast was witnessed on April 28, 2015, when Finland allegedly fired warning shots at a “foreign submarine” near Helsinki.

In order to foreshadow a Chinese invasion just prior to the May 2, 2015, surprise attack, it was reported on April 29, 2015, that mysterious lights were spotted of the southern coast of San Diego. The lights were naturally red and white, the colors of China.

Lastly, on April 27, 2015, it was reported that Mexico will be able to see the Mayweather vs. Pacquiao fight for free. Evidently, the CIA in Switzerland wants to ensure that hundreds of millions of people in Mexico witness the nuclear attacks live on television just prior to the invasion of Mexico by people fleeing the United States.

Nuclear Terror Trending
In what appears to be pre-California and/or Las Vegas nuclear terror attack propaganda, it was reported on April 17, 2015, that a World War II carrier sunk was sunk off the California coast during nuclear attack tests. Less than 2-weeks later on April 28, 2015, a forest fire was reportedly heading towards the Chernobyl nuclear plant, raising the notion of both fire and radioactive contamination just prior to the attack. That same day, April 28, 2015, the CIA in Switzerland called for a nuclear-free world just prior to orchestrating a Chinese nuclear attack upon the United States. Lastly, on April 30, 2015, the former U.S. commander inexplicably called for nuclear missiles to be taken off high alert. These headlines, taken collectively, suggest that an unprecedented nuclear event is imminent.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

Top Chinese Attack Locations
Although a Pearl Harbor-like surprise attack against the United Stated by China could theoretically transpire in any American city or U.S. military base, the following seven location are the most likely due to their name recognition and close proximity to the Pacific Ocean.

Potential Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Chinese EMP Nuke Drone Attack

Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

I. CHINESE CYBER-ATTACK:

u-s-government-warned-of-9-11-like-cyber-attack-67071d7042

1.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

1.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

1.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

II: CYBER-HIJACK DRONE ATTACK:

2.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

drone

2.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

2.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

2.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

2.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

2.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

III. CHINESE NUCLEAR ATTACK:

3.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

Live TV Nuke

3.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

IV. CHINESE EMP ATTACK:

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

chinainvadesamerica

Download & Forward PDF

David Chase Taylor
April 14, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA in Switzerland has ordered the Chinese government to execute a surprise attack upon the United States, most likely in Hawaii and/or California.

The impending Chinese attack will likely involve on or more of the following terror scenarios: a) a cyber-attack on U.S. military; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Hawaii or mainland United States.

Exactly which combination of the aforementioned scenarios will be implemented is not known, but it will most likely involve a surprise Chinese attack on Naval Station Pearl Harbor followed by the full-scale Chinese invasion of Hawaii. Once China has the full attention of the world, they will likely execute an unprecedented TV-related cyber-attack which will show the world nuclear bombs detonating in Los Angeles.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads.

As reported ad nausea, the Swiss CIA is actively attempting to trigger World War III between the U.S. and China. To date, at least 9 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of these various Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the aforementioned war plots which were ultimately foiled.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles. 

Top Chinese Attack Locations
Although a Pearl Harbor-like surprise attack against the United Stated by China could theoretically transpire in any American city or U.S. military base, the following seven location are the most likely due to their name recognition and close proximity to the Pacific Ocean.

Potential Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Chinese EMP Nuke Drone Attack

Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

I. CHINESE CYBER-ATTACK:

u-s-government-warned-of-9-11-like-cyber-attack-67071d7042

1.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

1.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

1.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

II: CYBER-HIJACK DRONE ATTACK:

2.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

drone

2.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

2.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

2.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

2.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

2.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

III. CHINESE NUCLEAR ATTACK:

3.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

Live TV Nuke

3.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

IV. CHINESE EMP ATTACK:

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

????????????????????????????????????????????????????????????????????????????????

Download & Forward PDF

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
April 14, 2015
Truther.org

SWITZERLAND, Zurich — Unable to stage a cyber-related attack on New York Stock Exchange during the month of April 2015, it now appears that Chinese government (at the behest of the CIA in Switzerland) will attempt to stage a cyber-related attack on the Nikkei 225, Japan’s stock exchange in Tokyo.

In order to highlight the Nikkei 225, as well as inflate it so an unprecedented cyber-related attack and subsequent crash are even more dramatic, it was reported on April 10, 2015, that the Nikkei hits the 20,000 level for first time in 15 years.

Back on March 15, 2015, it was revealed that authorities are now closing in on the hackers who stole data from JPMorgan Chase. In the aftermath of a Nikkei 225-related cyber-heist, the aforementioned hackers will likely be linked to China.

In order to sell the notion that China is capable of hacking Japan’s stock exchange, it was reported on March 13, 2015, that China has hacked “every major corporation” in U.S. A few weeks later on March 31, 2015, it was reported that evidence now links China to GitHub cyber-attack.

In order to provide a timely motive for a Chinese attack on Japan, it was reported on April 10, 2015, that China has rejected Obama’s criticism in its dispute with Japan over islands in the South China Sea. When China will take matters into their own hands and attack Japan is only a matter of time.

Financial Cyber-Attacks Trending
A preview of financial related cyber-terror recently occurred on July 10, 2014, when it was reported that Norwegian banks suffered the largest-ever DDoS attack in their history, an act which the state-sponsored terror group known as Anonymous predictably took credit for. Roughly 2-weeks later on July 25, 2014, the European Central Bank was allegedly hacked and personal data stolen. Roughly a month later on August 27, 2014, it was revealed that the FBI is now investigating a cyber-attack on JPMorgan. Roughly 3-weeks later on September 17, 2014, members from Anonymous and an Occupy Wall Street group reportedly abolishes nearly $4 million in student loan debt on September 17, 2014, foreshadowing the notion of Anonymous vanishing millions into thin air. Roughly 3-weeks alter on October 3, 2014, the New York Times published a report entitled “Hackers’ Attack Cracked 10 Financial Firms in Major Assault”, further foreshadowing financial-related cyber-terror. Also on October 3, 2014, it was reported that the JP Morgan data breach affected 76 million households, a laughable notion considering that the population of the U.S. is only 300 million people. A few weeks later on October 20, 2014, U.S. officials warned 500 million financial records may have been hacked. The timely propaganda report was evidently published in order to show that financial-related cyber-terror is imminent just prior to an unprecedented attack on the U.S. financial system.

reign-malware-1000x520

Regin Malware

In what may be Chinese cyber-attack hardware, CNN published a report on November 23, 2014, entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure has been hijacked by the Regin malware and therefore any type of cyber-related attack on Japan’s financial infrastructure is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Chinese Drone Attack

Download & Forward PDF

David Chase Taylor
March 20, 2015
Truther.org

SWITZERLAND, Zurich — As originally depicted in the June 30, 2014, Truther.org report entitled “China Plans to Cyber-Hijack U.S. Drones for Attack on America”, the CIA in Switzerland (which is in command and control of all 206 counties) is plotting a surprise drone attack on the U.S., most likely using U.S. military drones which will be said were hijacked by the Chinese government.

It is imperative to note that once a full-scale drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will likely become the norm. This futuristic drone war scenario essentially allows the CIA to attack whomever and whatever they want—whenever they want.

The unprecedented Chinese surprise attack depicted herein could come in any combination of the following: a) cyber-attack; b) conventional nuclear attack; c) cyber-hijack and nuclear attack; d) EMP attack; and/or e) an aerial attack on the USS Ranger (CV-61) which is currently near San Diego.

The notion of a “ghost drone” (a drone which is no longer under the control of its original and intended operator) was ominously foreshadowed a CCTV report from March 10, 2015, entitled “Chinese Company Introduces Ghost Drone to U.S. Market”.

Roughly a week later on March 18, 2015, the notion that a cataclysmic shift in drone warfare was highlighted by the Wall Street Journal which published a shocking report entitled “The Coming Revolution of Drone Warfare”. According to the timely report, China is “developing lethal drone technologies”.

In order to sell the notion that China is capable of hacking the U.S. government, and thereby their drones, it was reported on March 13, 2015, that China has hacked “every major corporation” in U.S. The timely propaganda report was evidently published in order to program the American public that an unprecedented Chinese cyber-related attack is imminent.

The notion that the CIA is actively trying to trigger World War III between the U.S. and China has been exposed ad nauseam by Truther.org. To date, at least 8 different of Chinese “surprise” attack plots have been identified and exposed, the cyber-hijack of drones being the latest and most repetitive one.

In the wake of these various Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots.

Top Chinese Attack Locations
Although a Pearl Harbor-like surprise attack against the United Stated by China could theoretically transpire in any American city or U.S. military base, the following seven location are the most likely due to their name recognition and close proximity to the Pacific Ocean.

Potential Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Chinese EMP Nuke Drone Attack

Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

I. CHINESE CYBER-ATTACK:

u-s-government-warned-of-9-11-like-cyber-attack-67071d7042

1.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

1.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

1.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

II: CYBER-HIJACK DRONE ATTACK:

2.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

drone

2.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

2.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

2.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

2.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

2.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

III. CHINESE NUCLEAR ATTACK:

3.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

Live TV Nuke

3.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

IV. CHINESE EMP ATTACK:

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

V. CHINESE ATTACK ON USS RANGER:

635568588200921455-Ranger

5.1: Chinese Carrier Attack
In what appears to pre-Chinese aircraft carrier attack propaganda for an attack on the USS Ranger (CV-61) which is currently near San Diego, The Blaze published a report back on December 24, 2014, entitled “If China Attacks, This Is the Ship Taiwan Will Use to Sink Chinese Aircraft Carriers”. The headline consummated the terms “China”, “Attack”, and “Aircraft Carrier”, foreshadowing the attack depicted herein. In the event that the USS Ranger (CV-61) is attacked by China, a nuclear attack will likely follow via a nuclear missile launched by a Chinese submarine. Coincidentally, back on December 9, 2014, the International Business Times published a report entitled “Long-Range Nuclear Missiles Aboard China’s Stealth Submarines Can Reach US, Western Pacific And Beyond”, foreshadowing a West Coast nuclear attack by China. To date, at least 7 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, resulting in the deaths of over 60 Chinese officials who suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots. Based on previous ship-related false-flag terror plots exposed by Truther.org (e.g., the USS Bataan Terror Plot, the USS Mesa Verde Terror Plot, the USS George H. W. Bush Terror Plot, the USS Harry S. Truman Terror Plot, etc.), it’s highly likely that the USS Ranger will suffer a false-flag terror attack that will most likely lead to nuclear war with China.

VI: CHINESE ATTACK ON CALIFORNIA:

6.1: Chinese Attack on California
In order to make China’s drone attack on San Francisco be more explosive in nature, the CIA ordered three former U.S. Navy fleet oilers to be moved to Mare Island, just outside San Francisco Bay. Although the USS Hassayampa, the USS Kawishiwi, and the USS Ponchatoula were allegedly moved to the island for “cleaning”, it’s highly likely that they were actually filled with gasoline and/or explosives. That way, when they are struck with a drone missile, a massive explosion will erupt, creating a made-for-TV moment reminiscent of the December 7, 1941 Japanese attack on Pearl Harbor. California also has two nuclear reactors that may come under Chinese drone attack: The Diablo Canyon Power Plant located in San Luis Obispo County (just 231 miles from San Francisco), and the San Onofre Nuclear Generating Station in San Diego County. In the event that China is able to hijack U.S. drones, one or more of these nuclear reactors may be attacked, causing a Fukushima-like disaster in America. Interestingly, a similar nuclear reactor disaster if featured in the recent Hollywood propaganda film entitled “Godzilla” (2014), which also features an attack on San Francisco by an Asian-based monster.

Kaiju_Attack_SF_Aftermath_01

6.2: Golden Gate Bridge Attack
To make a Chinese attack on the U.S. even more psychologically terrorizing, a well-known landmark such as the Golden Gate Bridge in San Francisco must be destroyed in order to serve as life-long reminder of that horrific day (e.g., Twin Towers on 9/11). Back on February 23, 2012, it was reported that the Golden Gate Bridge will undergo a renovation project that will “take years to complete”. According to reports, the project involves the repainting of the two main suspension cables which are responsible for holding the bridge in place. Whether the lengthy “renovation” project has undermined the structural integrity of the bridge is not known, but the timely construction project may have provided the necessary cover for the installation of demolition explosives in and around the Golden Gate Bridge. Said explosives could be detonated at a later date via remote control in order to give the appearance of a successful Chinese attack on the bridge using drone missiles. In other words, the bridge would be demolished with shaped explosives while the government and media publicly blame China.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

 

635568588200921455-Ranger

Download & Forward PDF

David Chase Taylor
March 1, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears the CIA in Switzerland may stage an surprise Pearl Harbor-like attack on the USS Ranger (CV-61) which is slated to leave Bremerton, Washington the first week of March 2015. Any attack on the USS Ranger in the Pacific Ocean will predictably be scapegoated onto China or North Korea.

Based on prior ship-related false-flag terror plots exposed by Truther.org (e.g., the USS Bataan Terror Plot, the USS Mesa Verde Terror Plot, the USS George H. W. Bush Terror Plot, the USS Harry S. Truman Terror Plot, etc.), it’s highly likely that the USS Ranger (CV-61) will suffer a false-flag terror attack that will lead to war.

The notion of a Chinese attack on the United States was just reported on February 24, 2015, when fireballs were spotted over western America after a Chinese rocket burned up in space. The timely explosion was evidently designed to show that China is actively in violation of U.S. airspace just prior to a surprise attack on the USS Ranger (CV-61).

The notion of an attack on a U.S. aircraft carrier was ominously foreshadowed three days later on February 27, 2015, when Iran attacked a mock U.S. carrier during their latest war games. Although an Iranian attack on the USS Ranger (CV-61) is theoretically possible, a naval attack by China or North Korea is far more likely.

FLASHBACK: USS Ranger Departure Postponed
Back on December 24, 2014, it was reported that the USS Ranger (CV-61) would embark on its final voyage around South America from Bremerton, Washington to the International Shipbreaking’s facility in Brownsville, Texas. Although the decommissioned aircraft carrier was slated to leave Washington in “early 2015”, its departure was evidently postponed due to a timely Truther.org report on December 31, 2014, entitled “CIA Plotting False-Flag Attacks on USS Ranger and USNS Invincible”. In the wake this Truther.org report, the USS Ranger (CV-61)’s departure from Washington will likely once again be postponed so that a Chinese or North Korean attack can commence at a future date.

Chinese Aircraft Carrier Attack
In what appears to pre-Chinese aircraft carrier attack propaganda, The Blaze published a report on December 24, 2014, entitled “If China Attacks, This Is the Ship Taiwan Will Use to Sink Chinese Aircraft Carriers”. The headline consummated the terms “China”, “Attack”, and “Aircraft Carrier”, foreshadowing the impending attack depicted herein. In the event that the USS Ranger (CV-61) is attacked by China, a nuclear attack will likely follow via a missiles launched from a Chinese submarine. Back on December 9, 2014, the International Business Times published a report entitled “Long-Range Nuclear Missiles Aboard China’s Stealth Submarines Can Reach US, Western Pacific And Beyond”, foreshadowing a nuclear attack by China on the West Coast of America. To date, at least 7 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, resulting in the deaths of over 60 Chinese officials who suddenly died due to unnatural causes. Although impossible to confirm, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCTcustomLogo.gif
truther-rss

Arizona-Super-Bowl-2015

Download & Forward PDF

David Chase Taylor
February 1, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA in Switzerland) will attempt to stage a wave of unprecedented terror attacks in the United States on February 1, 2015, the day of Super Bowl XLIX.

Super Bowl XLIX, which features the New England Patriots versus the Seattle Seahawks, will be held at University of Phoenix Stadium in Glendale, Arizona. The football game, which will be aired live on NBC, will likely be the highest rated television show of all-time, making it a coveted state-sponsored terror target.

Top February 1, 2015 Terror Plots:

A. Live Chinese or Islamic Nuclear Terror Attacks (New York, Washington, DC, West Coast)
B. 9/11-Style Attacks (Arizona, Chicago, New York, Washington, DC)
C. Cyber-Hijack of Super Bowl XLIX Telecast (Nuke Attacks, Chinese Invasion, Porn)
D. Surprise Chinese Attack (West Coast)
E. Obama Coup D’état (Washington, DC)

Exactly which terror plots are now in play for February 1, 2015, and the Super Bowl XLIX are not known, but they will likely include a redux of the following: one or more live Chinese or Islamic nuclear terror attacks, live 9/11-sytle attacks (possibly via Flight MH370), a cyber-hijack of the Super Bowl XLIX telecast on NBC, a surprise Chinese attack/invasion of America, and/or a staged coup d’état of the Obama White House or U.S. Capitol Building.

Attacking the NFL has been the primary focus of the Obama administration and the CIA in Switzerland who have been caught red-handed twice (i.e., the 2011 Super Bowl Nuclear Terror Plot and 2014 Super Bowl Nuclear Terror Plot) trying to execute a nuclear terror attack on the Super Bowl. Therefore, the notion that the CIA will try to terrorize the Super Bowl this year is a given.

U.S. Border Security Compromised
In order to sell the notion that the U.S./Mexico border is porous and vulnerable to attack prior to an unprecedented security breach, a number of propaganda reports have been disseminated by the CIA as of late. For example, back on December 26, 2014, it was reported that a drug cartel claimed to have kidnapped a U.S. Border Patrol agent. Predictably, this agent and/or his identification will be used by Islamic terrorists to sneak an Islamic nuclear bomb into the United States, possibly into Arizona. The notion that illegal immigrants will resort to violence and/or aiding terrorists was revealed on December 29, 2014, when the U.S. Border Patrol stated that illegal immigrants are now becoming more “aggressive”. Less than a week later on January 3, 2015, a U.S. Congressional report stated that 700 miles of U.S.-Mexico border are still insecure, making the notion of a security breach by Islamic terrorists seem all the more plausible. Three weeks late on January 27, 2015, it was reported that U.S. Border Patrol is lending a hand in Super Bowl security, suggesting that an attack by way of Mexico may be planned. Two days later on January 29, 2015, traitorous Infowars published a report entitled “Obama Just Picked a Fight with Border Agents”, further suggesting that a security breach on the US/Mexico border is imminent.

I. LIVE NUCLEAR TERROR ATTACKS:

?????????????????????????????????????????????????????????????????????????????

1.1: Live Nuke Attack
Due to the hundreds of millions of people who will be watching Super Bowl XLIX, it’s highly likely that the game itself or another location in America may suffer a nuclear terror attack, most likely by China or Islamic terrorists (e.g., Al Qaeda, ISIS, Iran, Khorasan Group, etc.). In the event that a location outside of Arizona is targeted, a so-called “cyber-hijack” (see below) of NBC will occur just prior to the attack so that the audience can witness the nuclear detonation live on television. After all, seeing is believing.

Top Nuclear Terror Targets:

1. University of Phoenix Stadium (Glendale, Arizona)
2. One World Trade Center (New York, New York)
3. United States Capitol Building (Washington, D.C)
4. West Coast Cities (e.g., Las Vegas, NV; Los Angeles, CA; Portland, OR; San Diego, CA; San Francisco, CA; Seattle, WA, etc.)

1.2: ISIS Nuclear Attack
In order to create the necessary media narrative that ISIS is capable of executing a nuclear terror attack, a number of CIA-spawned propaganda reports have been published within the last 6-months. For example, on May 2, 2014, it was reported by Veterans Today that 1.05 tons of stolen Pakistani nuclear material is now headed to the United States, ultimately connecting Pakistan to a future nuclear terror strike on America. The notion of an ISIS nuclear terrorist attack was witnessed on June 23, 2014, when ISIS terrorists reportedly threatened a nuke attack on Israel, a laughable notion to be sure. A few weeks later on July 9, 2014, it was reported that ISIS seized 88 pounds of Uranium in Northern Iraq, ultimately providing them will enough uranium to make a nuclear bomb. This report was corroborated a day later on July 10, 2014, by Russia Today who reported that Sunni insurgents have taken over nuclear materials in northern Iraq. These preliminary reports were ultimately confirmed by Fox News on July 10, 2014, in a report entitled “ISIS Seizes Uranium from Lab; Experts Downplay ‘Dirty Bomb’ Threat”. Roughly 6-weeks later on August 28, 2014, it was reported that a black Dell laptop was found in an ISIS safe house in Syria which contained instructions on how to weaponize the bubonic plague as well as “missives on using WMDs (Weapons of Mass Destruction)”. Needless to say, the ISIS endgame is a biological and/or nuclear terror attack. Anything less would be unsatisfactory to the CIA which is in command and control of ISIS. In order to raise the specter of an ISIS-related nuclear terror attack just prior to it transpiring in reality, Obama reportedly stated that he will send US troops to fight ISIS if they get nukes on November 18, 2014. Needless to say, the publicity stunt was orchestrated by the CIA is order foreshadow an ISIS-related nuclear attack.

1.3: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

II. NUCLEAR TERROR TARGETS:

freedom-tower-nuke-attack

2.1: One World Trade Center (New York, New York)
One potential Flight MH370 target is the Freedom Tower which has previously been rigged for a nuclear detonation. The plot to stage a nuclear terror attack on the Freedom Tower was a direct result of Truther.org foiling two previous nuclear terror plots targeting Dallas, Texas and New York City (i.e., the 2011 Super Bowl Nuclear Terror Plot and the 2014 Super Bowl Nuclear Terror Plot). Therefore, a third prospective nuclear terror target had to be chosen—One World Trade Center. In order to foreshadow the notion that the Freedom Tower will suffer a nuclear terror attack, it was reported back on September 6, 2014, that a “prank caller” called 911 on September 5, 2014, claiming to have planted a nuclear bomb next to One World Trade Center. Port Authority police and members of the Joint Terrorism Task Force predictably raced over but found nothing. Most recently, on November 12, 2014, New York workers allegedly go stuck on scaffolding outside 69th floor of World Trade Center. The literal publicity stunt was designed to draw international attention to the newly finished Freedom Tower just prior to a nuclear terror attack by Flight MH 370.

2.2: US Capitol (Washington, DC)
Back on June 14, 2012, it was reported that the U.S. Capitol dome will undergo its first major face-lift in more than 50 years, costing $19 million in repairs. Despite the repairs, the United States Capitol was slated for a second facelift on October 22, 2013, when it was reported that the Capitol Dome will undergo another $60 million facelift. As of November 18, 2014, work on the second facelift began, resulting scaffolding around the dome (see photo). Whether or not the timely “facelifts” have provided the necessary cover for the installation of a so-called nuclear bomb inside the U.S. Capitol Building is not known, but it’s highly likely. Said bomb could be detonated at the exact moment that Flight MH 370 crashed into the building 9/11-sytle, making the world believe that the plane had a nuclear bomb onboard. The unprecedented nuclear terror attack would end America as we know, bringing about the naked dictatorship of Obama.

III. 9/11-STYE TERROR ATTACKS:

june-11-2014-chicago-attack

3.1: 9/11-Style Attacks
Although the impending 9/11-style attacks could theoretically target any number of skyscrapers within the United States, the Empire State Building (New York City), One World Trade Center (New York City), and the White House (Washington, D.C.) are the top terror targets. One of the 9/11-sytle attacks may come courtesy of the missing Malaysian Airlines Flight MH370 which was explicitly disappeared by CIA on March 8, 2014, in order to execute a surprise WMD attack on America. Because New York City and Washington, D.C. are located just off the Atlantic Ocean, Flight MH 370 could theoretically fly in off the water from an undisclosed location (e.g., Cuba) at full speed, attacking the aforementioned targets prior to a retaliatory response from the U.S. Air Force. Back on December 24, 2014, it was reported that a Jordanian war plane was shot down and its pilot captured by ISIS. Therefore, state-sponsored Islamic terrorists will predictably have an official pilot at the helm of Flight MH370 when it is used in a 9/11-style terror attack. In order to sell the notion to the public that Flight MH 370 could avoid radar detection while flying from Pakistan en route to the United States, it was reported back on November 2, 2014, that a German minister’s plane disappears from radar “for hours”. Roughly 6-weeks later on December 12, 2014, a so-called computer glitch closed London airspace for hours. In the event of a Flight MH 370 attack, there will predictably be a cyber-attack, glitch or malfunction in the airlines or military’s computers/radar which will enable the attack to take place.

Top 9/11-Style Attack Targets
:

1. University of Phoenix Stadium (Glendale, Arizona)
2.
Empire State Building (New York, New York)
3. One World Trade Center (New York, New York)
4. Willis Tower (Chicago, Illinois)
5. White House (Washington, D.C.)

3.2: Domestic 9/11 Attack
In order to create the necessary terror narrative in the media prior to a 9/11-sytle terror attack on Super Bowl XLIX, a number of staged incidents regarding aviation have taken place at Phoenix Sky International Airport over the last 18-months. For example, back on December 27, 2013, it was reported that Robert Bump, 49, climbed over a barbed wire fence roughly nine feet high at Phoenix Sky International Airport before heading onto the tarmac towards an arriving plane. He reportedly ran away before being arrested. Roughly 6-months later on July 15, 2014, it was reported that a man was sent to the hospital after he opened a secure door at Sky Harbor International Airport in Phoenix, Arizona. According to a Sky Harbor spokesperson Julie Rodriguez, a passenger in Terminal 4 opened a security door near gate C-12 in what was construed as an attempt to circumvent security, possibly to hijack an airliner for a 9/11-sytle attack. Roughly a month later on August 7, 2014, it was reported that authorities in Connecticut used a stun gun to stop an Arizona man they say was trying to breach a security checkpoint at Bradley International Airport. These three security breaches, whether related or not, have created a media narrative for a so-called “domestic” terrorist hijacking in Arizona which is construed in the media as being home to numerous anti-government militias. Since University of Phoenix Stadium has a massive window, a plane could fly unabated into the stadium on live television, blowing up and killing tens of thousands of people.

3.3: 9/11-Style Attack by ISIS

In order to set up ISIS for a 9/11-style attack, the CIA has repeatedly had their intelligence operatives state that this type of attack is now being planned. For example, on June 15, 2014, U.S. Senator Lindsay Graham stated that ISIS held territory in Iraq will be the next 9/11 “staging area”. Less than 24-hours later on June 16, 2014, CBS News published a report entitled “Will ISIS Plan a 9/11-Style Terror Plot Against the U.S.?”, further foreshadowing the notion if a 9/11-style attack by ISIS. Roughly a week later on June 23, 2014, former Vice President Dick Cheney stated that another 9/11 is coming, only “far deadlier”. Two days later on June 25, 2014, it was reported that ISIS is trying to grab its own air force, foreshadowing the notion that ISIS is planning an aerial-related terror attack. Lastly, on August 22, 2014, the White House stated that ISIS could “pivot” to a 9/11-style attack, ultimately confirming that a 9/11-style attack by ISIS is now in play. How U.S. politicians and the White House in Washington, D.C. know the secret plans of terrorists hiding in the deserts of Iraq is unknown unless of course both the U.S. government and ISIS are being controlled by the same entity—the CIA. To further psychologically prepare the world for an ISIS-related aerial attack, it was reported on October 17, 2014, that ISIS militants are training to fly warplanes in Syria. Needless to say, the timely report was designed to foreshadow an ISIS-related attack using Flight MH370.

IV. 9/11-STYLE TARGETS:

911-redux

4.1: Super Bowl XLIX (Greendale, Arizona)
Since University of Phoenix Stadium has a massive window, a plane could fly unabated into the stadium on live television before blowing up and killing tens of thousands of people. In order to create the necessary terror narrative in the media prior to an unprecedented aviation disaster, a number of staged incidents have taken place over the last week. For example, on January 25, 2015: two planes in Arizona and California were suspiciously evacuated. A day later on January 26, 2015, 2 small planes reportedly ditch into sea off Hawaii. A day later on January 27, 2015, an F-18 fighter jet reportedly buzzed the University of Berkeley in California. Also on January 27, 2015, a small plane reportedly landed safely in Pacific, using massive parachute. Two days later on January 29, 2015: Russian bombers allegedly flew over the English Channel. Also on January 29, 2015, a pilot was allegedly locked out of the cockpit in a fight from Minnesota to Las Vegas. Needless to say, the rash of airline crashes and scares have set the precedent for an upcoming terror attack using a commercial airplane.

4.2: Empire State Building (New York, New York)
The latest Flight MH370 target has been identified as the Empire State Building in New York City. Aside from the super-hyped television show “Empire” (2015), breaking news in respect to the building suggests that an attack on the iconic skyscraper may be is imminent. For example, on January 15, 2015, the Express published a report entitled “Asteroid Bigger than the Empire State Building set for Near Miss with Earth”, foreshadowing that something may crash into the Empire State Building. A day later on January 16, 2015, a guardrail reportedly fell from the 81st floor of New York’s tallest residential building. Lastly, on January 9, 2015, it was reported that the FBI informant in the plot to blow up the Sear Tower is now operating a store in New Rochelle, New York. Needless to say, the report was published to show that Islamic terrorists who want to attack skyscrapers are currently operating in New York.

4.3: One World Trade Center (New York, New York)
One potential Flight MH370 target is the Freedom Tower which has previously been rigged for a nuclear detonation. The plot to stage a nuclear terror attack on the Freedom Tower was a direct result of Truther.org foiling two previous nuclear terror plots targeting Dallas, Texas and New York City (i.e., the 2011 Super Bowl Nuclear Terror Plot and the 2014 Super Bowl Nuclear Terror Plot). Therefore, a third prospective nuclear terror target had to be chosen—One World Trade Center. In order to foreshadow the notion that the Freedom Tower will suffer a nuclear terror attack, it was reported back on September 6, 2014, that a “prank caller” called 911 on September 5, 2014, claiming to have planted a nuclear bomb next to One World Trade Center. Port Authority police and members of the Joint Terrorism Task Force predictably raced over but found nothing. Most recently, on November 12, 2014, New York workers allegedly go stuck on scaffolding outside 69th floor of World Trade Center. The literal publicity stunt was designed to draw international attention to the newly finished Freedom Tower just prior to a nuclear terror attack by Flight MH 370.

4.4: Willis “Sears” Tower (Chicago, Illinois)
In order to rehash the 9/11 Attacks, it’s possible that a small plane or hijacked airliner may be used to attack Willis Tower (i.e., the Sears Tower). The skyscraper was the target of a 2006 Sears Tower Terror Plot, and therefore it’s just a matter of time before it’s targeted again. As previously mentioned, on January 9, 2015, it was reported that the FBI informant in the plot to blow up the Sear Tower is now operating a store in New Rochelle, New York. Needless to say, the report was published to show that Islamic terrorists who want tried to take down the Sears Tower are out and about just waiting to attack.

4.5: White House (Washington, DC)
The White House is the official residence and principal workplace of the President of the United States, located at 1600 Pennsylvania Avenue Northwest, Washington, D.C. Therefore, it’s possibly that it may be attacked 9/11-style, possibly during Super Bowl XLIX. Back on January 26, 2015, it was reported that a small drone was found on the White House grounds. The incident, which was no doubt spawned by the CIA, was executed in order to program the masses for a 9/11-style attack on the White House. Back on September 12, 2012, it was reported that after nearly two years and $86 million worth of construction, the West Wing of the Obama White House has emerged from its visual seclusion “remarkably unchanged”. According to the report, the construction project began in September of 2010 with the excavation of a huge multistory pit in front of the West Wing. Whether or not the “construction” job will ultimately undermine the structural integrity of America’s most famous residence is not known, but the timely construction project could have theoretically provided cover for the installation of demolition explosives in and around the White House. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated terrorist attack. Aside from its suspicious construction, the White House has been the target of a number of high-profile terror plots and threats. On January 18, 2012, it was reported that an Occupy Wall Street protester threw a smoke bomb over the fence of the White House. Two months later on March 8, 2012, it was reported that a top hacker and committed anarchist who worked closely with the LulzSec, openly spoke of burning down the White House. Six months later on September 30, 2012, it was reported that the White House was attacked by hackers allegedly linked to China’s government. The unprecedented cyber-terror attack targeted the U.S. government’s most sensitive computer networks, ultimately breaching a system used by the White House Military Office for nuclear commands. A month later on October 21, 2012, it was reported that a year-long investigation by the Investigative Project on Terrorism (IPT) has found that scores of known radical Islamists made hundreds of visits to the Obama White House, meeting with top administration officials. Prior to a high-profile terror attack on the White House, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Olympus Has Fallen” (2013) is a film (see trailer) in which the White House is attacked by an ex-North Korean terrorist with military aircraft, suicide bombers and cyber warfare.

V. LIVE CYBER-HIJACK:

Live TV Nuke

5.1: Live TV Cyber-Hijack
Back on December 31, 2014, the state-sponsored Sony Hackers threatened to attack U.S. news media organizations, namely CNN. Although CNN could theoretically suffer a cyber-hijack of its airwaves, NBC, which is airing and streaming Super Bowl XLIX live, appears the latest target. In order to help sell the notion of a media-related attack to the public, a state-sponsored terror attack occurred on January 7, 2014, when gunmen attacked a Paris magazine, leaving 12 dead.

5.2: ISIS Cyber-Hijack Nuke Attack
Back on June 30, 2013, Truther.org published a report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The terror plot, which was to be scapegoated onto China, has since been exposed ad nausea. Therefore, the CIA was forced to create a secondary terror narrative in order to implicate ISIS in the wake of an unprecedented cyber-hijack and nuclear terror attack. This particular narrative was first identified on January 7, 2015, when a Maryland TV station’s Twitter account and website were allegedly hacked by ISIS supporters. Two days later on January 9, 2015, French municipal-websites were reportedly hacked and replaced with an ISIS flag. Three days later on January 12, 2015, it was reported that U.S. military social media accounts were hacked by ISIS sympathizers. Three days later on January 15, 2015, ISIS hackers allegedly launched an ‘unprecedented’ wave of cyber-attacks on 19,000 French websites. Six days later on January 21, 2015, ISIS ‘lovers’ allegedly hacked websites in 40 Spanish towns. In order to associate hacking with hijacked aircraft just prior to a 9/11-style attack, it was reported on January 26, 2015, that Malaysia Airlines’ website was hacked by group claiming to support ISIS. Less than 24-hours later on January 27, 2015, hackers announced their intentions to target airline flights. In the event that a cyber-hijack of the Super Bowl telecast is executed prior to a live nuclear terror attack by the state-sponsored terrorists known as ISIS, the country of Iran will likely be scapegoated for supplying the terrorists with nuclear material. Coincidentally, on January 29, 2015, it was reported that a U.S. Senate panel approved the controversial Iran sanctions bill, providing a timely motive for a revenge attack on America.

5.3: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

5.4: Porn Cyber-Hijack
In the event that the live Chinese and ISIS cyber-hijack and nuke attacks are postponed, it’s highly likely that the CIA will attempt to stage a porn-related cyber-hijack of NBC’s television and internet broadcast of Super Bowl XLIX. This type of attack was first identified back on April 14th, 2013, when it was reported that a Belarusian music TV channel was hijacked and pornography was broadcast. According to reports, “BelMuzTV”, which is reportedly seen in public places like shopping malls and restaurants, began airing explicit pornographic images featuring full nudity and sexual intercourse which lasted for approximately 10 to 20 minutes. Consequently, thousands of people throughout the Belarusian capital of Minsk watched the broadcast and began to share their experience on various social networking sites. A rumor then was circulated that a “subversive operation” was executed by the channel’s studio engineer, who entered the control room, loaded the inappropriate content into rotation and then disappeared. Evidently, a redux of the aforementioned porn-related cyber-hijack is now in play for Super Bowl XLIX. Coincidentally, on January 30, 2015, it was reported that porn-based malware is now sweeping across Facebook. In the wake of the impending cyber-hijack, it will predictably be stated that the aforementioned malware infected the NBC studios which is also streaming the game live around the world. Also on January 30, 2015, it was reported that 19-year-old Kendra Sunderland is now facing jail time after allegedly filming a solo porn video in the Oregon State University library. The CIA spawned publicity stunt was designed to bring unprecedented media publicity to porn just prior to a staged porn attack during the Super Bowl. Less than 24-hours later on January 31, 2015, it was reported that the Vatican is now investigating two high-ranking priests in a child-porn case. Since the priests in question will never be prosecuted, it can be deduced that the charges are part of a publicity stunt to raise the profile of porn just prior to an unprecedented cyber-hijack. Lastly, in order to associate porn with sports prior to a cyber-hijack of the Super Bowl telecast, it was reported on January 31, 2015, that hockey fans heard mysterious sexual ecstasy-like moans during a live NHL broadcast of the Nashville Predators vs. St. Louis Blues game.

VI. CHINESE SURPRISE ATTACK:

Last-Ride-2

6.1: Chinese Surprise Attack
Back on December 20, 2014, Trutehr.org published a report entitled “Pearl Harbor-Like Surprise Attack by China Imminent—Cyber, EMP, Drone or Nuclear Attack Most Likely”, the latest in a wave of sneak attacks being orchestrated by the CIA in Switzerland. The notion that the CIA is actively trying to trigger World War III between the U.S. and China has been exposed ad nauseam by Truther.org. To date, at least 8 different of Chinese “surprise” attack plots have been identified and exposed, resulting in the deaths of over 60 Chinese officials who suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots. Whether or not a Chinese surprise attack is now in play for Super Bowl XLIX is not known, but it’s highly likely.

6.2: Chinese Attack on Seattle & USS Ranger
At some point during Super Bowl XLIX on Sunday, February 1, 2015, the CIA may stage a full-scale Chinese attack on the United States. In the event that this scenario transpires, the attack will likely come from drones launched by Chinese submarines in the Pacific Ocean. Since the entire city of Seattle has been rigged for a man-made earthquake attack, a Chinese attack may result in the complete devastation of the Emerald City, namely downtown Seattle and the area surrounding the Seahawks stadium. In other words, the attack will look like a massive quake hit the city, although it will predictably blamed on the Chinese aerial bombardment. In order to sell the Chinese attack to the American public watching on TV, the drones will likely execute a made-for-TV attack on the USS Ranger (CV-61) which is currently stationed in Seattle, Washington. Back on December 31, 2014, Truthe.org published a report in respect to an attack on the USS Ranger which was supposed to leave Bremerton, Washington early in 2015. However, in the aftermath of the aforementioned report, the ship has inexplicably remained docked an hour outside of Seattle, evidently part of the impending surprise Chinese attack plot. On January 28, 2015, it was reported that a mid-February departure is now likely for USS Ranger. Therefore, a Chinese attack on the ship which is still docked in Bremerton, Washington, appears to still be in play. Based on previous ship-related false-flag terror plots exposed by Truther.org (e.g., the USS Bataan Terror Plot, the USS Mesa Verde Terror Plot, the USS George H. W. Bush Terror Plot, the USS Harry S. Truman Terror Plot, etc.), it’s highly likely that the USS Ranger will suffer a false-flag terror attack that will most likely lead to nuclear war with China.

6.3: Chinese Carrier Attack
In what appears to pre-Chinese aircraft carrier attack propaganda, The Blaze published a report back on December 24, 2014, entitled “If China Attacks, This Is the Ship Taiwan Will Use to Sink Chinese Aircraft Carriers”. The headline consummated the terms “China”, “Attack”, and “Aircraft Carrier”, foreshadowing the attack depicted herein. In the event that the USS Ranger (CV-61) is attacked by China, a nuclear attack will likely follow via a nuclear missile launched by a Chinese submarine. Coincidentally, back on December 9, 2014, the International Business Times published a report entitled “Long-Range Nuclear Missiles Aboard China’s Stealth Submarines Can Reach US, Western Pacific And Beyond”, foreshadowing a West Coast nuclear attack by China. To date, at least 7 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, resulting in the deaths of over 60 Chinese officials who suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots.

VII: OBAMA COUP DETAT:

White-House-Down-2013

7.1: Obama Coup
Based on the plethora of terror plots targeting the White House and the U.S. Capitol Building, it’s highly likely that the CIA in Switzerland has authorized professional terrorists (i.e., Special Forces) to attack Washington, D.C. during Super Bowl XLIX. In what appears to be pre-coup terror programming, it was reported on December 30, 2014, that gunfire erupted in the capital city of Banjul as the President of Gambia was away. Two days later on January 1, 2014, a man reportedly opened fire and threw a grenade at the President of Turkey’s office. In an attempt to sell the notion of U.S. citizens would partake in a coup, it was reported on January 6, 2014, that U.S. citizens were charged with aiding the aforementioned coup in Gambia. Therefore, the precedent has been set in Gambia and Turkey for a state-sponsored coup in America. A state-sponsored coup d’état in Washington, D.C. would give the world the impression that American soldiers have forsaken democracy and embraced violence. According to a December 19, 2014, Fox News poll, two-thirds of Americans says the government is broken, something a coup would attempt to fix. The notion that a military coup is imminent was foreshadowed on December 22, 2014, when a military-based report stated that only 15% of the U.S. military approves of Obama. Therefore, it appears that a group of “soldiers” (i.e., Special Forces) will take matters into their own hands, attacking the White House and/or the U.S. Capitol Building. Back on October 15, 2014, an official from Missouri called for military coup against Obama. The timely and shocking statement was evidently made in order to foreshadow a military-related attack against Obama.

Coup Terror Trending
Prior to a high-profile Obama White House coup, the American public must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced coup-related terror is now at an all-time high which suggests that a state-sponsored coup in Washington, D.C. is imminent.

Coup Terror Headlines:

1. October 22, 2014: Shooting at Canadian Parliament: Area in lockdown, manhunt underway
2. October 22, 2014: ISIS teen from Australia vows to fight US until black flags fly over White House
3. October 23, 2014: Man stopped after scaling White House fence
4. October 26, 2014: Man threatens to kill Obama.
5. November 4, 2014:
Bulgarian woman sets herself ablaze outside president’s office
6. November 10, 2014: Secret Service discloses 40 barrier-jumping incidents
7. November 19, 2014: Four arrested after group of Hong Kong protesters storm city’s legislature
8. November 20, 2014: Secret Service arrests armed woman outside White House
9. November 21, 2014: Israel charges 3 Palestinians in alleged plot to kill foreign minister
10. January 6, 2014: US citizens charged with aiding attempted Gambia coup
11. January 11, 2015: 2 protesters arrested outside of Dick Cheney’s home
12. January 14, 2015: House Speaker Boehner’s bartender planned to poison him
13. January 18, 2015: Shots fired outside Vice presidents Biden’s home
14. January 20, 2015: Terrorist rebels capture Yemen’s presidential palace in coup
15. January 28, 2015: ISIS threatens to behead Obama and turn the U.S. into a ‘Muslim province’
16. January 29, 2015: Nigerian mobs stone president’s convoy over Boko Haram
17. January 29, 2015: Iran Targets Netanyahu Children for Assassination

[Does not purport to be a complete list of coup-related headlines]

Resurrection of Obama
An elaborate White House coup will do the same for Barack Obamas as it did for one Adolf Hitler. Back on July 20, 1944, Hitler was targeted in an unsuccessful bombing, resulting in 5,000 executions and 7,000 arrests. In the wake of an Obama assassination “event”, the attack will be used as an excuse to round up “disloyal” Americans within the U.S. government, bringing about the naked dictatorship of Obama. Considering Obama’s poll numbers are at an all-time low, an attack on Obama and/or the White House would boost his popularity as well as the Democrats who suffered historic losses in November’s election. An attack could also be used to institute some form of martial law, possibly to find the alleged terrorists, making every American gun owner a suspect.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: If I Am Assassinated, Kidnapped, Held Hostage, Suicided or Murdered in Switzerland—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
truther-rss

NFL-MAIN

Download & Forward PDF

David Chase Taylor
January 18, 2015
Truther.org

SWITZERLAND, Zurich — Attacking the NFL has been the primary focus of the Obama administration and the CIA in Switzerland who have been caught red-handed on multiple occasions (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, etc.) trying to execute WMD-related terror attacks against America’s most popular sports league.

Therefore, it’s highly likely that there are multiple terror plots now in play for the NFL’s AFC and NFC Conference Championship games which will take place in Seattle, Washington, and Boston, Massachusetts on Sunday, January 18, 2014.

Exactly what type of terror or so-called “natural disasters” are planned is not known, but previously foiled terror plots suggest they may include: a Chinese drone and/or nuclear attack on Seattle; a man-made earthquake attack on Seattle; and a WMD attack on Boston using the previously hijacked Flight MH370.

As previously reported, Malaysian Airlines Flight MH370 was explicitly disappeared by CIA on March 8, 2014, in order to execute a surprise WMD attack on America. In the event that Flight MH370 is used in an NFL attack, the city of Boston, Massachusetts is the most likely target due to its close proximity to the Atlantic Ocean.

In what appears to be pre-NFL attack programming, it was reported on December 31, 2014, that the Baltimore Ravens head of security was charged with 4 sexual offenses. The timely charges were filed by the U.S. government in order to make NFL security appear vulnerable just prior to a horrific state-sponsored terror attack.

2014-2015 AFC & NFC Conference Championship Games:

1. January 18: #2 Green Bay Packers @ #1 Seattle Seahawks: 3:05 PM (EST) (Seattle, WA)
II. January 18: #4 Indianapolis Colts @ #1 New England Patriots: 6:40 PM (EST) (Boston, MA)

I. CHINESE ATTACK ON SEATTLE:

Last-Ride-2

1.1: Chinese Attack on Seattle & USS Ranger
At some point during the Green Bay Packers versus the Seattle Seahawks game on Sunday, January 18, 2015, the CIA may stage a full-scale Chinese attack on the United States. In the event that this scenario transpires, the attack will likely come from drones launched by Chinese submarines in the Pacific Ocean. Since the entire city of Seattle has been rigged for a man-made earthquake attack (see below), the Chinese attack will likely result in the complete devastation of the Emerald City, namely downtown Seattle and the area surrounding the Seahawks stadium. In other words, the attack will look like a massive quake hit the city, although it will predictably blamed on the Chinese aerial bombardment. In order to sell the Chinese attack to the American public watching on TV, the drones will likely execute a made-for-TV attack on the USS Ranger (CV-61) which is currently stationed in Seattle, Washington. Back on December 31, 2014, Truthe.org published a report in respect to an attack on the USS Ranger which was supposed to leave Bremerton, Washington earlier this month. However, in the aftermath of the aforementioned report, the ship has inexplicably remained docked an hour outside of Seattle, evidently part of the impending surprise Chinese attack plot. Based on previous ship-related false-flag terror plots exposed by Truther.org (e.g., the USS Bataan Terror Plot, the USS Mesa Verde Terror Plot, the USS George H. W. Bush Terror Plot, the USS Harry S. Truman Terror Plot, etc.), it’s highly likely that the USS Ranger will suffer a false-flag terror attack that will most likely lead to nuclear war with China.

1.2: Chinese Carrier Attack
In what appears to pre-Chinese aircraft carrier attack propaganda, The Blaze published a report back on December 24, 2014, entitled “If China Attacks, This Is the Ship Taiwan Will Use to Sink Chinese Aircraft Carriers”. The headline consummated the terms “China”, “Attack”, and “Aircraft Carrier”, foreshadowing the attack depicted herein. In the event that the USS Ranger (CV-61) is attacked by China, a nuclear attack will likely follow via a nuclear missile launched by a Chinese submarine. Coincidentally, back on December 9, 2014, the International Business Times published a report entitled “Long-Range Nuclear Missiles Aboard China’s Stealth Submarines Can Reach US, Western Pacific And Beyond”, foreshadowing a West Coast nuclear attack by China. To date, at least 7 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, resulting in the deaths of over 60 Chinese officials who suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots.

I. CHINESE CYBER-HIJACK NUKE ATTACK:

Live TV Nuke

2.1: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise and earth changing cyber-attack by an Asian country was ominously foreshadowed by the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. In order to bring unprecedented media exposure to cyber-security (or lack thereof), it was revealed on January 11, 2015, that President Obama promoted a cybersecurity plan last week. According to the White House the three-day series of events focued on “protecting American consumers and families, securing the nation’s businesses and infrastructure in cyberspace, and increasing broadband access”. The TV cyber-hijack nuke attack is a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. Interestingly, the notion of a rouge submarine attack was ominously foreshadowed on January 9, 2015, when a suspected Russian submarine was reported lurking off the Scottish coast.

2.2: TV Cyber-Hijack

Back on December 31, 2014, the state-sponsored Sony Hackers threatened U.S. news media organizations, namely CNN. Although CNN could theoretically suffer a cyber-hijack of its airwaves, a sports-related TV channel appears the slated targeted. Coincidentally, 4 days later on January 4, 2015, longtime ESPN sports anchor Stuart Scott died at 49, an apparent Roman-like blood sacrifice to a successful sports-related cyber-hijack and nuke attack. In order to sell the notion of a media-related attack to the public, another state-sponsored terror attack occurred on January 7, 2014, when gunmen attacked a Paris magazine, leaving 12 dead. That same day, January 7, 2015, a Maryland TV station’s Twitter account and website hacked by ISIS supporters, setting the precedent for a TV-related cyber-attack. The notion of a full-scale cyber-war was ominously foreshadowed in the January 9, 2015, CNN report entitled “Anonymous Declares War over Charlie Hebdo Attack.

fallout

2.3: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

III. SEATTLE EARTHQUAKE ATTACK:

beast-quake

3.1: Seattle Man-Made Earthquake Attack
As originally depicted in the January 18, 2014, Truther.org report entitled “Seattle’s Man-Made Earthquake Terror Plot Exposed”, the USGS along with the U.S. Navy (at the behest of the CIA in Switzerland) are targeting the city of Seattle, Washington with a massive man-made earthquake attack that will likely destroy the city, killing tens of thousands. Although the impending apocalyptic man-made earthquake attack could theoretically transpire in Seattle at any time, it will most likely occur on Sunday, January 10 2015, during the National Football League game between the Carolina Panthers and the Seattle Seahawks at Century Link Field. In the event that Seattle is attacked by a man-made earthquake, it is highly likely that Century Link Field, the home field of the Seattle Seahawks, will suffer tremendously—possibly even total collapse. Since the Seattle Seahawks are famous for The 12th Man, an earthquake during the game would naturally be attributed to Seahawks fans as three of them already have. In what appears to be an ominous sign that a Seattle earthquake is imminent, it was reported on December 23, 2014, that Seattle is unsettled by the massive drill tunneling through downtown. Big Bertha (see below) is a massive drill was imported from Switzerland in order to gut the city for an apocalyptic earthquake that will most likely be triggered by Seahawk fans. The first fan-made earthquake at Century Link Field occurred on January 8, 2011, commonly referred to as the “Beast Quake”. Roughly 2-years later, a second fan-made earthquake occurred on December 2, 2013, when Seahawks fans once again created enough vibration to cause an earthquake. The most recent fan-made earthquake occurred at Century Link Field on January 11, 2014, which is now entitled “Beast Quake II”. The three earthquakes, all of which occurred during games against the New Orleans Saints, have created the myth that fans can actually create earthquakes, potentially triggering larger quakes. Therefore, the notion that Seahawks could trigger a fourth and catastrophic earthquake fits perfectly into the Seattle Seahawks man-made earthquake terror narrative. In other words, football fans, not explosives or tunneling (see below) will ultimately be scapegoated as the source of the devastating earthquake which destroys the city of Seattle. As luck would have it, the Seattle Fault passes just south of the city center, directly adjacent to or directly below Century Link Field. According to Wikipedia, “The Cascadia subduction zone poses the threat of an earthquake of magnitude 9.0 or greater, capable of seriously damaging [Seattle] and collapsing many buildings, especially in zones built on fill”. In the aftermath of a massive Seattle-based man-made earthquake attack, the U.S. government will predictably state that the architects and builders of Century Link Field did not execute the seismic proper studies prior to building the stadium in 1998.

bertha-map

3.2: Big “Bertha”
As revealed in a December 19, 2013, report, the U.S. federal government has spent $3.1 billion on a building project to allegedly create a highway tunnel underneath the city of Seattle. This was reportedly done using a 5-story high mechanical drill entitled “Bertha” which may have been imported from Switzerland where tunnel digging is the norm. Interestingly, “Bertha” admittedly tunneled either directly underneath of or adjacent to CenturyLink Field before running into “the object” which inexplicably caused the subterranean project to be canceled. Being roughly 60-feet in height, it appears that Bertha’s job was to bore multiple tunnels underneath the city of Seattle in order to set-up a man-made movie-like earthquake scene that once triggered, would ultimately create falling skyscrapers, broken highways and ruptured gas lines. In other words, the entire city of Seattle may be ready to blow at any moment.

3.3: Seattle Earthquake History
According to Wikipedia, due to its location in the Pacific Ring of Fire, Seattle is in a major earthquake zone. In the event that Seattle is attacked by a man-made earthquake, the earthquake will literally be “off the Richter Scale”, registering a 9 or higher. Historically speaking, Seattle suffered earthquakes on January 26, 1700 (estimated at 9 magnitude), December 14, 1872 (7.3 or 7.4), April 13, 1949 (7.1), and April 29, 1965 (6.5). The 1965 quake caused three deaths in Seattle directly, and one more by heart failure. More recently, on February 28, 2001, the magnitude 6.8 Nisqually earthquake did significant architectural damage, especially in the Pioneer Square area in Seattle but caused no fatalities. The latest quake occurred on June 27, 2013, when a 4.3-magnitude earthquake occurred in Leavenworth, Washington, just 117 miles due east of Seattle. Interestingly, Wikipedia is clear to point out that, “Although the Seattle Fault passes just south of the city center, neither it nor the Cascadia subduction zone has caused an earthquake since the city’s founding”. Evidently, the minced words and the clouded history of Seattle earthquakes suggests that a major man-made earthquake is imminent.

3.4: Seattle Earthquake Aftermath
In the immediate aftermath of a major man-made earthquake in Seattle or elsewhere, all electronic communication in the city, state and region would likely be immediately be cut-off, possibly for good. This type of scenario was recently highlighted in a January 17, 2014, propaganda report entitled, “Big L.A. Earthquake Could Cripple Internet, Cellphone Service”. Adding insult to injury, the thousands of natural gas pipelines running throughout a city would likely ignite as recently foreshadowed in the January 17, 2014, propaganda report entitled “Study Finds Nearly 6,000 Natural Gas Leaks in DC”. A major earthquake in Seattle could theoretically trigger the “super volcano” hidden beneath Yellowstone National Park which could theoretically could “wipe out” the U.S. According to a January 6, 2014, report, these apocalyptic super volcanoes can suddenly explode ‘with no outside cause’ and Seattle is only about 700 miles away from Yellowstone National Park. Needless to say, in the aftermath of an apocalyptic volcano, a number of other “natural disasters” will suddenly take place, triggered of course by the first event.

3.5: Earthquakes & Sports
To date, there have been at least 6 separate earthquakes which have occurred during “live” sporting events, 3 of which have occurred at Century Link Field. The Seattle Seahawks-earthquake narrative began with the “Beast Quake” when Seahawks running back Marshawn Lynch scored a long touchdown on January 8, 2011. Almost 3 years later on December 3, 2013, it was revealed that once again, noise from jumping and cheering Seahawks fans registers an earthquake in Seattle. Roughly a year later on January 13, 2014, it was once again reported that Seahawks fans did in fact generate a 3rd earthquake during their game with New Orleans Saints. In the aftermath of a man-made earthquake, the rowdy fans known as The 12th Man will be predictably scapegoated for triggering the so-called “natural disaster”.

Sports Related Earthquakes:

1. October 8, 1988: NCAA:Earthquake Game”: Auburn vs. LSU (Baton Rouge, Louisiana)
2. October 17, 1989: MLB: World Series Quake: Oakland vs. SF (San Francisco, California)
3. January 8, 2011: NFL: “Beast Quake”: Seattle vs. New Orleans (Seattle, Washington)
4. December 2, 2013: NFL: Seahawk Fan Quake: Seattle vs. New Orleans (Seattle, Washington)
5. December 7, 2014:
NCAA: 4.5 Quake: Oklahoma vs. Oklahoma State (Oklahoma City, Oklahoma)
5. January 11, 2014:
NFL: “Beast Quake II” Seattle vs. New Orleans (Seattle, Washington)

IV. BOSTON TERROR ATTACK:

flight-mh-370-nuke-attack

4.1: Boston Terror Attack
Aside from the Patriots vs. Broncos Dirty Bomb Terror Plot of November 24, 2013, in Boston, Massachusetts, recent nuclear-related headlines suggest that a nuclear terror attack may be imminent. The particular narrative was most recently identified on December 8, 2014, when it was reported that ISIS claims to have smuggled a “radioactive device” into Europe. A day later on December 9, 2014, it was reported that police in Moldova detained seven people suspected of smuggling radioactive Uranium-238 on a train from Russia, a substance which could allegedly be used to make a “dirty bomb”. Therefore, a future terror scenario in which nuclear material is shipped into America via train in order to construct a dirty bomb or nuclear bomb is now theoretically possible. Whether or not Boston will be targeted is not known, but the precedent for an NFL nuclear terror attack was previously set during the 2011 Super Bowl XLV Nuclear Terror Plot in Dallas, Texas.

4.2: Boston Sleeper Cell
The Boston Marathon Bombings of April 15, 2013, were apparently the opening salvo of an alleged Islamic wave of terror attacks that will culminate in an unprecedented nuclear terror attack on the city of Boston. Coincidentally, on April 21, 2013, it was reported that the FBI is hunting a 12-man strong terrorist “sleeper cell” in Boston which is linked to the Tsarnaev brothers who were allegedly responsible for the Boston Bombings. In the aftermath of a Boston nuclear attack, this “sleeper cell” will predictably be implicated in the attack.

4.3: Gillette Stadium Attack Plan
As evidenced in the Super Bowl XLV nuclear terror plot, the NFL game in Boston will most likely be attacked conventionally at first in order to draw in viewers worldwide prior to the slated nuclear detonation. This strategy was also employed on 9/11 with escalating events, stating with the first plane and ending with the demolition of both towers. Due to the construction of Gillette Stadium, which may be the only stadium in the country with direct vehicle access to the field, the attack will likely come from vehicles which will break through the security gate and drive onto the field, possibly running over fans, players and coaches. Once the attack ensues, terrorists wearing parachutes will likely descend into the stadium and attacked the crowd with automatic weapons, grenades and shoulder-fired missiles. Predictably, the “live” terror attack will go on for a few hours until Europe tunes in. At that point, once the world is watching, a nuclear detonation will ensue.

4.4: First Ever Social Media Terror Attack
It was reported on September 3, 2013, that Gillette Stadium is only one of 11 NFL stadiums with high-tech Wi-Fi throughout the stadium. The special network was built so that in the wake of a terror attack, the thousands of fans calling, updating their status and uploading photos of the attack won’t overload and crash local cellular networks. In other words, the NFL and the U.S. government built a special network so that the world could be suddenly inundated with images of the terror attack, multiplying the terror factor exponentially.

4.5: Flight MH370 Attack on Boston
Based on breaking news and events, it appears that the CIA is about to execute an ISIS-related bio-terror attack using the previously hijacked Malaysian Airlines Flight MH370 which was explicitly disappeared by CIA on March 8, 2014, in order to execute a surprise WMD attack on America. Because the city of Charlotte is located just off the Atlantic Ocean, Flight MH 370 could theoretically fly in off the water from an undisclosed location at full speed, attacking the football game in question prior to a retaliatory military response from the U.S. Air Force. In order to provide the alleged fuel for Flight MH370 which is now in Pakistan, it was reported on October 8, 2014, that pirates hijacked an oil tanker off the coast of Singapore back on October 2, 2014. Less than 24-hours later, the missing oil tanker was found, minus 2,000 gallons of fuel. Therefore, unknown Islamic terrorists now have enough fuel to fly Flight MH 370 from Pakistan to the U.S. in order to launch their surprise attack. While airliners do not run on crude oil, the terrorists could theoretically trade the stolen fuel for jet fuel or distil it themselves. To further psychologically prepare the world for an ISIS-related aerial attack, it was reported on October 17, 2014, that ISIS militants are training to fly warplanes in Syria. Needless to say, the timely report was designed to foreshadow an ISIS-related attack using Flight MH370.

4.6: ISIS Bio-Terror Attack
The endgame of ISIS terrorists, who were reportedly trained at a secret base in Jordan, is a bio-chemical terror attack that spawns the global pandemic planned for 2014. This particular narrative was first identified on June 19, 2014, when ISIS reportedly stormed a Saddam-era chemical weapons complex in Iraq. Roughly 3-weeks later on July 8, 2014, it was reported that “abandoned” barrels containing deadly sarin were seized by ISIS in rebel-held Syria. Less than 24-hours later on July 9, 2014, it was reported that Iraq has now lost control of a chemical weapons depot to ISIS. Never mind that back on March 31, 2005, “The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction” reported that the intelligence community was “dead wrong” in its assessments of Iraq’s weapons of mass destruction capabilities prior to the U.S. invasion. In other words, there were no WMDs in Iraq but ISIS located two bio-chemical weapon depots inside Iraq within 27 days? Needless to say, the entire ISIS-bio-terror narrative has been fabricated by the CIA in order to provide the necessary cover for a state-sponsored bio-chemical attack. The ISIS endgame was confirmed yet again on August 28, 2014, when it was revealed that a black Dell laptop belonging to ISIS contained instructions on how to weaponize the bubonic plague. Lastly, on October 30, 2014, it was reported that Spanish Intelligence has intercepted an ISIS plot to weaponize Ebola, confirming that an ISIS-related bio-terror attack is imminent.

ISIS-nuclear-Iraq-620x435

4.7: ISIS Nuclear Attack

In order to create the necessary media narrative that ISIS is capable of executing a nuclear terror attack, a number of CIA-spawned propaganda reports have been published within the last 6-months. For example, on May 2, 2014, it was reported by Veterans Today that 1.05 tons of stolen Pakistani nuclear material is now headed to the United States, ultimately connecting Pakistan to a future nuclear terror strike on America. The notion of an ISIS nuclear terrorist attack was witnessed on June 23, 2014, when ISIS terrorists reportedly threatened a nuke attack on Israel, a laughable notion to be sure. A few weeks later on July 9, 2014, it was reported that ISIS seized 88 pounds of Uranium in Northern Iraq, ultimately providing them will enough uranium to make a nuclear bomb. This report was corroborated a day later on July 10, 2014, by Russia Today who reported that Sunni insurgents have taken over nuclear materials in northern Iraq. These preliminary reports were ultimately confirmed by Fox News on July 10, 2014, in a report entitled “ISIS Seizes Uranium from Lab; Experts Downplay ‘Dirty Bomb’ Threat”. Roughly 6-weeks later on August 28, 2014, it was reported that a black Dell laptop was found in an ISIS safe house in Syria which contained instructions on how to weaponize the bubonic plague as well as “missives on using WMDs (Weapons of Mass Destruction)”. Needless to say, the ISIS endgame is a biological and/or nuclear terror attack. Anything less would be unsatisfactory to the CIA which is in command and control of ISIS. In order to raise the specter of an ISIS-related nuclear terror attack just prior to it transpiring in reality, Obama reportedly stated that he will send US troops to fight ISIS if they get nukes on November 18, 2014. Needless to say, the publicity stunt was orchestrated by the CIA is order foreshadow an ISIS-related nuclear attack.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, s state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: If I Am Assassinated, Kidnapped, Held Hostage, Suicided or Murdered in Switzerland—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
truther-rss