Archive for the ‘China’ Category

Obama Air Force One

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

SHOCK: 10 Reasons Why the Paris Terror Attacks Were Executed by the CIA

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
November 19, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA Headquarters beneath Lake Geneva is plotting the Chinese-based assassination of President Obama after the APEC Philippines 2015 Summit in Manila which concludes on November 19, 2015.

Since Obama is now a political liability, he has become expendable and therefore the CIA plans to use him as bait to spark World War III. After Air Force One is stuck by a Chinese missile while flying over the South China Sea, nuclear war between the United States and China will be imminent.

In order to foreshadow that Air Force One will be attacked by a missile, it was reported back on October 19, 2015, that the new model of Air Force One will fend off heat-seeking missiles. Translation: the current Air Force One used by Obama is not able to fend off a missile-related attack.

In order to provide a timely motive for a revenge-based Chinese missile strike on Air Force One, USA Today published a report on November 18, 2015, entitled “Obama Turns Up Heat Again on China’s Assertiveness in South China Sea.

The notion of an airliner being struck by a missile was foreshadowed by a CNN report on November 8, 2015, entitled “British Passenger Jet Narrowly Avoided Missile in Egypt this Year”. Needless to say, the incident was fabricated by the CIA in order to set the precedent for a missile attack on Air Force One.

The notion that the Chinese military is testing out their high altitude missiles for the impending strike on Air Force One was foreshadowed a day later on November 9, 2015, when it was reported that China is testing their new anti-satellite missile.

In what appears to be a CIA-spawned military stunt designed to raise the notion of an impending missile strikes over the Pacific Ocean, the U.S. Navy launched a Trident II (D5) missile off coast of Southern California which was visible all over the West Coast of America.

The notion that a head of state will be assassinated while using his personal means of transportation was foreshadowed back on November 1, 2015, when the FBI stated that there is no evidence that a bomb caused the explosion on the Maldives leader’s boat.

In what appears to be post-Obama assassination propaganda, it was reported on November 17, 2015: that Obama has ‘fantasized’ about owning an NBA team after his presidency. Needless to say, it appears that he will never get that chance.

The notion that the political leadership of the United States is about to be sacrificed was ominously foreshadowed by a USA Today report from November 18, 2015, entitled “Bush: Paris Attacks Show that U.S. Leadership is at Stake.

Lastly, in order to highlight Air Force One on an international level just prior to its demise, the Independent published a report on November 19, 2015, entitled “David Cameron to Get Refitted RAF Plane as Budget Version of US President’s Air Force One”.

airforceone3

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

 

China pearl harbor

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

WORLD WAR III: CIA Plotting Proxy War Between US & Russia in Syria to Spark World War III—Russian-Based Nuclear Missile Strike on US and/or Russian-Based Attack/Invasion of Alaska, Syria and/or Ukraine Imminent

RED DAWN SCENARIO: CIA Plotting Chinese Pearl Harbor-Like Surprise Attack—Cloaked Chinese Drone Attack, US Drone Cyber-Hijack Attack & Sub-Based Nuclear Strike on US Top Terror Scenarios

NUCLEAR HOLOCAUST: CIA Plotting Iranian Nuclear Terror Attack on America—LA, NYC, DC & NFL Cities Most Likely to Suffer Attack

ISIS ENDGAME:
How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BOOM: CIA Plotting Man-Made Asteroid Strike this October—JADE HELM States, Gulf of Mexico & Pacific Rim of Fire Most Likely to Suffer Attack

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
October 25, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese attack and/or invasion, most likely targeting the countries of Australia, Japan, the Philippines, Taiwan, and/or the United States.

The impending Chinese attack will likely involve one or more of the following: a) a cyber-related attack on the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Australia Hawaii, Japan, Taiwan, the Philippines and/or mainland United States.

That being said, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

Based on previous Chinese surprise attack plots targeting the National Football League (NFL), an attack on the San Diego Chargers vs. Oakland Raiders game at Qualcomm Stadium in San Diego, California is likely forthcoming. Said attack will also target the numerous U.S. military bases in San Diego County.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 14 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China pearl harbor

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

WORLD WAR III: CIA Plotting Proxy War Between US & Russia in Syria to Spark World War III—Russian-Based Nuclear Missile Strike on US and/or Russian-Based Attack/Invasion of Alaska, Syria and/or Ukraine Imminent

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BOOM: CIA Plotting Man-Made Asteroid Strike this September—JADE HELM States & Gulf of Mexico Most Likely to Suffer Attack

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
September 26, 2015
Truther.org

SWITZERLAND, Zurich —Based on breaking news and events, it appears CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese attack and/or invasion, most likely targeting the countries of Australia, Japan, the Philippines, Taiwan, and/or the United States.

The impending Chinese attack will likely involve one or more of the following: a) a cyber-related attack on the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Australia Hawaii, Japan, Taiwan, the Philippines and/or mainland United States.

That being said, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 14 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China pearl harbor

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

JADE HELM 15: CIA Plotting ISIS Invasion of America, Oak Keeper Massacres, Wave of Domestic/Jihad Terror Attacks, Predator Drone Strikes, Suspension of 2016 US Presidential Election, Martial Law & Obama Dictatorship

BUSTED: Alex Jones Flees America after Being Linked to Obama Plot to Spark a Civil War in Texas During JADE HELM 15

WORLD WAR III: CIA Plotting War III between US & Russia—Staged Russian Invasion of Alaska Imminent

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING: CERN Complex in Switzerland Identified as CIA Headquarters

SHOCK: Death Star Appears Over CERN, Switzerland, Home of the CIA

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
September 3, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears the CIA in Switzerland is preparing to stage a surprise Chinese attack and/or nuclear detonation, most likely targeting the countries of Australia, Japan, Taiwan, the Philippines and/or the United States.

The impending Chinese attack will most likely involve one or more of the following: a) a cyber-related attack targeting the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Australia Hawaii, Japan, Taiwan, the Philippines and/or mainland United States.

That being said, the most likely Chinese attack scenario is the full-scale Chinese attack/invasion of Hawaii, a drone-related cyber-hijack and attack on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, etc.) followed by a full-scale nuclear attack on Las Vegas and/or Los Angeles.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 13 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

In what appears to be pre-Chinese attack/invasion of Taiwan programming, it was reported on August 6, 2015, that Beijing has warned Taiwan against a return to “evil ways” of independence. Translation: a surprise Chinese attack on Taiwan is likely forthcoming, making the island dependent.

Four days later on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, the Financial Times published a report entitled “Chinese Launch Floating Fortress Project”. The timely report was evidently designed to foreshadow a Chinese naval attack, most likely against Taiwan and/or the United States.

That same day, August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In what may be one of the slated Chinese targets, it was reported on August 14, 2015, that the Philippines will open a military base near the disputed sea with China. According to reports, U.S. forces will be present, providing a motive for a revenge-like attack by China.

In what appears to be the war game for a Chinese attack and subsequent invasion, it was reported on August 16, 2015, that China staged naval drills in the Sea of Japan which trained for beach landing. Consequently, the full scale invasion of Hawaii, Japan or Taiwan by China may be imminent.

In what appears to be pre-Chinese attack/invasion programming, more than 10 countries will join China’s massive military parade on September 3, 2015, which appears to be a global publicity stunt designed to show off China’s military strength just prior to a staged attack.

This notion was confirmed by CNN on August 30, 2015, when they published a report entitled “Military Parade to Lift Curtain on China’s ‘Game-Changing’ Missiles, Fighter Fleet” which foreshadowed that the game is about to change in respect to the China’s military.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

The notion that the aforementioned Chinese military parade will lead to war was foreshadowed by a Russia Today report from August 31, 2015, entitled “Dogs of Western Resentment Bark as Chinese WWII Parade Passes”, further raising the specter of Chinese resentment of the West just prior to a staged attack.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting a future confrontation between the U.S. and China.

Lastly, in what appears to be the state-sponsored war games for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing the largest naval exercise yet. Said drill will likely involve an unprovoked attack/invasion of Australia, Hawaii, Japan, Taiwan, the Philippines or the continental United States.

Top Chinese Attack Locations
Although a Pearl Harbor-like surprise attack against the United Stated by China could theoretically transpire in any American city or U.S. military base, the following seven location are the most likely due to their name recognition and close proximity to the Pacific Ocean.

Potential Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan

Cyber War China

Chinese Cyber Attack  on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Chinese EMP Nuke Drone Attack

Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

I. CHINESE CYBER-ATTACK:

u-s-government-warned-of-9-11-like-cyber-attack-67071d7042

1.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

1.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

1.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

II: CYBER-HIJACK DRONE ATTACK:

2.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

drone

2.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

2.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

2.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

2.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

2.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

III. CHINESE NUCLEAR ATTACK:

3.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

Live TV Nuke

3.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

IV. CHINESE EMP ATTACK:

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China pearl harbor

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

JADE HELM 15: CIA Plotting ISIS Invasion of America, Oak Keeper Massacres, Wave of Domestic/Jihad Terror Attacks, Predator Drone Strikes, Suspension of 2016 US Presidential Election, Martial Law & Obama Dictatorship

BUSTED: Alex Jones Flees America after Being Linked to Obama Plot to Spark a Civil War in Texas During JADE HELM 15

WORLD WAR III: CIA Plotting War III between US & Russia—Staged Russian Invasion of Alaska Imminent

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING: CERN Complex in Switzerland Identified as CIA Headquarters

SHOCK: Death Star Appears Over CERN, Switzerland, Home of the CIA

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
September 3, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears the CIA in Switzerland is preparing to stage a surprise Chinese attack and/or nuclear detonation, most likely targeting the countries of Australia, Japan, Taiwan, the Philippines and/or the United States.

The impending Chinese attack will most likely involve one or more of the following: a) a cyber-related attack targeting the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Australia Hawaii, Japan, Taiwan, the Philippines and/or mainland United States.

That being said, the most likely Chinese attack scenario is the full-scale Chinese attack/invasion of Hawaii, a drone-related cyber-hijack and attack on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, etc.) followed by a full-scale nuclear attack on Las Vegas and/or Los Angeles.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 13 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

In what appears to be pre-Chinese attack/invasion of Taiwan programming, it was reported on August 6, 2015, that Beijing has warned Taiwan against a return to “evil ways” of independence. Translation: a surprise Chinese attack on Taiwan is likely forthcoming, making the island dependent.

Four days later on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, the Financial Times published a report entitled “Chinese Launch Floating Fortress Project”. The timely report was evidently designed to foreshadow a Chinese naval attack, most likely against Taiwan and/or the United States.

That same day, August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In what may be one of the slated Chinese targets, it was reported on August 14, 2015, that the Philippines will open a military base near the disputed sea with China. According to reports, U.S. forces will be present, providing a motive for a revenge-like attack by China.

In what appears to be the war game for a Chinese attack and subsequent invasion, it was reported on August 16, 2015, that China staged naval drills in the Sea of Japan which trained for beach landing. Consequently, the full scale invasion of Hawaii, Japan or Taiwan by China may be imminent.

In what appears to be pre-Chinese attack/invasion programming, more than 10 countries will join China’s massive military parade on September 3, 2015, which appears to be a global publicity stunt designed to show off China’s military strength just prior to a staged attack.

This notion was confirmed by CNN on August 30, 2015, when they published a report entitled “Military Parade to Lift Curtain on China’s ‘Game-Changing’ Missiles, Fighter Fleet” which foreshadowed that the game is about to change in respect to the China’s military.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

The notion that the aforementioned Chinese military parade will lead to war was foreshadowed by a Russia Today report from August 31, 2015, entitled “Dogs of Western Resentment Bark as Chinese WWII Parade Passes”, further raising the specter of Chinese resentment of the West just prior to a staged attack.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting a future confrontation between the U.S. and China.

Lastly, in what appears to be the state-sponsored war games for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing the largest naval exercise yet. Said drill will likely involve an unprovoked attack/invasion of Australia, Hawaii, Japan, Taiwan, the Philippines or the continental United States.

Top Chinese Attack Locations
Although a Pearl Harbor-like surprise attack against the United Stated by China could theoretically transpire in any American city or U.S. military base, the following seven location are the most likely due to their name recognition and close proximity to the Pacific Ocean.

Potential Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan

Cyber War China

Chinese Cyber Attack  on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Chinese EMP Nuke Drone Attack

Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

I. CHINESE CYBER-ATTACK:

u-s-government-warned-of-9-11-like-cyber-attack-67071d7042

1.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

1.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

1.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

II: CYBER-HIJACK DRONE ATTACK:

2.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

drone

2.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

2.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

2.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

2.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

2.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

III. CHINESE NUCLEAR ATTACK:

3.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

Live TV Nuke

3.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

IV. CHINESE EMP ATTACK:

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Obama China

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

JADE HELM 15: CIA Plotting ISIS Invasion of America, Oak Keeper Massacres, Wave of Domestic/Jihad Terror Attacks, Predator Drone Strikes, Suspension of 2016 US Presidential Election, Martial Law & Obama Dictatorship

BUSTED: Alex Jones Flees America after Being Linked to Obama Plot to Spark a Civil War in Texas During JADE HELM 15

WORLD WAR III: CIA Plotting War III between US & Russia—Staged Russian Invasion of Alaska Imminent

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING: CERN Complex in Switzerland Identified as CIA Headquarters

SHOCK: Death Star Appears Over CERN, Switzerland, Home of the CIA

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
September 1, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA in Switzerland will attempt to stage a September 2015 cyber-related terror attack on the New York Stock Exchange (NYSE), the US Security and Exchange Commission (SEC), the Federal Reserve Bank (FED). That being said, other global financial institutions may also suffer an attack.

Although the impending cyber-related attacks and heists could theoretically be scapegoated onto ISIS or rouge nation states such as Iran, North Korea or Syria, the country of China, Russia and/or the state-sponsored hacking group known as Anonymous are the most likely to be scapegoated for the unprecedented financial attacks.

Back on December 18, 2014, the U.S. House cybersecurity chairman warned that Wall Street may be the next cyber target of the state-sponsored Sony hackers. The warning confirms, albeit in a de facto manner, that a full-scale cyber-related attack on Wall Street is imminent.

The notion that the New York Stock Exchange (NYSE) is about to suffer a massive cyber-related attack was further highlighted on March 13, 2015, when the owner of the NYSE warned of cyber risks to the market. Any future cyber-attack on the NYSE will have the seal of approval of its owner who stands to gain from such an attack.

In May of 2015, the National Defense Magazine published a report entitled “DHS Rolls out Cyber Security Program for Federal Agencies”. Said program is likely cover for a backdoor whereby DHS can execute a cyber-related attack on any U.S. government agency, namely stock exchanges.

Roughly 2-months later on July 21, 2015, 4 people were reportedly arrested in Florida and Israel for the cyber-attack on JPMorgan. The arrests were designed to sell the notion that hackers are actively targeting financial institutions prior to an unprecedented cyber-heist of the NYSE.

Two days later on July 23, 2015, 3 Estonian men were reportedly sentenced for cyber-related attacks that reached 100 countries. Again, the arrests were designed to further sell the notion that hackers are actively targeting financial institutions prior to an unprecedented cyber-heist of the NYSE.

In what appears to be pre-banking terror propaganda, the Telegraph published a report on August 17, 2015, entitled “Doomsday Clock for Global Market Crash Strikes One Minute to Midnight as Central Banks Lose Control”. Needless to say, the Federal Reserve is the only central bank in America.

Two days later on August 19, 2015, traitorous Infowars published a report entitled “Federal Reserve Directly Responsible for Recessions, Depressions”, providing a timely motive for a so-called domestic terror attack on one or more Federal Reserve Banks.

Roughly a week later on August 25, 2015, a former J.P. Morgan analyst was reportedly charged with a $600,000 insider trading scheme. The indictment was designed to further sell the notion that insiders are actively targeting financial institutions just prior to an unprecedented financial-related cyber-heist.

Less than a week later on August 30, 2015, the Guardian published a report entitled “Central Banks Can’t Save the Markets from a Crash. They Shouldn’t Even Try”. The timely report was designed to foreshadow the notion that a central banks, namely the Federal Reserve, are about to crash.

That same day, August 30, 2015, the Blaze published a report stating that ISIS is now plotting a “Second Blow” to the U.S. financial system. Although an ISIS-related attack on the U.S. economy is theoretically possible, an attack by Anonymous, China, or Russia is far more likely.

Lastly, on August 31, 2015, traitorous Infowars published a report entitled “No Paychecks After Cashless Society “Glitch”” which was evidently designed to foreshadow the notion that banks will crash and people will lose access to their bank accounts, most likely in the aftermath of an unprecedented cyber-related attack.

I. TOP ATTACK SCENARIOS:

Anonymous Twitter

1.1: Twitter Cyber-Attack
Unable to execute a direct cyber-related attack on the New York Stock Exchange (NYSE), it now appears that the Obama administration (at the behest of the CIA in Switzerland) may resort to attacking Twitter instead, possibly with a fraudulent report that causes a massive stock market crash. This notion was foreshadowed back on July 14, 2015, when CNBC published a report entitled “Twitter Shares Jump on Fake Takeover Report”. The term “fake takeover” was evidently designed to foreshadow a real-life fake takeover, namely the terrorist hijacking of a major entity such as the New York Stock Exchange, White House or the U.S. Capitol Building. In the aftermath of this bogus report, investors would instantly lose all faith in America, dumping their collective stock and crashing the market. In order to foreshadow that Twitter will be used in an upcoming terror attack, Fox News published a report on July 24, 2015, entitled “Could Twitter Stop the Next Terror Attack?”. Properly translated, the headline should read “Twitter Will Start the Next Terror Attack”. This exact scenario was beta-tested back on April 23, 2015, when the Twitter account of the Associated Press (AP) allegedly suffered a cyber-attack. The state-sponsored hackers then tweeted: “Breaking: Two explosions in the White House and Obama is injured”. The fake tween caused a subsequent panic which ultimately resulted in a 3-minute plunge of the NYSE, wiping out a total of $136.5 billion of its value. Needless to say, a redux attack now appears to be in order, most likely by the state-sponsored hacking group known as Anonymous who is very active on Twitter.

Twitter NYSE

1.2: Flash Crash Cyber-Attack

It now appears that the CIA in Switzerland will attempt to execute an attack on the New York Stock Exchange (NYSE) another way—most likely via a false-flag power failure. This particular notion as foreshadowed on April 17, 2015, when Bloomberg screens went dark worldwide. Four days later on April 21, 2015, it was reported that a futures trader was charged for manipulating the stock market which contributed to the 2010 “Flash Crash”. Given the 5-year delay in the banker’s indictment, it can be deduced that the patsy was only charged in order to foreshadow the “Flash Crash” just prior to another one transpiring in reality, most likely post-power failure.

nyse1

1.3: NYSE Cyber-Attack
The latest New York Stock Exchange (NYSE) cyber-terror plot appears to be a redux of two previously foiled terror plots as depicted in the March 20, 2014 Truther.org report entitled “Impending Wall Street Banking Cyber-Heist to Transfer Billions to Bitcoin”, and the April 15, 2014 Truther.org report entitled “Feds Planning High Frequency Trading Cyber-Attack via “Heartbleed” Bug”. In short, hackers will cause a “High Frequency Trading” sell-off (which they will short-sell), the profits of which will be deposited in untraceable Bitcoin accounts. In order to provide a motive for a Bitcoin-related cyber-terror attack, the IRS declared that Bitcoin was not an official currency on March 25, 2014. Roughly 3-months later on June 13, 2014, it was revealed that the FBI will auction off seized Bitcoins worth $18m on June 27, 2014, the impending date of the attack. In order to raise the profile of banks prior to a debilitating cyber-terror attack that will likely bankrupt millions of investors, Vice President Joe Biden stated on June 23, 2014 that “I don’t have a savings account”. Two days later on June 25, 2014, the U.S. Federal Reserve warned that banks face “tougher tests” ahead, an ominous sign that a so-called “test” (i.e., attack) is imminent. Although impossible to prove, it appears that Bitcoin was specifically created to be an untraceable depository for stolen funds from a Wall Street cyber-attack. In other words, the hackers play the role of Robin Hood by stealing from the rich (i.e., Wall Street) and giving to the poor (i.e., Bitcoin)—the only catch being that Robin Hood is invisible.

II. TOP CYBER SCAPEGOATS:

hackers-cyber-crime-anonymousv1

2.1: Anonymous Cyber-Hijack of U.S. Economy
Although an unprecedented cyber-terror attack on the U.S. economy could be blamed on China, the Guardians of Peace, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack, funneling the stolen money into allegedly untraceable Bitcoin accounts. Coincidentally, on October 2, 2014, it was revealed that an FBI informant admittedly organized Anonymous attacks on government websites in 30 countries, further confirming that the group known as Anonymous is in fact state-sponsored. The timely report was designed to set the precedent for an Anonymous attack on government-related websites such as the FED, NYSE, SEC, etc. An Anonymous-based cyber-attack will enable the progenitors of terror (i.e., the CIA) to steal billions if not trillions of dollars from the U.S. economy without a trace. Should a sovereign country be deemed responsible for the heist, defrauded investors worldwide would collectively demand compensation from that particular country, something the CIA does not want to deal with. In what appears to be pre-Wall Street cyber-attack logistics, it was revealed back on July 8, 2014, that Wall Street has now hired a former NSA chief to help create a “cyber war council”. Translation: Wall Street and the NSA are teaming up together to execute a Wall Street cyber-hijack which will likely disappear trillions of dollars, bankrupting the U.S. economy. In the wake of the attack, the NSA chief will likely be scapegoated for the attack.

2.2: Anonymous Stock Market Attack
In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely an alleged member of Anonymous.

China Chinese Hack Cyber II

2.3: Chinese Cyber Attack
Back on July 7, 2015, Truther.org published a report entitled “Swiss CIA Plotting Chinese-Based Hack & Cyber-Heist of Global Stock Markets”, warning of an impending cyber-attack on the New York Stock Exchange (NYSE). Less than 24-hours later on July 8, 2015, trading at the NYSE was inexplicably shut down for 4-hours. According to the CEO of the NYSE, the shutdown was “probably” due to a cyberattack. That same day, July 8, 2015, the state-sponsored hacking group known as Anonymous published a tweet on Twitter “predicting” the NYSE glitch. Since Twitter is run by the CIA they can pre-date tweets as was evidently the case. By blaming Anonymous, it took the focus off of China which Truther.org predicted would be scapegoated for the cyber-attack on the New York Stock Exchange.

2.4: Russian Cyber-Scapegoat
In the aftermath of unprecedented cyber-related terror attacks on Europe and/or the United States, the Swiss CIA may finger Russia. In order to create the narrative in the media that Russia is actively targeting America with cyber-related attacks, it was reported back on April 8, 2015, that Russia hacked the Obama White House. Roughly 2-weeks later on April 23, 2015, it was revealed that Russians hacked the Pentagon’s network, a fraudulent notion to be sure. Two days later on April 25, 2015, it was reported that Russian hackers read Obama’s unclassified emails. Roughly 3-weeks later on May 14, 2015, it was reported that Russian hackers are now targeting U.S. banks, an apparent preview of things to come. Less than 2-week later on May 27, 2015, it was reported that the IRS now believes that a recent cyberattack on its network originated in Russia. Needless to say, these reports, taken collectively, suggest that Russia will be scapegoated in the aftermath of an unprecedented cyber-terror attack targeting the U.S. financial system, leading to a new Cold War.

III. THE SET-UP:

reign-malware-1000x520

3.1: Regin Malware
In what appears to be pre-financial cyber-attack hardware, on November 23, 2014. CNN published a report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure has been hijacked by the Regin malware and therefore any type of cyber-related attack on America’s financial infrastructure is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.2: Federal Security Breaches
If reports are to be believed, the U.S. federal government is highly susceptible to cyber-attacks, making the likelihood of a major financial cyber-hijack all the more believable. For example, on November 4, 2014, it was reported that a cyber-attack on a federal security contractor wasn’t noticed for months. Therefore, if the FED, NYSE or SEC is hacked in 2014, it won’t be noticed days or even weeks. This in essence allows the CIA to stage a financial-related attack whenever they want without any forewarning. Six days later on November 10, 2014, it was reported that federal firewalls are struggling against the increasing number of cyber-attacks. The timely report was designed to give the U.S. government plausible deniability in the wake of a financial-related terror attacks that bankrupt the U.S. economy. Also on November 10, 2014, the U.S, Postal Service was reportedly hacked, resulting in employee and customer information being compromised. Needless to say, the incident was designed to set the precedent for a far worse cyber-attack on the U.S. federal government, most likely the FED or SEC.

Ukraine’s-Election-Commission-Denies-Cyber-Attack

3.3: Financial Cyber-Attacks Trending
A preview of financial related cyber-terror recently occurred on July 10, 2014, when it was reported that Norwegian banks suffered the largest-ever DDoS attack in their history, an act which the state-sponsored terror group known as Anonymous predictably took credit for. Because all 206 countries are under the command and control of the CIA, events tend to happen in other countries before transpire in America on a much larger scale. Roughly 2-weeks later on July 25, 2014, the European Central Bank was allegedly hacked and personal data stolen. Roughly a month later on August 27, 2014, it was revealed that the FBI is now investigating a cyber-attack on JPMorgan. Roughly 3-weeks later on September 17, 2014, members from Anonymous and an Occupy Wall Street group reportedly abolishes nearly $4 million in student loan debt on September 17, 2014, foreshadowing the notion of Anonymous vanishing millions into thin air. Roughly 3-weeks alter on October 3, 2014, the New York Times published a report entitled “Hackers’ Attack Cracked 10 Financial Firms in Major Assault”, further foreshadowing financial-related cyber-terror. Also on October 3, 2014, it was reported that the JP Morgan data breach affected 76 million households, a laughable notion considering that the population of the U.S. is only 300 million people. A few weeks later on October 20, 2014, U.S. officials warned 500 million financial records may have been hacked. The timely propaganda report was evidently published in order to show that financial-related cyber-terror is imminent just prior to an unprecedented attack on the U.S. financial system. Taken collectively, these timely reports have set the precedent for future bank-related cyber-terror attacks, most likely targeting the FED, NYSE, or SEC.

VI. BANKING DRILLS & WAR GAMES:

Cyber War China

4.1: Banking Cyber-Attack War Games
Back on January 16, 2015, it was revealed that a so-called “cyber-attack war games” will be staged by US and UK at a future and undisclosed date. War games have a history of going “live” which is why they are staged in the first place. The first war game will reportedly involve the Bank of England and commercial banks, targeting the City of London and Wall Street. These war games will be followed by “further exercises to test critical national infrastructure”. In other words, the entire financial system of the West will likely suffer a massive cyber-related terror attack.

4.2: Bank Terror Drills
In what appears to be cover drills for the controlled demolition of the U.S. economy, it was reported on October 10, 2014, that the U.S. and the UK will execute a “big bank collapse” simulation. According to reports, officials will “get together in a war room next week to see if they can cope with any possible fall-out when the next big bank topples over”. The banking collapse drill will reportedly involve Federal Reserve Chair Janet Yellen and Bank of England Governor Mark Carney, and be hosted by the U.S. Federal Deposit Insurance Corporation (FDIC). The drill will involve the hypothetical failure of U.S. banks, most likely the Federal Reserve. Needless to say, key term such as “collapse” and “topples over” are designed to foreshadow that a controlled demolition of the U.S. economy is indeed planned. Roughly 2-weeks late on October 26, 2014, it was reported that four in five Eurozone banks pass European Central Bank health test. Interestedly, the very next day, October 27, 2014, it was reported that 25 European Union banks failed a “stress test” exposing a $31billion shortfall. The bi-polar reporting was evidently designed to insinuate that banks are on the verge stressed to the point of collapse.

Major-US-Financial-Institutions-to-Take-Part-in-Quantum-Dawn-2-Cyber-Exercise

4.3: “Quantum Dawn II″ Terror Drill
Prior to a major cyber-terror attack on the New York Stock Exchange (NYSE), one would expect there to be some stock-market related terror drills to prepare Wall Street insiders for the attack. Coincidentally, on June 13th, 2013, it was reported that Wall Street executed “Quantum Dawn 2”, a cyber-terror war-game apparently meant to give insiders an opportunity to make financial moves before the market crashes—for good. According to the report, Cyber Strategies oversaw a terror exercise which included Citigroup, Bank of America, the Department of Homeland Security, the Treasury Department, the Federal Reserve, the Securities and Exchange Commission, as well as 40 other firms. The drill, which featured a hacker, possibly from China, operating from a fake trading platform, prompted a response in which the participants facilitated a conference call to “figure out what was going on”. In other words, the drill simulated a real-life scenario in which insider firms received the “heads up” about an impending cyber-attack and subsequently shared this information accordingly so that their bank accounts and those of their clients would not be affected. The same sort of thing occurred just prior to 9/11 when “put options” or bets were taken out on United Airlines and American Airlines, the two airline companies involved in the attacks. According to the “9/11 Commission Report”, “some unusual trading did in fact occur”, however, it claimed that, “each such trade proved to have an innocuous explanation”.

4.4: “Quantum Dawn II” Fallout
In the October 23, 2013, Fox Business report entitled “‘White Hat’ Hackers Expose Flaws of U.S. Stock Market”, the details of the “Quantum Dawn 2”  cyber-attack exercise were revealed. According to the report, ethical “white hat” hackers intentionally “looking to expose the cyber vulnerabilities of U.S. equity markets”, were able to directly impact market performance by “forcing a mock market close”. According to the report, more than 50 entities and 500 people in the financial services sector participated in the cyber-attack which was executed by the Securities Industry and Financial Markets Association (SIFMA) on July 18, 2013. So called “ethical hackers” were told to give everything they had to try and cripple the U.S. stock market during the 6-hour exercise. “Quantum Dawn 2 demonstrated the industry’s resiliency when faced with serious cyber-attacks that aimed to steal money, crash systems and disrupt equity market trading,” SIFMA CEO Judd Gregg stated. According to Cedric Leighton, a former U.S. intelligence officer, “The more realistic the exercise the better prepared they’ll be if and when attacks from a cyber standpoint occur”.

V. ATTACK AFTERMATH:

5.1: DHS Banking Continuity
In the wake of a major U.S. bank or stock market, a global financial panic in respect to the U.S. dollar will likely ensure. According to a December 10, 2004, CRS Report for Congress entitled “Homeland Security: Banking and Financial: Infrastructure Continuity”, bank terror and financial collapse have been planned for accordingly. According to the report, “H.R. 2043 sought to address bank risks under terrorism” and the Terrorism Risk Insurance Act of 2002 (TRIA) “provides a federal backstop for insurers willing to provide terrorism insurance”, ultimately protecting insurance banks against “catastrophic payouts in case of terrorist attacks”.  In other words, if and when a bank related terror attacks occur resulting in financial panic, private banks will not have to foot the bill for their losses because the U.S. government has assumed all the risk and liability. This convenient set-up essentially guarantees that the U.S. government, not the banks, will go bankrupt in the aftermath of bank related terror attacks.

US-court-cyber-attack

5.2: Banking “Contagion Effect”
In the aftermath of U.S. bank failures (a bi-product of an irreversible U.S. stock market crash), other banks will begin to panic, setting off a chain reaction of banking collapses around the world. The aforementioned CRS Report for Congress found that when one bank goes, the rest will follow:  “Financial institutions face two categories of emergencies that could impair their functioning. The first is directly financial: danger of a sudden drop in the value of financial assets, whether originating domestically or elsewhere in the world, such that a global financial crisis might follow. The second is operational: failure of physical support structures that underlie the financial system. Either could disrupt the nation’s ability to supply goods and services and alter the behavior of individuals in fear of the disruption (or fear of greater disruption). They could reduce the pace of economic activity, or at an extreme, cause an actual contraction of economic activity”. The report went on to state that “Collapse of one prominent entity could evoke a contagion effect, in which sound financial institutions become viewed as weak — today’s equivalents of a bank run, in which panicked customers withdraw funds from many entities, causing others to fail as well

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

2015 World Championships in Athletics

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, consider this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

JADE HELM 15: CIA Plotting ISIS Invasion of America, Oak Keeper Massacres, Wave of Domestic/Jihad Terror Attacks, Predator Drone Strikes, Suspension of 2016 US Presidential Election, Martial Law & Obama Dictatorship

WORLD WAR III: CIA Plotting War III between US & Russia—Staged Russian Invasion of Alaska Imminent

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

BREAKING: CERN Complex in Switzerland Identified as CIA Headquarters

David Chase Taylor
August 22, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA in Switzerland is plotting a WMD-related terror attack on the 2015 World Championships in Athletics which will be held in Beijing, China from August 22-30, 2015.

Exactly what type of attack is planned for the 2015 World Championships in Athletics is not known, but a nuclear and/or bio-chemical attack from a North Korean missile is the most likely terror scenario. That being said, a 9/11-style attack, conventional bombing, hostage crisis and/or terrorist siege are also possible.

Back on August 13, 2015, 2 huge explosions occurred in the Chinese city of Tianjin, killing 50 and injuring more than 700. Considering that Tianjin is just across the bay from North Korea, the explosions will likely be blamed on a North Korean missile strike in the near future.

China could also suffer a Mumbai-like terror attack during the 2015 World Championships in Athletics in which multiple locations are attacked simultaneously. Consequently, the entire city of Beijing may come under attack by Special Forces (i.e., professional terrorists) wearing black ski masks.

The Swiss CIA could engineer a so-called “accident” or “natural disaster” during the 2015 World Championships in Athletics (e.g., fire, gas explosion, stadium collapse, stampede, vehicle manslaughter attack, etc.) which would kill and terrorize thousands of athletes and fans in attendance.

In a June 7, 2015, report from the Toronto Sun entitled “Could Terrorists Lay Claim to Random Mishaps at Pan AM Games?”, it was revealed that “…terrorists could win a medal […] by doing something like taking responsibility for an accidental food poisoning outbreak at the athletes’ village”.

The report also stated that the 25th World Conference of Disaster Management examined “security, terrorism, natural hazards, climate change, privacy breaches, cyber-attacks, virus outbreaks and a host of other possible threats for events like the Pan Am Games in Toronto”.

As foretold in the Bio-Terror Bible, the genesis of the 2015 bio-terror pandemic will be a “made-for-TV event” whereby millions will witness a bio-terror outbreak on “live” television. The bio-terror attack will occur when the agents known as anthrax (Bacillus anthracis) and/or smallpox (Variola major) are released into a controlled environment such as an arena or stadium.

Although a North Korean missile strike is the most likely bio-terror attack scenario, a bio-chemical attack may come courtesy of Malaysian Airlines Flight MH370 which was explicitly hijacked by Swiss CIA on March 8, 2014, in order to execute a surprise WMD-related terror attack, possibly in Beijing, China.

Because Beijing is located on the Pacific Ocean, Malaysian Airlines Flight MH 370 could theoretically fly in off the water from an undisclosed location (e.g., Malaysia) at full speed, attacking of the 2015 World Championships in Athletics prior to a retaliatory military response from the Chinese Air Force.

I. NORTH KOREA NUCLEAR ATTACK:

Nuclear-Threats-from-North-Korea

1.1: North Korean Nuclear Attack
Prior to executing a North Korean nuclear attack upon the United States, the CIA must establish a believable narrative through their respective governments and media platforms that North Korea has an active nuclear weapons program. This narrative originally began back on October 24, 2014, when a U.S. general stated that North Korea may have nuke missile knowhow. U.S. generals have evidently been instructed to speak publically about the impending attack so that the public will already be acclimated to the idea when it actually happens. Showing the duplicity of the U.S. government, a United Nations report from March 29, 2014, found that U.S. parts are now in North Korean rockets. In the wake of a North Korean nuclear/EMP attack, parts of the rocket will be blown across the U.S. Consequently, the report was published premeditatively in order to counter any “conspiracy theories” that the rocket was made and launched by the U.S. military. More recently, on April 4, 2014, North Korea allegedly told the world “wait and see” in respect to its latest nuclear test. Roughly a month later on May 10, 2014, North Korea threatened to conduct a “counter-measure” nuclear test. A few months later on July 28, 2014, North Korea threatened a nuclear strike on White House, showing that they are indeed planning to attack America while Obama is in office. Even more recently, on March 20, 2015, it was reported that North Korea is now “prepared” to fire a nuclear missile. The timely propaganda report was designed to show that North Korea is now preparing to launch a nuclear attack, most likely using an Intercontinental Ballistic Missile (ICMB). Roughly a month later on April 8, 2015, NORAD confirmed that North Korea is now capable of launching a “mobile’ nuke” missile into the United States: Roughly 2-weeks later on April 23, 2015, CNN published a report entitled “North Korea’s Troubling Nuclear Progress”, foreshadowing the notion that North Korean nuclear terror is on the horizon. That same day, April 23, 2015, China reportedly issued a warning over North Korea’s nuclear production, highlighting their nuclear program on an international level just prior to the impending attack. Two weeks later on May 7, 2015, CNN published a report entitled “Exclusive: North Korea Would Use Nukes if ‘Forced,’ Official Says, confirming that a North Korean nuclear attack is imminent. Roughly 3-weeks later on May 20, 2015, CNN published another report entitled “North Korea Says it Can Miniaturize Nuclear Weapons”, potentially foreshadowing a submarine-related nuclear terror attack. Lastly, that same day, May 20, 2015, the BBC published a report entitled “What Lies Behind North Korea’s Nuclear Claims”, raising the specter of a North Korean nuclear attack just prior to it transpiring in reality. Needless to say, these reports, taken collectively, suggest that an unprecedented nuclear attack on the United States by North Korea is imminent.

130411184420-tsr-lawrence-north-korea-missiles-nuclear-capable-00002010-story-top

1.2: Nuclear Tests by North Korea
As evidenced, North Korea has continued their nuclear tests regardless of the sanctions imposed by the United Nations. With each passing nuclear test, the respective yield of the test jumps considerably higher. Therefore, the 4th nuclear test (or the 1st North Korean nuclear attack) should yield somewhere in the neighborhood of 25-40 kilotons of TNT, an amount on par with Pakistan’s nuclear program. According to physicists who testified before a U.S. Congress hearing back on October 7, 1999, nuclear weapons with yields of 10 kilotons or less can produce a large EMP that is capable of destroying America’s electrical grid.

North Korean Nuclear Test Timeline:

1. October 9, 2006: 1st Nuclear Test: Device: Fission: Type: Underground: Yield: 0.5 kilotons of TNT
2. May 25, 2009: 2nd Nuclear Test: Device: Fission: Type: Underground: Yield: 2.35 kilotons of TNT
3. February 12, 2013: 3rd Nuclear Test: Device: Fission: Type: Underground: Yield: 6-9 kilotons of TNT

II. NORTH KOREA BIO-CHEMICAL ATTACK:

North Korean Bio-Terror

2.1: North Korean Bio-Terror Propaganda
The notion that the Swiss CIA is actively plotting a North Korean bio-terror attack via missile was first exposed back on March 31, 2013, in a Truther.org report entitled “North Korea’s False-Flag Bio-Terror Attack Plan Revealed”. If the news and propaganda in respect to North Korea is to be believed, North Korea has an “active” and “secretive” bioweapons program which has been allegedly testing bioweapons on children. Also, North Korea attempted to launch a biochemical attack against South Korea prior to the G20 Summit in Seoul, and has the ability to produce upwards of 1.25 million chemical bombs. They also have approximately 200,000 troops, which are reportedly ready to carry out military operations, including the dispersal of anthrax spores with specialized equipment. North Korea was also “caught” shipping approximately 14,000 anti-chemical weapons suits along with reagents used to identify chemical substances that become airborne after a chemical weapons attack. Lastly, North Korea plans to use recently purchased American-made drones to target South Korean troops stationed on border. In the event that North Korea executes a bio-terror attack on the U.S., it will most likely come from a missile laden with anthrax (Bacillus anthracis) and/or smallpox (Variola major). Although the impending North Korean bio-terror missile attack could theoretically target Alaska, Hawaii, Nevada, Oregon or Washington, California is the most likely target. Regardless of the location struck, the outbreak will spread, sparking the bio-terror pandemic planned for 2015. Back on June 6, 2015, it was reported that a South Korean Air Force member at a U.S. military base in Korea has MERS, a highly contagious pathogen. The timely propaganda report was designed to associate Korea with biological outbreak just prior to a North Korean bio-terror missile attack. Lastly, in order to associate North Korea with Anthrax just prior to an unprecedented Anthrax-laden missile strike by North Korea, Fusion published a report on June 4, 2015, entitled “North Korea is Very, Very Mad at the U.S. for Sending Anthrax to South Korea”.

2.2: North Korean’s “Active” Bio-Weapons Program
Back on September 7, 2005, a U.S. government report stated that there was an “active” biological weapons program in North Korea. The findings were outlined in the State Department’s “Adherence to and Compliance with Arms Control, Nonproliferation, and Disarmament Agreements and Commitments” report. According to the report, North Korea has a “dedicated, national-level effort to develop a Bio-Weapons capability”.

2.3: North Korea “Tests [Bio] Weapons on Children”
Back on July 24, 2009, it was reported that an ex-North Korean special forces captain named Im Chun-yong had confirmed that biological and chemical weapons were being tested on children in North Korea, specifically those who were mentally retarded or physically handicapped. Im is quoted as saying, “If you are born mentally or physically deficient, the government says your best contribution to society… is as a guinea pig for biological and chemical weapons testing.” Im also stated that he was trained how to use biochemical weapons against the “enemy” – including how to fire them from short-range “bazooka-style” weapons. The report went on to state that North Korea has 5,000 tons of biochemical weaponry including mustard gas, nerve agents, sarin, anthrax and cholera.

2.4: North Korea’s “Secret” Bioweapons Program
Back on October 1, 2009, it was reported that North Korea has developed a vast bioweapons (BW) research and development program in secrecy. According to the report, the top-secret BW program is located within the infrastructure of a civilian research organization which encompasses at least 20 facilities throughout the country, including 12 chemical weapons plants. The report further stated that the North Korea’s BW program has 5000 tons of biological agents including smallpox, pneumonic plague, cholera, botulism, sarin, mustard gas and hydrogen cyanide.

2.5: North Korea’s “Anthrax Missile”
Back on October 1, 2009, it was reported that an anthrax attack by North Korea “might use a modified missile that cruises at low altitude to spray a fine mist of weaponized germs over its target area” which could have the “potential to decimate South Korea and the 28,000 U.S. troops” stationed in the DMZ. North Korea is the only world government that has never signed, acceded to or even responded to invitations to join the Chemical Weapons Convention.

2.6: North Korea’s “13 Types” of Bio-Weapons

Back on October 5, 2009, it was reported that North Korea allegedly has 5,000 tons of chemical weapons including 13 types of viruses and germs which could be used in a future bio-terror attack. According to the report, the list of North Korean chemical and biological weapons includes cholera, yellow fever, smallpox, eruptive typhus, rickettsia, mustard gas, phosgene, colorless poison gas, blood agents, sarin, and tabun (a liquid chemical compound used as a nerve gas), all of which could theoretically  “be deliverable by artillery or missile to cause massive civilian casualties in South Korea”.

2.7: North Korea’s “G20 Bio-Terror Attack” Plan
Back on August 13, 2010, it was reported that North Korea had attempted to launch a biochemical attack against South Korea prior to the G20 Summit in Seoul, South Korea. According to Choi Sung-yong, the head of Family Assembly Abducted to North Korea, North Korea was preparing to send “20 different deadly biochemical weapons attached to balloons and parachutes across the border”. Choi allegedly received the information about the impeding attack from “an active soldier in the North Korean Army”. Three months later on November 12, 2010, Sung-yong’s original report was confirmed when British diplomats also raised concerns that North Korea could strike South Korea with biological weapons during the G20 Summit in order to create an attention grabbing event. According to diplomatic sources within the U.K., a North Korean attack could consist of an incursion into South Korean waters, missile testing in South Korean airspace, or the use of biological weapons filled balloons against the Seoul.

2.8: North Korea’s “1.25 Million Chemical Bombs”
Back on October 14, 2010, it was reported that Kwon Yang-Joo, an official with Korea Institute for Defense Analyses (KIDA), had stated that North Korea could easily manufacture up to 12,000 tons of chemical weapons as well as produce upwards of 1.25 million chemical bombs, all of which could be deliverable by aircraft, missiles or artillery shells. Yang-Joo went on to state that North Korea’s chemical weapons stockpile is South Korea’s number one security priority and that, “The international community must show its strong will in seeking disarmament of North Korea’s chemical weapons”.

2.9: North Korean “Anthrax Attack Could Kill 600,000”
Back on October 27, 2011, it was reported that an American defense expert warned that North Korean could kill between 20,000 and 600,000 South Koreans if it released anthrax over Seoul. According to Bruce Bennett of the RAND Corporation, a North Korean attack using an aerosolized form of anthrax would leave many with respiratory anthrax, the most difficult form of the illness to treat. Bennett also stated that North Korea would most likely use several means of dispersing anthrax spores, including missiles, aircraft and Special Forces equipped with specialized equipment. Bennett warned that the use of biological weapons by North Korea would occur as a prelude to an attack and encouraged South Korea to investigate domestic terror groups with connections to North Korea that were capable of spreading chemical materials over a large area.

2.10: North Korean Chemical Attack Would “Cause Panic”
Back on December 20, 2011, it was reported that U.S. and allied military planners believe that although South Korea would ultimately win in a conventional war, North Korea would seek to cause panic by using its chemical and biological arsenal. South Korean defense estimates that the army of North Korea is in possession of 2,500 to 5,000 tons of chemical weapons, including mustard, phosgene, blood agents, sarin, tabun, V-agents, botulinum toxin and anthrax. According to the report, North Korea’s chemical agents could be delivered by aircraft, ballistic missiles, long-range artillery, rocket launchers or naval vessels.

2.11: North Korea’s Bio-Chemical Attack Plan Exposed
Back in 2012, the International Institute for Strategic Studies (IISS) released a suspicious report in respect to North Korea’s chemical and biological weapons program. Despite the fact that North Korea is rogue terrorist nation, the IISS think-tank of London, England, curiously reveal “North Korea’s offensive military plans”, with no mention of how they are privy to such information: “North Korean forces could use chemical weapons against US and South Korean forces to reduce these forces’ combat effectiveness, deny the use of mobilization centers, storage areas, and military bases…chemical agents could be used to help break through defensive lines or to hinder an allied counterattack…chemical agents could be used against fixed targets, including command and control centers, logistics hubs, and airbases…North Korean offensive military plans include the use of chemical agents delivered by a variety of traditional means, such as ballistic missiles, artillery rockets and shells, mortars, and aerial bombs and sprays, against both military and civilian targets…North Korea is capable of producing significant amounts of common biological agents, such as anthrax, and delivering these agents through a variety of conventional and unconventional means…North Korea possesses chemical weapons and is prepared to use them against military and civilian targets in offensive operations or in retaliation for an attack on North Korea…At the strategic level, the potential delivery of large quantities of chemical or biological agents to nearby targets (such as Seoul) and smaller quantities to more distant targets (such as Tokyo) could cause significant civilian casualties.”

2.12: U.N. Investigates North Korea for Exporting Chemical Weapons
Back on January 6, 2012, it was reported that the United Nations is looking into allegations that North Korea attempted to export chemical weapons to Syria in 2009. According to the report, Greek authorities allegedly seized a shipping container from a Liberia-registered freighter stuffed with approximately 14,000 anti-chemical weapons suits along with multiple types of ampules believed to be made of glass containing powdered or liquid reagents used to identify chemical substances that become airborne after a chemical weapons attack. These reagents can either be used during a chemical weapons attack or in the defense against them. The Greek government reported the seizures of the ampules and suits in September of 2011 as a violation of the U.N. Security Council’s Sanctions Committee’s resolution banning North Korea from exporting arms-related materials.

2.13: Korean Smallpox Outbreak “Risk Is Double”
Back on May 14, 2012, it was reported that North Korea has the biological ability to create the smallpox deadly virus. According to a report in the Korea Herald, Jacob Cohn, a representative of Danish vaccine maker Bavarian Nordic, stated that, “Anyone who has the intent and the capability can now create the smallpox virus, which is the most devastating disease we have ever seen…Here the risk (of a smallpox outbreak) is double, in the sense that you have a next door neighbor and you have the international community risk.”

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Obama China

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, consider this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

JADE HELM 15: Swiss CIA Plotting ‘Robin Sage’ Redux, Attacks on Jade Helm Soldiers by ‘Operation Counter Jade Helm’, Domestic & ISIS Terror Attacks, Predator Drone Strikes, Suspension of 2016 US Presidential Election, Martial Law & Obama Dictatorship

WORLD WAR III: How and Why the Swiss CIA Will Trigger Nuclear War Between US-Led NATO & Russia

ISIS ENDGAME: How and Why the CIA in Switzerland Created ISIS as Cover for Nuclear and Biological Terror Attacks

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

BREAKING: CERN Complex in Switzerland Identified as CIA Headquarters

David Chase Taylor
August 14, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears the CIA in Switzerland is preparing to stage a surprise Chinese attack and/or nuclear detonation, most likely targeting the countries of Australia, Japan, Taiwan and/or the United States.

The impending Chinese attack will most likely involve one or more of the following: a) a cyber-related attack targeting the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Hawaii, Japan, Taiwan and/or mainland United States.

That being said, the most likely Chinese attack scenario is a drone-related attack on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, etc.) followed by a full-scale nuclear attack on Las Vegas and/or Los Angeles.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 12 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

In what appears to be pre-Chinese attack/invasion of Taiwan programming, it was reported on August 6, 2015, that Beijing has warned Taiwan against a return to “evil ways” of independence. Translation: a surprise Chinese attack on Taiwan is likely forthcoming, making the island dependent.

Four days later on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, the Financial Times published a report entitled “Chinese Launch Floating Fortress Project”. The timely report was evidently designed to foreshadow a Chinese naval attack, most likely against Taiwan and/or the United States.

Lastly, on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

Cyber War China

Chinese Cyber Attack  on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

Top Chinese Attack Locations
Although a Pearl Harbor-like surprise attack against the United Stated by China could theoretically transpire in any American city or U.S. military base, the following seven location are the most likely due to their name recognition and close proximity to the Pacific Ocean.

Potential Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9. Japan

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Chinese EMP Nuke Drone Attack

Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

I. CHINESE CYBER-ATTACK:

u-s-government-warned-of-9-11-like-cyber-attack-67071d7042

1.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

1.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

1.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

II: CYBER-HIJACK DRONE ATTACK:

2.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

drone

2.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

2.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

2.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

2.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

2.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

III. CHINESE NUCLEAR ATTACK:

3.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

Live TV Nuke

3.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

IV. CHINESE EMP ATTACK:

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China Chinese Sub Nuke Nuclear

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, am currently in the process of applying for political asylum in Switzerland (which is coincidentally home to the CIA), the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, consider this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

WORLD WAR III: How and Why the Swiss CIA Will Trigger Nuclear War Between US-Led NATO & Russia

ISIS ENDGAME: How and Why the CIA in Switzerland Created ISIS as Cover for Nuclear and Biological Terror Attacks

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
July 10, 2015
Truther.org

SWITZERLAND, ZurichBased on breaking news and events, it appears the CIA in Switzerland is preparing to stage a surprise Chinese attack and/or nuclear detonation, most likely targeting the countries of Australia, Japan and/or the United States.

The impending Chinese attack will most likely involve one or more of the following: a) a cyber-attack on the Australia, Japanese or U.S. military; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Hawaii, Japan, and/or mainland United States.

That being said, the most likely Chinese attack scenario is a drone-related attack on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, etc.) followed by a full-scale nuclear attack on Las Vegas and/or Los Angeles.

In what appears to be the war games which will spark a nuclear war between China and the United States, the Australian, Japanese and U.S. military are now executing military drills dubbed “Talisman Saber” which began on July 7, 2015.

According to an official statement on the Talisman Sabre exercises, “Japan will join a major US-Australian military exercise for the first time in a sign of growing security links between the three countries as tensions fester over China’s island building in the South China Sea”.

Nevertheless, Japanese Defense Minister General Nakatani rejected any so-called theories the exercises were targeted at China. Only 40 Japanese officers and soldiers will participate in the war games which will reportedly involve roughly 30,000 U.S. and Australian troops.

Consequently, a Chinese attack on the aforementioned drills and/or the counties of Australia. Japan and/or the U.S. may now be forthcoming as the drills have provided a timely motive for an unprovoked attack by the Chinese government.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 11 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

In what appears to be pre-Chinese cyber-attack programming, it was reported back on July 8, 2015, that a German missile battery received orders from unknown hackers. In the aftermath of a Chinese cyber-attack on the U.S. military, the attack in Germany will likely be dubbed a beta-test by the Chinese.

The notion of a nuclear terror attack in Las Vegas was ominously foreshadowed on July 8, 2015, when it was revealed that the U.S. Air Force dropped a fake nuclear bomb in Nevada. The test was evidently executed in order to provide political cover for the Swiss CIA who is orchestrating the attack from Europe.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

In the event that a Chinese nuclear attack is launched against the United States, it will most likely emanate from a Chinese submarine in the Pacific Ocean. The notion of stealth subs was highlighted by Russia Today on July 6, 2015, in a report entitled “New Acoustic Detection System to Make Russian Navy’s 4th-Gen Stealth Subs Even Quieter”.

A day later on July 7, 2015, Subway suspends its relationship with Jared Fogle after an FBI raid on his home for child porn. Since Fogle will never serve a day in jail, it can be deducted that the incident was staged or fabricated in order to raise the notion of subs just prior to submarine-related attack by China.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

Top Chinese Attack Locations
Although a Pearl Harbor-like surprise attack against the United Stated by China could theoretically transpire in any American city or U.S. military base, the following seven location are the most likely due to their name recognition and close proximity to the Pacific Ocean.

Potential Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9. Japan

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Chinese EMP Nuke Drone Attack

Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

I. CHINESE CYBER-ATTACK:

u-s-government-warned-of-9-11-like-cyber-attack-67071d7042

1.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

1.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

1.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

II: CYBER-HIJACK DRONE ATTACK:

2.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

drone

2.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

2.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

2.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

2.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

2.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

III. CHINESE NUCLEAR ATTACK:

3.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

Live TV Nuke

3.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

IV. CHINESE EMP ATTACK:

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

May Pac Nuke Attack Las Vegas

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, am currently in the process of applying for political asylum in Switzerland, which is coincidentally home to the CIA, none of the terror plots or so-called “natural disasters” I expose come to fruition. In short, the Swiss CIA does not want to afford me any more attention or credibility than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. That being said, there is a wealth of evidence, namely dead Special Forces (e.g., the Terrorgate Scandal), which tend to appear once a respective terror plot is foiled. In order to protect themselves against Truther.org exposing a terror plot which has gone beyond the point of no return (e.g., man-made asteroid attack), the CIA has staged electrical blackouts across Europe (e.g., 2015 Amsterdam Blackout, 2015 Turkey Blackout, etc.) which have set the precedent for a future blackout in Switzerland. Said blackout will only be executed once an irreversible terror plot is exposed by Truther.org at the very last minute. The impending blackout will serve as the necessary cover for a direct attack on Truther.org by the CIA in Switzerland which was exposed globally for the first time in history on March 31, 2015.

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
May 1, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears the CIA in Switzerland will attempt to stage a Chinese surprise invasion and/or nuclear attack during the super-hyped Floyd Mayweather, Jr. vs. Manny Pacquiao boxing match in Las Vegas, Nevada on May 2, 2015.

Due to the 30 to 60-second nature of a nuclear explosion, live sporting events such as the Super Bowl, World Cup or Olympics are the desired targets mainly because they have a sitting audience of hundreds of millions. Evidently, the Mayweather vs. Pacquiao fight also qualifies as a bona fide nuclear terror target.

The impending Chinese attack will most likely involve one or more of the following: a) a cyber-attack on the U.S. military; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Hawaii or mainland United States.

That being said, the most likely Chinese attack scenario is a drone-related attack on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, etc.) followed by a full-scale nuclear attack on Las Vegas and/or Los Angeles.

As reported ad nauseam, the CIA in Switzerland desperately trying to trigger World War III between the United States and China. To date, at least 10 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

In the event that a Chinese nuclear attack is launched against the United States, it will most likely emanate form a Chinese submarine in the Pacific Ocean. Coincidentally, the notion of a rogue submarine lurking off the coast was witnessed on April 28, 2015, when Finland allegedly fired warning shots at a “foreign submarine” near Helsinki.

In order to foreshadow a Chinese invasion just prior to the May 2, 2015, surprise attack, it was reported on April 29, 2015, that mysterious lights were spotted of the southern coast of San Diego. The lights were naturally red and white, the colors of China.

Lastly, on April 27, 2015, it was reported that Mexico will be able to see the Mayweather vs. Pacquiao fight for free. Evidently, the CIA in Switzerland wants to ensure that hundreds of millions of people in Mexico witness the nuclear attacks live on television just prior to the invasion of Mexico by people fleeing the United States.

Nuclear Terror Trending
In what appears to be pre-California and/or Las Vegas nuclear terror attack propaganda, it was reported on April 17, 2015, that a World War II carrier sunk was sunk off the California coast during nuclear attack tests. Less than 2-weeks later on April 28, 2015, a forest fire was reportedly heading towards the Chernobyl nuclear plant, raising the notion of both fire and radioactive contamination just prior to the attack. That same day, April 28, 2015, the CIA in Switzerland called for a nuclear-free world just prior to orchestrating a Chinese nuclear attack upon the United States. Lastly, on April 30, 2015, the former U.S. commander inexplicably called for nuclear missiles to be taken off high alert. These headlines, taken collectively, suggest that an unprecedented nuclear event is imminent.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

Top Chinese Attack Locations
Although a Pearl Harbor-like surprise attack against the United Stated by China could theoretically transpire in any American city or U.S. military base, the following seven location are the most likely due to their name recognition and close proximity to the Pacific Ocean.

Potential Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Chinese EMP Nuke Drone Attack

Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

I. CHINESE CYBER-ATTACK:

u-s-government-warned-of-9-11-like-cyber-attack-67071d7042

1.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

1.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

1.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

II: CYBER-HIJACK DRONE ATTACK:

2.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

drone

2.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

2.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

2.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

2.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

2.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

III. CHINESE NUCLEAR ATTACK:

3.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

Live TV Nuke

3.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

IV. CHINESE EMP ATTACK:

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

chinainvadesamerica

Download & Forward PDF

David Chase Taylor
April 14, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA in Switzerland has ordered the Chinese government to execute a surprise attack upon the United States, most likely in Hawaii and/or California.

The impending Chinese attack will likely involve on or more of the following terror scenarios: a) a cyber-attack on U.S. military; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Hawaii or mainland United States.

Exactly which combination of the aforementioned scenarios will be implemented is not known, but it will most likely involve a surprise Chinese attack on Naval Station Pearl Harbor followed by the full-scale Chinese invasion of Hawaii. Once China has the full attention of the world, they will likely execute an unprecedented TV-related cyber-attack which will show the world nuclear bombs detonating in Los Angeles.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads.

As reported ad nausea, the Swiss CIA is actively attempting to trigger World War III between the U.S. and China. To date, at least 9 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of these various Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the aforementioned war plots which were ultimately foiled.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles. 

Top Chinese Attack Locations
Although a Pearl Harbor-like surprise attack against the United Stated by China could theoretically transpire in any American city or U.S. military base, the following seven location are the most likely due to their name recognition and close proximity to the Pacific Ocean.

Potential Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Chinese EMP Nuke Drone Attack

Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

I. CHINESE CYBER-ATTACK:

u-s-government-warned-of-9-11-like-cyber-attack-67071d7042

1.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

1.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

1.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

II: CYBER-HIJACK DRONE ATTACK:

2.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

drone

2.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

2.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

2.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

2.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

2.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

III. CHINESE NUCLEAR ATTACK:

3.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

Live TV Nuke

3.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

IV. CHINESE EMP ATTACK:

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

????????????????????????????????????????????????????????????????????????????????

Download & Forward PDF

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
April 14, 2015
Truther.org

SWITZERLAND, Zurich — Unable to stage a cyber-related attack on New York Stock Exchange during the month of April 2015, it now appears that Chinese government (at the behest of the CIA in Switzerland) will attempt to stage a cyber-related attack on the Nikkei 225, Japan’s stock exchange in Tokyo.

In order to highlight the Nikkei 225, as well as inflate it so an unprecedented cyber-related attack and subsequent crash are even more dramatic, it was reported on April 10, 2015, that the Nikkei hits the 20,000 level for first time in 15 years.

Back on March 15, 2015, it was revealed that authorities are now closing in on the hackers who stole data from JPMorgan Chase. In the aftermath of a Nikkei 225-related cyber-heist, the aforementioned hackers will likely be linked to China.

In order to sell the notion that China is capable of hacking Japan’s stock exchange, it was reported on March 13, 2015, that China has hacked “every major corporation” in U.S. A few weeks later on March 31, 2015, it was reported that evidence now links China to GitHub cyber-attack.

In order to provide a timely motive for a Chinese attack on Japan, it was reported on April 10, 2015, that China has rejected Obama’s criticism in its dispute with Japan over islands in the South China Sea. When China will take matters into their own hands and attack Japan is only a matter of time.

Financial Cyber-Attacks Trending
A preview of financial related cyber-terror recently occurred on July 10, 2014, when it was reported that Norwegian banks suffered the largest-ever DDoS attack in their history, an act which the state-sponsored terror group known as Anonymous predictably took credit for. Roughly 2-weeks later on July 25, 2014, the European Central Bank was allegedly hacked and personal data stolen. Roughly a month later on August 27, 2014, it was revealed that the FBI is now investigating a cyber-attack on JPMorgan. Roughly 3-weeks later on September 17, 2014, members from Anonymous and an Occupy Wall Street group reportedly abolishes nearly $4 million in student loan debt on September 17, 2014, foreshadowing the notion of Anonymous vanishing millions into thin air. Roughly 3-weeks alter on October 3, 2014, the New York Times published a report entitled “Hackers’ Attack Cracked 10 Financial Firms in Major Assault”, further foreshadowing financial-related cyber-terror. Also on October 3, 2014, it was reported that the JP Morgan data breach affected 76 million households, a laughable notion considering that the population of the U.S. is only 300 million people. A few weeks later on October 20, 2014, U.S. officials warned 500 million financial records may have been hacked. The timely propaganda report was evidently published in order to show that financial-related cyber-terror is imminent just prior to an unprecedented attack on the U.S. financial system.

reign-malware-1000x520

Regin Malware

In what may be Chinese cyber-attack hardware, CNN published a report on November 23, 2014, entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure has been hijacked by the Regin malware and therefore any type of cyber-related attack on Japan’s financial infrastructure is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Chinese Drone Attack

Download & Forward PDF

David Chase Taylor
March 20, 2015
Truther.org

SWITZERLAND, Zurich — As originally depicted in the June 30, 2014, Truther.org report entitled “China Plans to Cyber-Hijack U.S. Drones for Attack on America”, the CIA in Switzerland (which is in command and control of all 206 counties) is plotting a surprise drone attack on the U.S., most likely using U.S. military drones which will be said were hijacked by the Chinese government.

It is imperative to note that once a full-scale drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will likely become the norm. This futuristic drone war scenario essentially allows the CIA to attack whomever and whatever they want—whenever they want.

The unprecedented Chinese surprise attack depicted herein could come in any combination of the following: a) cyber-attack; b) conventional nuclear attack; c) cyber-hijack and nuclear attack; d) EMP attack; and/or e) an aerial attack on the USS Ranger (CV-61) which is currently near San Diego.

The notion of a “ghost drone” (a drone which is no longer under the control of its original and intended operator) was ominously foreshadowed a CCTV report from March 10, 2015, entitled “Chinese Company Introduces Ghost Drone to U.S. Market”.

Roughly a week later on March 18, 2015, the notion that a cataclysmic shift in drone warfare was highlighted by the Wall Street Journal which published a shocking report entitled “The Coming Revolution of Drone Warfare”. According to the timely report, China is “developing lethal drone technologies”.

In order to sell the notion that China is capable of hacking the U.S. government, and thereby their drones, it was reported on March 13, 2015, that China has hacked “every major corporation” in U.S. The timely propaganda report was evidently published in order to program the American public that an unprecedented Chinese cyber-related attack is imminent.

The notion that the CIA is actively trying to trigger World War III between the U.S. and China has been exposed ad nauseam by Truther.org. To date, at least 8 different of Chinese “surprise” attack plots have been identified and exposed, the cyber-hijack of drones being the latest and most repetitive one.

In the wake of these various Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots.

Top Chinese Attack Locations
Although a Pearl Harbor-like surprise attack against the United Stated by China could theoretically transpire in any American city or U.S. military base, the following seven location are the most likely due to their name recognition and close proximity to the Pacific Ocean.

Potential Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Chinese EMP Nuke Drone Attack

Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

I. CHINESE CYBER-ATTACK:

u-s-government-warned-of-9-11-like-cyber-attack-67071d7042

1.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

1.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

1.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

II: CYBER-HIJACK DRONE ATTACK:

2.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

drone

2.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

2.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

2.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

2.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

2.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

III. CHINESE NUCLEAR ATTACK:

3.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

Live TV Nuke

3.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

IV. CHINESE EMP ATTACK:

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

V. CHINESE ATTACK ON USS RANGER:

635568588200921455-Ranger

5.1: Chinese Carrier Attack
In what appears to pre-Chinese aircraft carrier attack propaganda for an attack on the USS Ranger (CV-61) which is currently near San Diego, The Blaze published a report back on December 24, 2014, entitled “If China Attacks, This Is the Ship Taiwan Will Use to Sink Chinese Aircraft Carriers”. The headline consummated the terms “China”, “Attack”, and “Aircraft Carrier”, foreshadowing the attack depicted herein. In the event that the USS Ranger (CV-61) is attacked by China, a nuclear attack will likely follow via a nuclear missile launched by a Chinese submarine. Coincidentally, back on December 9, 2014, the International Business Times published a report entitled “Long-Range Nuclear Missiles Aboard China’s Stealth Submarines Can Reach US, Western Pacific And Beyond”, foreshadowing a West Coast nuclear attack by China. To date, at least 7 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, resulting in the deaths of over 60 Chinese officials who suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots. Based on previous ship-related false-flag terror plots exposed by Truther.org (e.g., the USS Bataan Terror Plot, the USS Mesa Verde Terror Plot, the USS George H. W. Bush Terror Plot, the USS Harry S. Truman Terror Plot, etc.), it’s highly likely that the USS Ranger will suffer a false-flag terror attack that will most likely lead to nuclear war with China.

VI: CHINESE ATTACK ON CALIFORNIA:

6.1: Chinese Attack on California
In order to make China’s drone attack on San Francisco be more explosive in nature, the CIA ordered three former U.S. Navy fleet oilers to be moved to Mare Island, just outside San Francisco Bay. Although the USS Hassayampa, the USS Kawishiwi, and the USS Ponchatoula were allegedly moved to the island for “cleaning”, it’s highly likely that they were actually filled with gasoline and/or explosives. That way, when they are struck with a drone missile, a massive explosion will erupt, creating a made-for-TV moment reminiscent of the December 7, 1941 Japanese attack on Pearl Harbor. California also has two nuclear reactors that may come under Chinese drone attack: The Diablo Canyon Power Plant located in San Luis Obispo County (just 231 miles from San Francisco), and the San Onofre Nuclear Generating Station in San Diego County. In the event that China is able to hijack U.S. drones, one or more of these nuclear reactors may be attacked, causing a Fukushima-like disaster in America. Interestingly, a similar nuclear reactor disaster if featured in the recent Hollywood propaganda film entitled “Godzilla” (2014), which also features an attack on San Francisco by an Asian-based monster.

Kaiju_Attack_SF_Aftermath_01

6.2: Golden Gate Bridge Attack
To make a Chinese attack on the U.S. even more psychologically terrorizing, a well-known landmark such as the Golden Gate Bridge in San Francisco must be destroyed in order to serve as life-long reminder of that horrific day (e.g., Twin Towers on 9/11). Back on February 23, 2012, it was reported that the Golden Gate Bridge will undergo a renovation project that will “take years to complete”. According to reports, the project involves the repainting of the two main suspension cables which are responsible for holding the bridge in place. Whether the lengthy “renovation” project has undermined the structural integrity of the bridge is not known, but the timely construction project may have provided the necessary cover for the installation of demolition explosives in and around the Golden Gate Bridge. Said explosives could be detonated at a later date via remote control in order to give the appearance of a successful Chinese attack on the bridge using drone missiles. In other words, the bridge would be demolished with shaped explosives while the government and media publicly blame China.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

 

635568588200921455-Ranger

Download & Forward PDF

David Chase Taylor
March 1, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears the CIA in Switzerland may stage an surprise Pearl Harbor-like attack on the USS Ranger (CV-61) which is slated to leave Bremerton, Washington the first week of March 2015. Any attack on the USS Ranger in the Pacific Ocean will predictably be scapegoated onto China or North Korea.

Based on prior ship-related false-flag terror plots exposed by Truther.org (e.g., the USS Bataan Terror Plot, the USS Mesa Verde Terror Plot, the USS George H. W. Bush Terror Plot, the USS Harry S. Truman Terror Plot, etc.), it’s highly likely that the USS Ranger (CV-61) will suffer a false-flag terror attack that will lead to war.

The notion of a Chinese attack on the United States was just reported on February 24, 2015, when fireballs were spotted over western America after a Chinese rocket burned up in space. The timely explosion was evidently designed to show that China is actively in violation of U.S. airspace just prior to a surprise attack on the USS Ranger (CV-61).

The notion of an attack on a U.S. aircraft carrier was ominously foreshadowed three days later on February 27, 2015, when Iran attacked a mock U.S. carrier during their latest war games. Although an Iranian attack on the USS Ranger (CV-61) is theoretically possible, a naval attack by China or North Korea is far more likely.

FLASHBACK: USS Ranger Departure Postponed
Back on December 24, 2014, it was reported that the USS Ranger (CV-61) would embark on its final voyage around South America from Bremerton, Washington to the International Shipbreaking’s facility in Brownsville, Texas. Although the decommissioned aircraft carrier was slated to leave Washington in “early 2015”, its departure was evidently postponed due to a timely Truther.org report on December 31, 2014, entitled “CIA Plotting False-Flag Attacks on USS Ranger and USNS Invincible”. In the wake this Truther.org report, the USS Ranger (CV-61)’s departure from Washington will likely once again be postponed so that a Chinese or North Korean attack can commence at a future date.

Chinese Aircraft Carrier Attack
In what appears to pre-Chinese aircraft carrier attack propaganda, The Blaze published a report on December 24, 2014, entitled “If China Attacks, This Is the Ship Taiwan Will Use to Sink Chinese Aircraft Carriers”. The headline consummated the terms “China”, “Attack”, and “Aircraft Carrier”, foreshadowing the impending attack depicted herein. In the event that the USS Ranger (CV-61) is attacked by China, a nuclear attack will likely follow via a missiles launched from a Chinese submarine. Back on December 9, 2014, the International Business Times published a report entitled “Long-Range Nuclear Missiles Aboard China’s Stealth Submarines Can Reach US, Western Pacific And Beyond”, foreshadowing a nuclear attack by China on the West Coast of America. To date, at least 7 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, resulting in the deaths of over 60 Chinese officials who suddenly died due to unnatural causes. Although impossible to confirm, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCTcustomLogo.gif
truther-rss

Arizona-Super-Bowl-2015

Download & Forward PDF

David Chase Taylor
February 1, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA in Switzerland) will attempt to stage a wave of unprecedented terror attacks in the United States on February 1, 2015, the day of Super Bowl XLIX.

Super Bowl XLIX, which features the New England Patriots versus the Seattle Seahawks, will be held at University of Phoenix Stadium in Glendale, Arizona. The football game, which will be aired live on NBC, will likely be the highest rated television show of all-time, making it a coveted state-sponsored terror target.

Top February 1, 2015 Terror Plots:

A. Live Chinese or Islamic Nuclear Terror Attacks (New York, Washington, DC, West Coast)
B. 9/11-Style Attacks (Arizona, Chicago, New York, Washington, DC)
C. Cyber-Hijack of Super Bowl XLIX Telecast (Nuke Attacks, Chinese Invasion, Porn)
D. Surprise Chinese Attack (West Coast)
E. Obama Coup D’état (Washington, DC)

Exactly which terror plots are now in play for February 1, 2015, and the Super Bowl XLIX are not known, but they will likely include a redux of the following: one or more live Chinese or Islamic nuclear terror attacks, live 9/11-sytle attacks (possibly via Flight MH370), a cyber-hijack of the Super Bowl XLIX telecast on NBC, a surprise Chinese attack/invasion of America, and/or a staged coup d’état of the Obama White House or U.S. Capitol Building.

Attacking the NFL has been the primary focus of the Obama administration and the CIA in Switzerland who have been caught red-handed twice (i.e., the 2011 Super Bowl Nuclear Terror Plot and 2014 Super Bowl Nuclear Terror Plot) trying to execute a nuclear terror attack on the Super Bowl. Therefore, the notion that the CIA will try to terrorize the Super Bowl this year is a given.

U.S. Border Security Compromised
In order to sell the notion that the U.S./Mexico border is porous and vulnerable to attack prior to an unprecedented security breach, a number of propaganda reports have been disseminated by the CIA as of late. For example, back on December 26, 2014, it was reported that a drug cartel claimed to have kidnapped a U.S. Border Patrol agent. Predictably, this agent and/or his identification will be used by Islamic terrorists to sneak an Islamic nuclear bomb into the United States, possibly into Arizona. The notion that illegal immigrants will resort to violence and/or aiding terrorists was revealed on December 29, 2014, when the U.S. Border Patrol stated that illegal immigrants are now becoming more “aggressive”. Less than a week later on January 3, 2015, a U.S. Congressional report stated that 700 miles of U.S.-Mexico border are still insecure, making the notion of a security breach by Islamic terrorists seem all the more plausible. Three weeks late on January 27, 2015, it was reported that U.S. Border Patrol is lending a hand in Super Bowl security, suggesting that an attack by way of Mexico may be planned. Two days later on January 29, 2015, traitorous Infowars published a report entitled “Obama Just Picked a Fight with Border Agents”, further suggesting that a security breach on the US/Mexico border is imminent.

I. LIVE NUCLEAR TERROR ATTACKS:

?????????????????????????????????????????????????????????????????????????????

1.1: Live Nuke Attack
Due to the hundreds of millions of people who will be watching Super Bowl XLIX, it’s highly likely that the game itself or another location in America may suffer a nuclear terror attack, most likely by China or Islamic terrorists (e.g., Al Qaeda, ISIS, Iran, Khorasan Group, etc.). In the event that a location outside of Arizona is targeted, a so-called “cyber-hijack” (see below) of NBC will occur just prior to the attack so that the audience can witness the nuclear detonation live on television. After all, seeing is believing.

Top Nuclear Terror Targets:

1. University of Phoenix Stadium (Glendale, Arizona)
2. One World Trade Center (New York, New York)
3. United States Capitol Building (Washington, D.C)
4. West Coast Cities (e.g., Las Vegas, NV; Los Angeles, CA; Portland, OR; San Diego, CA; San Francisco, CA; Seattle, WA, etc.)

1.2: ISIS Nuclear Attack
In order to create the necessary media narrative that ISIS is capable of executing a nuclear terror attack, a number of CIA-spawned propaganda reports have been published within the last 6-months. For example, on May 2, 2014, it was reported by Veterans Today that 1.05 tons of stolen Pakistani nuclear material is now headed to the United States, ultimately connecting Pakistan to a future nuclear terror strike on America. The notion of an ISIS nuclear terrorist attack was witnessed on June 23, 2014, when ISIS terrorists reportedly threatened a nuke attack on Israel, a laughable notion to be sure. A few weeks later on July 9, 2014, it was reported that ISIS seized 88 pounds of Uranium in Northern Iraq, ultimately providing them will enough uranium to make a nuclear bomb. This report was corroborated a day later on July 10, 2014, by Russia Today who reported that Sunni insurgents have taken over nuclear materials in northern Iraq. These preliminary reports were ultimately confirmed by Fox News on July 10, 2014, in a report entitled “ISIS Seizes Uranium from Lab; Experts Downplay ‘Dirty Bomb’ Threat”. Roughly 6-weeks later on August 28, 2014, it was reported that a black Dell laptop was found in an ISIS safe house in Syria which contained instructions on how to weaponize the bubonic plague as well as “missives on using WMDs (Weapons of Mass Destruction)”. Needless to say, the ISIS endgame is a biological and/or nuclear terror attack. Anything less would be unsatisfactory to the CIA which is in command and control of ISIS. In order to raise the specter of an ISIS-related nuclear terror attack just prior to it transpiring in reality, Obama reportedly stated that he will send US troops to fight ISIS if they get nukes on November 18, 2014. Needless to say, the publicity stunt was orchestrated by the CIA is order foreshadow an ISIS-related nuclear attack.

1.3: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

II. NUCLEAR TERROR TARGETS:

freedom-tower-nuke-attack

2.1: One World Trade Center (New York, New York)
One potential Flight MH370 target is the Freedom Tower which has previously been rigged for a nuclear detonation. The plot to stage a nuclear terror attack on the Freedom Tower was a direct result of Truther.org foiling two previous nuclear terror plots targeting Dallas, Texas and New York City (i.e., the 2011 Super Bowl Nuclear Terror Plot and the 2014 Super Bowl Nuclear Terror Plot). Therefore, a third prospective nuclear terror target had to be chosen—One World Trade Center. In order to foreshadow the notion that the Freedom Tower will suffer a nuclear terror attack, it was reported back on September 6, 2014, that a “prank caller” called 911 on September 5, 2014, claiming to have planted a nuclear bomb next to One World Trade Center. Port Authority police and members of the Joint Terrorism Task Force predictably raced over but found nothing. Most recently, on November 12, 2014, New York workers allegedly go stuck on scaffolding outside 69th floor of World Trade Center. The literal publicity stunt was designed to draw international attention to the newly finished Freedom Tower just prior to a nuclear terror attack by Flight MH 370.

2.2: US Capitol (Washington, DC)
Back on June 14, 2012, it was reported that the U.S. Capitol dome will undergo its first major face-lift in more than 50 years, costing $19 million in repairs. Despite the repairs, the United States Capitol was slated for a second facelift on October 22, 2013, when it was reported that the Capitol Dome will undergo another $60 million facelift. As of November 18, 2014, work on the second facelift began, resulting scaffolding around the dome (see photo). Whether or not the timely “facelifts” have provided the necessary cover for the installation of a so-called nuclear bomb inside the U.S. Capitol Building is not known, but it’s highly likely. Said bomb could be detonated at the exact moment that Flight MH 370 crashed into the building 9/11-sytle, making the world believe that the plane had a nuclear bomb onboard. The unprecedented nuclear terror attack would end America as we know, bringing about the naked dictatorship of Obama.

III. 9/11-STYE TERROR ATTACKS:

june-11-2014-chicago-attack

3.1: 9/11-Style Attacks
Although the impending 9/11-style attacks could theoretically target any number of skyscrapers within the United States, the Empire State Building (New York City), One World Trade Center (New York City), and the White House (Washington, D.C.) are the top terror targets. One of the 9/11-sytle attacks may come courtesy of the missing Malaysian Airlines Flight MH370 which was explicitly disappeared by CIA on March 8, 2014, in order to execute a surprise WMD attack on America. Because New York City and Washington, D.C. are located just off the Atlantic Ocean, Flight MH 370 could theoretically fly in off the water from an undisclosed location (e.g., Cuba) at full speed, attacking the aforementioned targets prior to a retaliatory response from the U.S. Air Force. Back on December 24, 2014, it was reported that a Jordanian war plane was shot down and its pilot captured by ISIS. Therefore, state-sponsored Islamic terrorists will predictably have an official pilot at the helm of Flight MH370 when it is used in a 9/11-style terror attack. In order to sell the notion to the public that Flight MH 370 could avoid radar detection while flying from Pakistan en route to the United States, it was reported back on November 2, 2014, that a German minister’s plane disappears from radar “for hours”. Roughly 6-weeks later on December 12, 2014, a so-called computer glitch closed London airspace for hours. In the event of a Flight MH 370 attack, there will predictably be a cyber-attack, glitch or malfunction in the airlines or military’s computers/radar which will enable the attack to take place.

Top 9/11-Style Attack Targets
:

1. University of Phoenix Stadium (Glendale, Arizona)
2.
Empire State Building (New York, New York)
3. One World Trade Center (New York, New York)
4. Willis Tower (Chicago, Illinois)
5. White House (Washington, D.C.)

3.2: Domestic 9/11 Attack
In order to create the necessary terror narrative in the media prior to a 9/11-sytle terror attack on Super Bowl XLIX, a number of staged incidents regarding aviation have taken place at Phoenix Sky International Airport over the last 18-months. For example, back on December 27, 2013, it was reported that Robert Bump, 49, climbed over a barbed wire fence roughly nine feet high at Phoenix Sky International Airport before heading onto the tarmac towards an arriving plane. He reportedly ran away before being arrested. Roughly 6-months later on July 15, 2014, it was reported that a man was sent to the hospital after he opened a secure door at Sky Harbor International Airport in Phoenix, Arizona. According to a Sky Harbor spokesperson Julie Rodriguez, a passenger in Terminal 4 opened a security door near gate C-12 in what was construed as an attempt to circumvent security, possibly to hijack an airliner for a 9/11-sytle attack. Roughly a month later on August 7, 2014, it was reported that authorities in Connecticut used a stun gun to stop an Arizona man they say was trying to breach a security checkpoint at Bradley International Airport. These three security breaches, whether related or not, have created a media narrative for a so-called “domestic” terrorist hijacking in Arizona which is construed in the media as being home to numerous anti-government militias. Since University of Phoenix Stadium has a massive window, a plane could fly unabated into the stadium on live television, blowing up and killing tens of thousands of people.

3.3: 9/11-Style Attack by ISIS

In order to set up ISIS for a 9/11-style attack, the CIA has repeatedly had their intelligence operatives state that this type of attack is now being planned. For example, on June 15, 2014, U.S. Senator Lindsay Graham stated that ISIS held territory in Iraq will be the next 9/11 “staging area”. Less than 24-hours later on June 16, 2014, CBS News published a report entitled “Will ISIS Plan a 9/11-Style Terror Plot Against the U.S.?”, further foreshadowing the notion if a 9/11-style attack by ISIS. Roughly a week later on June 23, 2014, former Vice President Dick Cheney stated that another 9/11 is coming, only “far deadlier”. Two days later on June 25, 2014, it was reported that ISIS is trying to grab its own air force, foreshadowing the notion that ISIS is planning an aerial-related terror attack. Lastly, on August 22, 2014, the White House stated that ISIS could “pivot” to a 9/11-style attack, ultimately confirming that a 9/11-style attack by ISIS is now in play. How U.S. politicians and the White House in Washington, D.C. know the secret plans of terrorists hiding in the deserts of Iraq is unknown unless of course both the U.S. government and ISIS are being controlled by the same entity—the CIA. To further psychologically prepare the world for an ISIS-related aerial attack, it was reported on October 17, 2014, that ISIS militants are training to fly warplanes in Syria. Needless to say, the timely report was designed to foreshadow an ISIS-related attack using Flight MH370.

IV. 9/11-STYLE TARGETS:

911-redux

4.1: Super Bowl XLIX (Greendale, Arizona)
Since University of Phoenix Stadium has a massive window, a plane could fly unabated into the stadium on live television before blowing up and killing tens of thousands of people. In order to create the necessary terror narrative in the media prior to an unprecedented aviation disaster, a number of staged incidents have taken place over the last week. For example, on January 25, 2015: two planes in Arizona and California were suspiciously evacuated. A day later on January 26, 2015, 2 small planes reportedly ditch into sea off Hawaii. A day later on January 27, 2015, an F-18 fighter jet reportedly buzzed the University of Berkeley in California. Also on January 27, 2015, a small plane reportedly landed safely in Pacific, using massive parachute. Two days later on January 29, 2015: Russian bombers allegedly flew over the English Channel. Also on January 29, 2015, a pilot was allegedly locked out of the cockpit in a fight from Minnesota to Las Vegas. Needless to say, the rash of airline crashes and scares have set the precedent for an upcoming terror attack using a commercial airplane.

4.2: Empire State Building (New York, New York)
The latest Flight MH370 target has been identified as the Empire State Building in New York City. Aside from the super-hyped television show “Empire” (2015), breaking news in respect to the building suggests that an attack on the iconic skyscraper may be is imminent. For example, on January 15, 2015, the Express published a report entitled “Asteroid Bigger than the Empire State Building set for Near Miss with Earth”, foreshadowing that something may crash into the Empire State Building. A day later on January 16, 2015, a guardrail reportedly fell from the 81st floor of New York’s tallest residential building. Lastly, on January 9, 2015, it was reported that the FBI informant in the plot to blow up the Sear Tower is now operating a store in New Rochelle, New York. Needless to say, the report was published to show that Islamic terrorists who want to attack skyscrapers are currently operating in New York.

4.3: One World Trade Center (New York, New York)
One potential Flight MH370 target is the Freedom Tower which has previously been rigged for a nuclear detonation. The plot to stage a nuclear terror attack on the Freedom Tower was a direct result of Truther.org foiling two previous nuclear terror plots targeting Dallas, Texas and New York City (i.e., the 2011 Super Bowl Nuclear Terror Plot and the 2014 Super Bowl Nuclear Terror Plot). Therefore, a third prospective nuclear terror target had to be chosen—One World Trade Center. In order to foreshadow the notion that the Freedom Tower will suffer a nuclear terror attack, it was reported back on September 6, 2014, that a “prank caller” called 911 on September 5, 2014, claiming to have planted a nuclear bomb next to One World Trade Center. Port Authority police and members of the Joint Terrorism Task Force predictably raced over but found nothing. Most recently, on November 12, 2014, New York workers allegedly go stuck on scaffolding outside 69th floor of World Trade Center. The literal publicity stunt was designed to draw international attention to the newly finished Freedom Tower just prior to a nuclear terror attack by Flight MH 370.

4.4: Willis “Sears” Tower (Chicago, Illinois)
In order to rehash the 9/11 Attacks, it’s possible that a small plane or hijacked airliner may be used to attack Willis Tower (i.e., the Sears Tower). The skyscraper was the target of a 2006 Sears Tower Terror Plot, and therefore it’s just a matter of time before it’s targeted again. As previously mentioned, on January 9, 2015, it was reported that the FBI informant in the plot to blow up the Sear Tower is now operating a store in New Rochelle, New York. Needless to say, the report was published to show that Islamic terrorists who want tried to take down the Sears Tower are out and about just waiting to attack.

4.5: White House (Washington, DC)
The White House is the official residence and principal workplace of the President of the United States, located at 1600 Pennsylvania Avenue Northwest, Washington, D.C. Therefore, it’s possibly that it may be attacked 9/11-style, possibly during Super Bowl XLIX. Back on January 26, 2015, it was reported that a small drone was found on the White House grounds. The incident, which was no doubt spawned by the CIA, was executed in order to program the masses for a 9/11-style attack on the White House. Back on September 12, 2012, it was reported that after nearly two years and $86 million worth of construction, the West Wing of the Obama White House has emerged from its visual seclusion “remarkably unchanged”. According to the report, the construction project began in September of 2010 with the excavation of a huge multistory pit in front of the West Wing. Whether or not the “construction” job will ultimately undermine the structural integrity of America’s most famous residence is not known, but the timely construction project could have theoretically provided cover for the installation of demolition explosives in and around the White House. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated terrorist attack. Aside from its suspicious construction, the White House has been the target of a number of high-profile terror plots and threats. On January 18, 2012, it was reported that an Occupy Wall Street protester threw a smoke bomb over the fence of the White House. Two months later on March 8, 2012, it was reported that a top hacker and committed anarchist who worked closely with the LulzSec, openly spoke of burning down the White House. Six months later on September 30, 2012, it was reported that the White House was attacked by hackers allegedly linked to China’s government. The unprecedented cyber-terror attack targeted the U.S. government’s most sensitive computer networks, ultimately breaching a system used by the White House Military Office for nuclear commands. A month later on October 21, 2012, it was reported that a year-long investigation by the Investigative Project on Terrorism (IPT) has found that scores of known radical Islamists made hundreds of visits to the Obama White House, meeting with top administration officials. Prior to a high-profile terror attack on the White House, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Olympus Has Fallen” (2013) is a film (see trailer) in which the White House is attacked by an ex-North Korean terrorist with military aircraft, suicide bombers and cyber warfare.

V. LIVE CYBER-HIJACK:

Live TV Nuke

5.1: Live TV Cyber-Hijack
Back on December 31, 2014, the state-sponsored Sony Hackers threatened to attack U.S. news media organizations, namely CNN. Although CNN could theoretically suffer a cyber-hijack of its airwaves, NBC, which is airing and streaming Super Bowl XLIX live, appears the latest target. In order to help sell the notion of a media-related attack to the public, a state-sponsored terror attack occurred on January 7, 2014, when gunmen attacked a Paris magazine, leaving 12 dead.

5.2: ISIS Cyber-Hijack Nuke Attack
Back on June 30, 2013, Truther.org published a report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The terror plot, which was to be scapegoated onto China, has since been exposed ad nausea. Therefore, the CIA was forced to create a secondary terror narrative in order to implicate ISIS in the wake of an unprecedented cyber-hijack and nuclear terror attack. This particular narrative was first identified on January 7, 2015, when a Maryland TV station’s Twitter account and website were allegedly hacked by ISIS supporters. Two days later on January 9, 2015, French municipal-websites were reportedly hacked and replaced with an ISIS flag. Three days later on January 12, 2015, it was reported that U.S. military social media accounts were hacked by ISIS sympathizers. Three days later on January 15, 2015, ISIS hackers allegedly launched an ‘unprecedented’ wave of cyber-attacks on 19,000 French websites. Six days later on January 21, 2015, ISIS ‘lovers’ allegedly hacked websites in 40 Spanish towns. In order to associate hacking with hijacked aircraft just prior to a 9/11-style attack, it was reported on January 26, 2015, that Malaysia Airlines’ website was hacked by group claiming to support ISIS. Less than 24-hours later on January 27, 2015, hackers announced their intentions to target airline flights. In the event that a cyber-hijack of the Super Bowl telecast is executed prior to a live nuclear terror attack by the state-sponsored terrorists known as ISIS, the country of Iran will likely be scapegoated for supplying the terrorists with nuclear material. Coincidentally, on January 29, 2015, it was reported that a U.S. Senate panel approved the controversial Iran sanctions bill, providing a timely motive for a revenge attack on America.

5.3: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

5.4: Porn Cyber-Hijack
In the event that the live Chinese and ISIS cyber-hijack and nuke attacks are postponed, it’s highly likely that the CIA will attempt to stage a porn-related cyber-hijack of NBC’s television and internet broadcast of Super Bowl XLIX. This type of attack was first identified back on April 14th, 2013, when it was reported that a Belarusian music TV channel was hijacked and pornography was broadcast. According to reports, “BelMuzTV”, which is reportedly seen in public places like shopping malls and restaurants, began airing explicit pornographic images featuring full nudity and sexual intercourse which lasted for approximately 10 to 20 minutes. Consequently, thousands of people throughout the Belarusian capital of Minsk watched the broadcast and began to share their experience on various social networking sites. A rumor then was circulated that a “subversive operation” was executed by the channel’s studio engineer, who entered the control room, loaded the inappropriate content into rotation and then disappeared. Evidently, a redux of the aforementioned porn-related cyber-hijack is now in play for Super Bowl XLIX. Coincidentally, on January 30, 2015, it was reported that porn-based malware is now sweeping across Facebook. In the wake of the impending cyber-hijack, it will predictably be stated that the aforementioned malware infected the NBC studios which is also streaming the game live around the world. Also on January 30, 2015, it was reported that 19-year-old Kendra Sunderland is now facing jail time after allegedly filming a solo porn video in the Oregon State University library. The CIA spawned publicity stunt was designed to bring unprecedented media publicity to porn just prior to a staged porn attack during the Super Bowl. Less than 24-hours later on January 31, 2015, it was reported that the Vatican is now investigating two high-ranking priests in a child-porn case. Since the priests in question will never be prosecuted, it can be deduced that the charges are part of a publicity stunt to raise the profile of porn just prior to an unprecedented cyber-hijack. Lastly, in order to associate porn with sports prior to a cyber-hijack of the Super Bowl telecast, it was reported on January 31, 2015, that hockey fans heard mysterious sexual ecstasy-like moans during a live NHL broadcast of the Nashville Predators vs. St. Louis Blues game.

VI. CHINESE SURPRISE ATTACK:

Last-Ride-2

6.1: Chinese Surprise Attack
Back on December 20, 2014, Trutehr.org published a report entitled “Pearl Harbor-Like Surprise Attack by China Imminent—Cyber, EMP, Drone or Nuclear Attack Most Likely”, the latest in a wave of sneak attacks being orchestrated by the CIA in Switzerland. The notion that the CIA is actively trying to trigger World War III between the U.S. and China has been exposed ad nauseam by Truther.org. To date, at least 8 different of Chinese “surprise” attack plots have been identified and exposed, resulting in the deaths of over 60 Chinese officials who suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots. Whether or not a Chinese surprise attack is now in play for Super Bowl XLIX is not known, but it’s highly likely.

6.2: Chinese Attack on Seattle & USS Ranger
At some point during Super Bowl XLIX on Sunday, February 1, 2015, the CIA may stage a full-scale Chinese attack on the United States. In the event that this scenario transpires, the attack will likely come from drones launched by Chinese submarines in the Pacific Ocean. Since the entire city of Seattle has been rigged for a man-made earthquake attack, a Chinese attack may result in the complete devastation of the Emerald City, namely downtown Seattle and the area surrounding the Seahawks stadium. In other words, the attack will look like a massive quake hit the city, although it will predictably blamed on the Chinese aerial bombardment. In order to sell the Chinese attack to the American public watching on TV, the drones will likely execute a made-for-TV attack on the USS Ranger (CV-61) which is currently stationed in Seattle, Washington. Back on December 31, 2014, Truthe.org published a report in respect to an attack on the USS Ranger which was supposed to leave Bremerton, Washington early in 2015. However, in the aftermath of the aforementioned report, the ship has inexplicably remained docked an hour outside of Seattle, evidently part of the impending surprise Chinese attack plot. On January 28, 2015, it was reported that a mid-February departure is now likely for USS Ranger. Therefore, a Chinese attack on the ship which is still docked in Bremerton, Washington, appears to still be in play. Based on previous ship-related false-flag terror plots exposed by Truther.org (e.g., the USS Bataan Terror Plot, the USS Mesa Verde Terror Plot, the USS George H. W. Bush Terror Plot, the USS Harry S. Truman Terror Plot, etc.), it’s highly likely that the USS Ranger will suffer a false-flag terror attack that will most likely lead to nuclear war with China.

6.3: Chinese Carrier Attack
In what appears to pre-Chinese aircraft carrier attack propaganda, The Blaze published a report back on December 24, 2014, entitled “If China Attacks, This Is the Ship Taiwan Will Use to Sink Chinese Aircraft Carriers”. The headline consummated the terms “China”, “Attack”, and “Aircraft Carrier”, foreshadowing the attack depicted herein. In the event that the USS Ranger (CV-61) is attacked by China, a nuclear attack will likely follow via a nuclear missile launched by a Chinese submarine. Coincidentally, back on December 9, 2014, the International Business Times published a report entitled “Long-Range Nuclear Missiles Aboard China’s Stealth Submarines Can Reach US, Western Pacific And Beyond”, foreshadowing a West Coast nuclear attack by China. To date, at least 7 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, resulting in the deaths of over 60 Chinese officials who suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots.

VII: OBAMA COUP DETAT:

White-House-Down-2013

7.1: Obama Coup
Based on the plethora of terror plots targeting the White House and the U.S. Capitol Building, it’s highly likely that the CIA in Switzerland has authorized professional terrorists (i.e., Special Forces) to attack Washington, D.C. during Super Bowl XLIX. In what appears to be pre-coup terror programming, it was reported on December 30, 2014, that gunfire erupted in the capital city of Banjul as the President of Gambia was away. Two days later on January 1, 2014, a man reportedly opened fire and threw a grenade at the President of Turkey’s office. In an attempt to sell the notion of U.S. citizens would partake in a coup, it was reported on January 6, 2014, that U.S. citizens were charged with aiding the aforementioned coup in Gambia. Therefore, the precedent has been set in Gambia and Turkey for a state-sponsored coup in America. A state-sponsored coup d’état in Washington, D.C. would give the world the impression that American soldiers have forsaken democracy and embraced violence. According to a December 19, 2014, Fox News poll, two-thirds of Americans says the government is broken, something a coup would attempt to fix. The notion that a military coup is imminent was foreshadowed on December 22, 2014, when a military-based report stated that only 15% of the U.S. military approves of Obama. Therefore, it appears that a group of “soldiers” (i.e., Special Forces) will take matters into their own hands, attacking the White House and/or the U.S. Capitol Building. Back on October 15, 2014, an official from Missouri called for military coup against Obama. The timely and shocking statement was evidently made in order to foreshadow a military-related attack against Obama.

Coup Terror Trending
Prior to a high-profile Obama White House coup, the American public must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced coup-related terror is now at an all-time high which suggests that a state-sponsored coup in Washington, D.C. is imminent.

Coup Terror Headlines:

1. October 22, 2014: Shooting at Canadian Parliament: Area in lockdown, manhunt underway
2. October 22, 2014: ISIS teen from Australia vows to fight US until black flags fly over White House
3. October 23, 2014: Man stopped after scaling White House fence
4. October 26, 2014: Man threatens to kill Obama.
5. November 4, 2014:
Bulgarian woman sets herself ablaze outside president’s office
6. November 10, 2014: Secret Service discloses 40 barrier-jumping incidents
7. November 19, 2014: Four arrested after group of Hong Kong protesters storm city’s legislature
8. November 20, 2014: Secret Service arrests armed woman outside White House
9. November 21, 2014: Israel charges 3 Palestinians in alleged plot to kill foreign minister
10. January 6, 2014: US citizens charged with aiding attempted Gambia coup
11. January 11, 2015: 2 protesters arrested outside of Dick Cheney’s home
12. January 14, 2015: House Speaker Boehner’s bartender planned to poison him
13. January 18, 2015: Shots fired outside Vice presidents Biden’s home
14. January 20, 2015: Terrorist rebels capture Yemen’s presidential palace in coup
15. January 28, 2015: ISIS threatens to behead Obama and turn the U.S. into a ‘Muslim province’
16. January 29, 2015: Nigerian mobs stone president’s convoy over Boko Haram
17. January 29, 2015: Iran Targets Netanyahu Children for Assassination

[Does not purport to be a complete list of coup-related headlines]

Resurrection of Obama
An elaborate White House coup will do the same for Barack Obamas as it did for one Adolf Hitler. Back on July 20, 1944, Hitler was targeted in an unsuccessful bombing, resulting in 5,000 executions and 7,000 arrests. In the wake of an Obama assassination “event”, the attack will be used as an excuse to round up “disloyal” Americans within the U.S. government, bringing about the naked dictatorship of Obama. Considering Obama’s poll numbers are at an all-time low, an attack on Obama and/or the White House would boost his popularity as well as the Democrats who suffered historic losses in November’s election. An attack could also be used to institute some form of martial law, possibly to find the alleged terrorists, making every American gun owner a suspect.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: If I Am Assassinated, Kidnapped, Held Hostage, Suicided or Murdered in Switzerland—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
truther-rss

NFL-MAIN

Download & Forward PDF

David Chase Taylor
January 18, 2015
Truther.org

SWITZERLAND, Zurich — Attacking the NFL has been the primary focus of the Obama administration and the CIA in Switzerland who have been caught red-handed on multiple occasions (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, etc.) trying to execute WMD-related terror attacks against America’s most popular sports league.

Therefore, it’s highly likely that there are multiple terror plots now in play for the NFL’s AFC and NFC Conference Championship games which will take place in Seattle, Washington, and Boston, Massachusetts on Sunday, January 18, 2014.

Exactly what type of terror or so-called “natural disasters” are planned is not known, but previously foiled terror plots suggest they may include: a Chinese drone and/or nuclear attack on Seattle; a man-made earthquake attack on Seattle; and a WMD attack on Boston using the previously hijacked Flight MH370.

As previously reported, Malaysian Airlines Flight MH370 was explicitly disappeared by CIA on March 8, 2014, in order to execute a surprise WMD attack on America. In the event that Flight MH370 is used in an NFL attack, the city of Boston, Massachusetts is the most likely target due to its close proximity to the Atlantic Ocean.

In what appears to be pre-NFL attack programming, it was reported on December 31, 2014, that the Baltimore Ravens head of security was charged with 4 sexual offenses. The timely charges were filed by the U.S. government in order to make NFL security appear vulnerable just prior to a horrific state-sponsored terror attack.

2014-2015 AFC & NFC Conference Championship Games:

1. January 18: #2 Green Bay Packers @ #1 Seattle Seahawks: 3:05 PM (EST) (Seattle, WA)
II. January 18: #4 Indianapolis Colts @ #1 New England Patriots: 6:40 PM (EST) (Boston, MA)

I. CHINESE ATTACK ON SEATTLE:

Last-Ride-2

1.1: Chinese Attack on Seattle & USS Ranger
At some point during the Green Bay Packers versus the Seattle Seahawks game on Sunday, January 18, 2015, the CIA may stage a full-scale Chinese attack on the United States. In the event that this scenario transpires, the attack will likely come from drones launched by Chinese submarines in the Pacific Ocean. Since the entire city of Seattle has been rigged for a man-made earthquake attack (see below), the Chinese attack will likely result in the complete devastation of the Emerald City, namely downtown Seattle and the area surrounding the Seahawks stadium. In other words, the attack will look like a massive quake hit the city, although it will predictably blamed on the Chinese aerial bombardment. In order to sell the Chinese attack to the American public watching on TV, the drones will likely execute a made-for-TV attack on the USS Ranger (CV-61) which is currently stationed in Seattle, Washington. Back on December 31, 2014, Truthe.org published a report in respect to an attack on the USS Ranger which was supposed to leave Bremerton, Washington earlier this month. However, in the aftermath of the aforementioned report, the ship has inexplicably remained docked an hour outside of Seattle, evidently part of the impending surprise Chinese attack plot. Based on previous ship-related false-flag terror plots exposed by Truther.org (e.g., the USS Bataan Terror Plot, the USS Mesa Verde Terror Plot, the USS George H. W. Bush Terror Plot, the USS Harry S. Truman Terror Plot, etc.), it’s highly likely that the USS Ranger will suffer a false-flag terror attack that will most likely lead to nuclear war with China.

1.2: Chinese Carrier Attack
In what appears to pre-Chinese aircraft carrier attack propaganda, The Blaze published a report back on December 24, 2014, entitled “If China Attacks, This Is the Ship Taiwan Will Use to Sink Chinese Aircraft Carriers”. The headline consummated the terms “China”, “Attack”, and “Aircraft Carrier”, foreshadowing the attack depicted herein. In the event that the USS Ranger (CV-61) is attacked by China, a nuclear attack will likely follow via a nuclear missile launched by a Chinese submarine. Coincidentally, back on December 9, 2014, the International Business Times published a report entitled “Long-Range Nuclear Missiles Aboard China’s Stealth Submarines Can Reach US, Western Pacific And Beyond”, foreshadowing a West Coast nuclear attack by China. To date, at least 7 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, resulting in the deaths of over 60 Chinese officials who suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots.

I. CHINESE CYBER-HIJACK NUKE ATTACK:

Live TV Nuke

2.1: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise and earth changing cyber-attack by an Asian country was ominously foreshadowed by the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. In order to bring unprecedented media exposure to cyber-security (or lack thereof), it was revealed on January 11, 2015, that President Obama promoted a cybersecurity plan last week. According to the White House the three-day series of events focued on “protecting American consumers and families, securing the nation’s businesses and infrastructure in cyberspace, and increasing broadband access”. The TV cyber-hijack nuke attack is a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. Interestingly, the notion of a rouge submarine attack was ominously foreshadowed on January 9, 2015, when a suspected Russian submarine was reported lurking off the Scottish coast.

2.2: TV Cyber-Hijack

Back on December 31, 2014, the state-sponsored Sony Hackers threatened U.S. news media organizations, namely CNN. Although CNN could theoretically suffer a cyber-hijack of its airwaves, a sports-related TV channel appears the slated targeted. Coincidentally, 4 days later on January 4, 2015, longtime ESPN sports anchor Stuart Scott died at 49, an apparent Roman-like blood sacrifice to a successful sports-related cyber-hijack and nuke attack. In order to sell the notion of a media-related attack to the public, another state-sponsored terror attack occurred on January 7, 2014, when gunmen attacked a Paris magazine, leaving 12 dead. That same day, January 7, 2015, a Maryland TV station’s Twitter account and website hacked by ISIS supporters, setting the precedent for a TV-related cyber-attack. The notion of a full-scale cyber-war was ominously foreshadowed in the January 9, 2015, CNN report entitled “Anonymous Declares War over Charlie Hebdo Attack.

fallout

2.3: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

III. SEATTLE EARTHQUAKE ATTACK:

beast-quake

3.1: Seattle Man-Made Earthquake Attack
As originally depicted in the January 18, 2014, Truther.org report entitled “Seattle’s Man-Made Earthquake Terror Plot Exposed”, the USGS along with the U.S. Navy (at the behest of the CIA in Switzerland) are targeting the city of Seattle, Washington with a massive man-made earthquake attack that will likely destroy the city, killing tens of thousands. Although the impending apocalyptic man-made earthquake attack could theoretically transpire in Seattle at any time, it will most likely occur on Sunday, January 10 2015, during the National Football League game between the Carolina Panthers and the Seattle Seahawks at Century Link Field. In the event that Seattle is attacked by a man-made earthquake, it is highly likely that Century Link Field, the home field of the Seattle Seahawks, will suffer tremendously—possibly even total collapse. Since the Seattle Seahawks are famous for The 12th Man, an earthquake during the game would naturally be attributed to Seahawks fans as three of them already have. In what appears to be an ominous sign that a Seattle earthquake is imminent, it was reported on December 23, 2014, that Seattle is unsettled by the massive drill tunneling through downtown. Big Bertha (see below) is a massive drill was imported from Switzerland in order to gut the city for an apocalyptic earthquake that will most likely be triggered by Seahawk fans. The first fan-made earthquake at Century Link Field occurred on January 8, 2011, commonly referred to as the “Beast Quake”. Roughly 2-years later, a second fan-made earthquake occurred on December 2, 2013, when Seahawks fans once again created enough vibration to cause an earthquake. The most recent fan-made earthquake occurred at Century Link Field on January 11, 2014, which is now entitled “Beast Quake II”. The three earthquakes, all of which occurred during games against the New Orleans Saints, have created the myth that fans can actually create earthquakes, potentially triggering larger quakes. Therefore, the notion that Seahawks could trigger a fourth and catastrophic earthquake fits perfectly into the Seattle Seahawks man-made earthquake terror narrative. In other words, football fans, not explosives or tunneling (see below) will ultimately be scapegoated as the source of the devastating earthquake which destroys the city of Seattle. As luck would have it, the Seattle Fault passes just south of the city center, directly adjacent to or directly below Century Link Field. According to Wikipedia, “The Cascadia subduction zone poses the threat of an earthquake of magnitude 9.0 or greater, capable of seriously damaging [Seattle] and collapsing many buildings, especially in zones built on fill”. In the aftermath of a massive Seattle-based man-made earthquake attack, the U.S. government will predictably state that the architects and builders of Century Link Field did not execute the seismic proper studies prior to building the stadium in 1998.

bertha-map

3.2: Big “Bertha”
As revealed in a December 19, 2013, report, the U.S. federal government has spent $3.1 billion on a building project to allegedly create a highway tunnel underneath the city of Seattle. This was reportedly done using a 5-story high mechanical drill entitled “Bertha” which may have been imported from Switzerland where tunnel digging is the norm. Interestingly, “Bertha” admittedly tunneled either directly underneath of or adjacent to CenturyLink Field before running into “the object” which inexplicably caused the subterranean project to be canceled. Being roughly 60-feet in height, it appears that Bertha’s job was to bore multiple tunnels underneath the city of Seattle in order to set-up a man-made movie-like earthquake scene that once triggered, would ultimately create falling skyscrapers, broken highways and ruptured gas lines. In other words, the entire city of Seattle may be ready to blow at any moment.

3.3: Seattle Earthquake History
According to Wikipedia, due to its location in the Pacific Ring of Fire, Seattle is in a major earthquake zone. In the event that Seattle is attacked by a man-made earthquake, the earthquake will literally be “off the Richter Scale”, registering a 9 or higher. Historically speaking, Seattle suffered earthquakes on January 26, 1700 (estimated at 9 magnitude), December 14, 1872 (7.3 or 7.4), April 13, 1949 (7.1), and April 29, 1965 (6.5). The 1965 quake caused three deaths in Seattle directly, and one more by heart failure. More recently, on February 28, 2001, the magnitude 6.8 Nisqually earthquake did significant architectural damage, especially in the Pioneer Square area in Seattle but caused no fatalities. The latest quake occurred on June 27, 2013, when a 4.3-magnitude earthquake occurred in Leavenworth, Washington, just 117 miles due east of Seattle. Interestingly, Wikipedia is clear to point out that, “Although the Seattle Fault passes just south of the city center, neither it nor the Cascadia subduction zone has caused an earthquake since the city’s founding”. Evidently, the minced words and the clouded history of Seattle earthquakes suggests that a major man-made earthquake is imminent.

3.4: Seattle Earthquake Aftermath
In the immediate aftermath of a major man-made earthquake in Seattle or elsewhere, all electronic communication in the city, state and region would likely be immediately be cut-off, possibly for good. This type of scenario was recently highlighted in a January 17, 2014, propaganda report entitled, “Big L.A. Earthquake Could Cripple Internet, Cellphone Service”. Adding insult to injury, the thousands of natural gas pipelines running throughout a city would likely ignite as recently foreshadowed in the January 17, 2014, propaganda report entitled “Study Finds Nearly 6,000 Natural Gas Leaks in DC”. A major earthquake in Seattle could theoretically trigger the “super volcano” hidden beneath Yellowstone National Park which could theoretically could “wipe out” the U.S. According to a January 6, 2014, report, these apocalyptic super volcanoes can suddenly explode ‘with no outside cause’ and Seattle is only about 700 miles away from Yellowstone National Park. Needless to say, in the aftermath of an apocalyptic volcano, a number of other “natural disasters” will suddenly take place, triggered of course by the first event.

3.5: Earthquakes & Sports
To date, there have been at least 6 separate earthquakes which have occurred during “live” sporting events, 3 of which have occurred at Century Link Field. The Seattle Seahawks-earthquake narrative began with the “Beast Quake” when Seahawks running back Marshawn Lynch scored a long touchdown on January 8, 2011. Almost 3 years later on December 3, 2013, it was revealed that once again, noise from jumping and cheering Seahawks fans registers an earthquake in Seattle. Roughly a year later on January 13, 2014, it was once again reported that Seahawks fans did in fact generate a 3rd earthquake during their game with New Orleans Saints. In the aftermath of a man-made earthquake, the rowdy fans known as The 12th Man will be predictably scapegoated for triggering the so-called “natural disaster”.

Sports Related Earthquakes:

1. October 8, 1988: NCAA:Earthquake Game”: Auburn vs. LSU (Baton Rouge, Louisiana)
2. October 17, 1989: MLB: World Series Quake: Oakland vs. SF (San Francisco, California)
3. January 8, 2011: NFL: “Beast Quake”: Seattle vs. New Orleans (Seattle, Washington)
4. December 2, 2013: NFL: Seahawk Fan Quake: Seattle vs. New Orleans (Seattle, Washington)
5. December 7, 2014:
NCAA: 4.5 Quake: Oklahoma vs. Oklahoma State (Oklahoma City, Oklahoma)
5. January 11, 2014:
NFL: “Beast Quake II” Seattle vs. New Orleans (Seattle, Washington)

IV. BOSTON TERROR ATTACK:

flight-mh-370-nuke-attack

4.1: Boston Terror Attack
Aside from the Patriots vs. Broncos Dirty Bomb Terror Plot of November 24, 2013, in Boston, Massachusetts, recent nuclear-related headlines suggest that a nuclear terror attack may be imminent. The particular narrative was most recently identified on December 8, 2014, when it was reported that ISIS claims to have smuggled a “radioactive device” into Europe. A day later on December 9, 2014, it was reported that police in Moldova detained seven people suspected of smuggling radioactive Uranium-238 on a train from Russia, a substance which could allegedly be used to make a “dirty bomb”. Therefore, a future terror scenario in which nuclear material is shipped into America via train in order to construct a dirty bomb or nuclear bomb is now theoretically possible. Whether or not Boston will be targeted is not known, but the precedent for an NFL nuclear terror attack was previously set during the 2011 Super Bowl XLV Nuclear Terror Plot in Dallas, Texas.

4.2: Boston Sleeper Cell
The Boston Marathon Bombings of April 15, 2013, were apparently the opening salvo of an alleged Islamic wave of terror attacks that will culminate in an unprecedented nuclear terror attack on the city of Boston. Coincidentally, on April 21, 2013, it was reported that the FBI is hunting a 12-man strong terrorist “sleeper cell” in Boston which is linked to the Tsarnaev brothers who were allegedly responsible for the Boston Bombings. In the aftermath of a Boston nuclear attack, this “sleeper cell” will predictably be implicated in the attack.

4.3: Gillette Stadium Attack Plan
As evidenced in the Super Bowl XLV nuclear terror plot, the NFL game in Boston will most likely be attacked conventionally at first in order to draw in viewers worldwide prior to the slated nuclear detonation. This strategy was also employed on 9/11 with escalating events, stating with the first plane and ending with the demolition of both towers. Due to the construction of Gillette Stadium, which may be the only stadium in the country with direct vehicle access to the field, the attack will likely come from vehicles which will break through the security gate and drive onto the field, possibly running over fans, players and coaches. Once the attack ensues, terrorists wearing parachutes will likely descend into the stadium and attacked the crowd with automatic weapons, grenades and shoulder-fired missiles. Predictably, the “live” terror attack will go on for a few hours until Europe tunes in. At that point, once the world is watching, a nuclear detonation will ensue.

4.4: First Ever Social Media Terror Attack
It was reported on September 3, 2013, that Gillette Stadium is only one of 11 NFL stadiums with high-tech Wi-Fi throughout the stadium. The special network was built so that in the wake of a terror attack, the thousands of fans calling, updating their status and uploading photos of the attack won’t overload and crash local cellular networks. In other words, the NFL and the U.S. government built a special network so that the world could be suddenly inundated with images of the terror attack, multiplying the terror factor exponentially.

4.5: Flight MH370 Attack on Boston
Based on breaking news and events, it appears that the CIA is about to execute an ISIS-related bio-terror attack using the previously hijacked Malaysian Airlines Flight MH370 which was explicitly disappeared by CIA on March 8, 2014, in order to execute a surprise WMD attack on America. Because the city of Charlotte is located just off the Atlantic Ocean, Flight MH 370 could theoretically fly in off the water from an undisclosed location at full speed, attacking the football game in question prior to a retaliatory military response from the U.S. Air Force. In order to provide the alleged fuel for Flight MH370 which is now in Pakistan, it was reported on October 8, 2014, that pirates hijacked an oil tanker off the coast of Singapore back on October 2, 2014. Less than 24-hours later, the missing oil tanker was found, minus 2,000 gallons of fuel. Therefore, unknown Islamic terrorists now have enough fuel to fly Flight MH 370 from Pakistan to the U.S. in order to launch their surprise attack. While airliners do not run on crude oil, the terrorists could theoretically trade the stolen fuel for jet fuel or distil it themselves. To further psychologically prepare the world for an ISIS-related aerial attack, it was reported on October 17, 2014, that ISIS militants are training to fly warplanes in Syria. Needless to say, the timely report was designed to foreshadow an ISIS-related attack using Flight MH370.

4.6: ISIS Bio-Terror Attack
The endgame of ISIS terrorists, who were reportedly trained at a secret base in Jordan, is a bio-chemical terror attack that spawns the global pandemic planned for 2014. This particular narrative was first identified on June 19, 2014, when ISIS reportedly stormed a Saddam-era chemical weapons complex in Iraq. Roughly 3-weeks later on July 8, 2014, it was reported that “abandoned” barrels containing deadly sarin were seized by ISIS in rebel-held Syria. Less than 24-hours later on July 9, 2014, it was reported that Iraq has now lost control of a chemical weapons depot to ISIS. Never mind that back on March 31, 2005, “The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction” reported that the intelligence community was “dead wrong” in its assessments of Iraq’s weapons of mass destruction capabilities prior to the U.S. invasion. In other words, there were no WMDs in Iraq but ISIS located two bio-chemical weapon depots inside Iraq within 27 days? Needless to say, the entire ISIS-bio-terror narrative has been fabricated by the CIA in order to provide the necessary cover for a state-sponsored bio-chemical attack. The ISIS endgame was confirmed yet again on August 28, 2014, when it was revealed that a black Dell laptop belonging to ISIS contained instructions on how to weaponize the bubonic plague. Lastly, on October 30, 2014, it was reported that Spanish Intelligence has intercepted an ISIS plot to weaponize Ebola, confirming that an ISIS-related bio-terror attack is imminent.

ISIS-nuclear-Iraq-620x435

4.7: ISIS Nuclear Attack

In order to create the necessary media narrative that ISIS is capable of executing a nuclear terror attack, a number of CIA-spawned propaganda reports have been published within the last 6-months. For example, on May 2, 2014, it was reported by Veterans Today that 1.05 tons of stolen Pakistani nuclear material is now headed to the United States, ultimately connecting Pakistan to a future nuclear terror strike on America. The notion of an ISIS nuclear terrorist attack was witnessed on June 23, 2014, when ISIS terrorists reportedly threatened a nuke attack on Israel, a laughable notion to be sure. A few weeks later on July 9, 2014, it was reported that ISIS seized 88 pounds of Uranium in Northern Iraq, ultimately providing them will enough uranium to make a nuclear bomb. This report was corroborated a day later on July 10, 2014, by Russia Today who reported that Sunni insurgents have taken over nuclear materials in northern Iraq. These preliminary reports were ultimately confirmed by Fox News on July 10, 2014, in a report entitled “ISIS Seizes Uranium from Lab; Experts Downplay ‘Dirty Bomb’ Threat”. Roughly 6-weeks later on August 28, 2014, it was reported that a black Dell laptop was found in an ISIS safe house in Syria which contained instructions on how to weaponize the bubonic plague as well as “missives on using WMDs (Weapons of Mass Destruction)”. Needless to say, the ISIS endgame is a biological and/or nuclear terror attack. Anything less would be unsatisfactory to the CIA which is in command and control of ISIS. In order to raise the specter of an ISIS-related nuclear terror attack just prior to it transpiring in reality, Obama reportedly stated that he will send US troops to fight ISIS if they get nukes on November 18, 2014. Needless to say, the publicity stunt was orchestrated by the CIA is order foreshadow an ISIS-related nuclear attack.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, s state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: If I Am Assassinated, Kidnapped, Held Hostage, Suicided or Murdered in Switzerland—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
truther-rss

20130605_emp_attack_large

Download & Forward PDF

David Chase Taylor
January 15, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA in Switzerland is planning to execute either a Chinese or North Korean nuclear EMP attack on the West Coast of the United States which will leave the country without electricity in the dead of winter.

If and when the EMP attack happens, it will likely transpire at night during a high profile NBA or NCAA basketball game so that the nuclear explosion will be aired “live” on television in high-definition. Since a nuclear explosion is only 15-30 seconds long, a sitting audience must already be in place.

On potential date for the EMP attack is January 16, 2015, when the Cleveland Cavaliers play the Los Angeles Clippers in Los Angeles, California. The basketball game, which features NBA superstars LeBron James and Blake Griffin, will be aired “live” internationally via the ESPN television network.

A nuclear EMP attack on the U.S. will likely come via a missile from a Chinese or North Korean submarine in the Pacific Ocean. Coincidentally, news in respect to nuclear armed submarines from the aforementioned countries has been trending, providing the necessary media narrative for the impending attack.

A Chinese or North Korean nuclear EMP attack will render the West Coast of America electricity-less for decades. In reality however, U.S. electricity companies will simply turn off the power at the same time that the nuclear EMP missile explodes, causing people to believe the two acts are somehow interconnected.

Blackouts Trending
In order to psychologically program the America and the world for the eventual loss of electricity, it was reported on November 2, 2014, that a country-wide blackout occurred in Bangladesh after the power grid inexplicably collapsed. Exactly one month later on December 2, 2014, it was reported that the entire city of Detroit, Michigan went dark after a massive power outage. Roughly 2-weeks later on December 15, 2014, a car crashed into a power pole, knocking power out in 2 North Carolina counties. Considering that a single car crash should only cause a localized blackout, it can be deduced that the power outage was part of the programming for a future in which there is no electricity in America. Coincidentally, American electricity companies (at the behest of the CIA) have been drilling this exact scenario as depicted in the August 16, 2013, New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow”.

What is an EMP?
An Nuclear EMP is a burst of electromagnetic radiation which usually results from a high energy nuclear explosion that suddenly fluctuates the magnetic field. Theoretically, an EMP could wipe out everything electronic (planes, trains, cars, computers, internet, etc.) in a flash. EMP terror has gained popularity of late and has been featured in movies such as “The Matrix” and television shows such as “24” and the #1 show on NBC entitled “Revolution”, which eerily features a post-EMP America with no electricity. Aside from the Hollywood EMP propaganda, there has been recent EMP terror legislation by the U.S. congress, a number of EMP terror conferences, and EMP terror scholarly whitepapers which have all been preparing local, state and federal officials for an upcoming EMP terror attack on America. Based on the 12 major power outages in 2012 alone, it appears that the U.S. government is programming the public for the permanent loss of electricity. Coincidentally, in September of 2012, Alex Jones of Infowars released a new magazine which indicates that the STRATFOR intelligence operation known as Infowars knows that the internet is about to expire and have planned ahead by launching a new propaganda magazine. In the propaganda film entitled “Red Dawn” (2012), (See: Trailer) a group of American youth out partying after a football game, suddenly find themselves in the middle of a major blackout, likely from an EMP attack.

grid-ex-ii

“GridEx II” Power Grid Drill

Considering that on November 13-15, 2013, a massive power grid terror drill entitled “GridEx II” was executed on the East Coast of America, there is a real possibility that a massive nuclear EMP attack could turn the lights out on America for good. According to the August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”

I. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

1.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

1.2: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

1.3: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

II. NORTH KOREAN EMP ATTACK:

nk-emp

2.1: North Korean EMP Attack
In order to create the narrative that a North Korean EMP attack is in fact possible, it was reported on September 15, 2014, that South Korea has now confirmed that North Korea has modified their subs to launch missiles. Nine days later on September 24, 2014, it was reported that North Korea may launch a ballistic missile from one of their submarines. Roughly 2-months later on November 2, 2014, it was reported that North Korea has modernized its Soviet missile-capable submarines, confirming that a submarine-based nuclear strike by North Korea is the working terror narrative. Back on October 24, 2014, a U.S. general stated that North Korea may have nuke missile knowhow. In other words, a nuclear strike on the United States by North Korea is being planned by the CIA and U.S. generals have been instructed to speak about it publically so that the public will already be acclimated to the idea when it happens. Showing the duplicity of the U.S. government, a United Nations report from March 29, 2014, found that U.S. parts are now in North Korean rockets. In the wake of a North Korean EMP attack, parts of the rocket will be blown across the U.S. Therefore, the report was published premeditatively in order to counter any “conspiracy theories” that the rocket was made and launched by the U.S. military. In other to provide a solid motive for an unprovoked North Korean nuclear EMP attack on the U.S., it was revealed on April 6, 2014, that the U.S. will send 2 more ships to Japan by 2017 to counter North Korea’s nuclear threat. Roughly a month later on May 14, 2014, North Korean dictator Kim Jong UN took on the U.S. Army in a new video game, a publicity stunt designed to show that Un is planning to attack the United States.

2.2: The UN Publicity Stunt
In order to provide a timely motive for a North Korean EMP attack, it was revealed on November 19, 2014, that a UN human rights panel approved a resolution urging North Korea’s referral to ICC (International Criminal Court). The resolution was the latest effort to hold North Korea and leader Kim Jong Un accountable for alleged crimes against humanity. Predictably, a day later on November 20, 2014, North Korea responds to the UN declaration with a with nuclear test threat, one which may materialize any day now. It is imperative to note that back on March 7, 2013, the UN passed sanctions despite North Korea threat of ‘pre-emptive nuclear attack’. Therefore, North Korea may make good on their earlier threat with an unprovoked EMP attack.

2.3: North Korean Nuclear Attack
Prior to executing an alleged North Korean nuclear attack on the United States, the CIA must establish a believable narrative through their governments and media platforms that North Korea has an active nuclear weapons program. For example, on April 4, 2014, North Korea told the world “wait and see” about its latest nuclear test. Roughly a month later on May 10, 2014, North Korea threatened to conduct a “counter-measure” nuclear test. A few months later on July 28, 2014, North Korea threatened a nuclear strike on White House, showing that they are planning to attack while Obama is in office. Lastly, on September 23, 2014, it was reported that North Korea is developing new missiles capable of carrying tactical nuclear warheads. Needless to say, these reports, taken collectively, suggest that an unprecedented nuclear attack by North Korea is imminent.

2.4: Nuclear Tests by North Korea
As evidenced, North Korea has continued their nuclear tests regardless of the sanctions imposed by the United Nations. With each passing nuclear test, the respective yield of the test jumps considerably higher. Therefore, the 4th nuclear test (or the 1st nuclear attack) by North Korea should yield somewhere in the neighborhood of 25-40 kilotons of TNT, an amount on par with Pakistan’s nuclear program. According to physicists who testified before a U.S. Congressional hearing on October 7, 1999, nuclear weapons with yields of 10 kilotons or less can produce a large EMP capable of destroying the electrical grid.

North Korean Nuclear Test Timeline:

1. October 9, 2006: 1st Nuclear Test: Device: Fission: Type: Underground: Yield: 0.5 kilotons of TNT
2. May 25, 2009: 2nd Nuclear Test: Device: Fission: Type: Underground: Yield: 2.35 kilotons of TNT
3. February 12, 2013: 3rd Nuclear Test: Device: Fission: Type: Underground: Yield: 6-9 kilotons of TNT

2.5: North Korean EMP Attack
Prior to executing an alleged North Korean nuclear EMP attack on the United States, the CIA must establish a believable narrative through their governments and media platforms that North Korea has an active EMP weapons program. For example, on June 16, 2011, it was reported that North Korea tested a “super-EMP” nuclear weapon. Roughly 18-months later December 19, 2012, the Washington Times reported that a North Korean EMP attack could destroy United States and that Obama must take immediate action to avoid this scenario (which he obviously has not). Roughly a year later on November 5, 2013, it was revealed that North Korea is indeed developing “electromagnetic pulse weapons”. Less than a year later on April 9, 2014, a DHS study found that North Korea is indeed capable of launching an EMP attack on the United States. Roughly a month later on May 8, 2014, a hearing on Capitol Hill found that America’s electric grid is vulnerable to an EMP attack. In order to provide plausible deniability for the U.S. government after an EMP attack, it was reported on August 19, 2014, that the U.S. is defenseless against a North Korean EMP attack. Needless to say, these reports, taken collectively, suggest that an unprecedented nuclear EMP attack by North Korea is imminent.

nk-nuke

2.6: Missile Program Active

In order to show the world that North Korea’s missile program is active prior to an earth-changing nuclear EMP attack on the United States, it was reported on November 26, 2013, that Iran and North Korea are secretly developing long-range rocket boosters for nuclear ICBM missiles. Most recently, on October 2, 2014, it was reported that North Korea has completed an upgrade to its space center in order to house larger rockets. The report states that a fresh launch by North Korea is expected within the year. As evidenced below, North Korea’s missile program is hype-active which suggests that a missile attack is imminent.

2014 North Korea Missile Timeline:

1. March 26, 2014: N. Korea fires 2 missiles as its rivals meet
2. April 1, 2014: North Korea sending message to U.S. with missile barrage
3. June 29, 2014: North Korea fires two missiles, raising tensions
4. July 9, 2014: North Korea fires missiles into the sea
5. July 26, 2014: North Korea fires short-range missile into sea
6. August 14, 2014: Pope Francis calls for peace on Korean Peninsula as North fires projectiles

[Does not purport to be a complete list of North Korean missile launches]

Kim Jon-un visits submarine

2.7: Kim Jong-un Under CIA Mind Control
Shortly after the mysterious death of North Korean President Kim Jong-il on August 24, 2012, his son, Kim Jong-un was placed into power. Since then, Jong-un has been routinely portrayed in the media as being mentally unstable, highly insecure, and willing to attack anyone at a moment’s notice. Not surprisingly, Kim Jong-un exhibits all the telltale signs of being brainwashed and under state-sponsored mind-control. Jong-un was reportedly spotted with his “handler” on numerous occasions while attending a “private school” in Switzerland. According to Wikipedia, “mind control” was first developed in Korea during the Korean War and involves a process in which a group or individual “systematically uses unethically manipulative methods to persuade others to conform to the wishes of the manipulator(s), often to the detriment of the person being manipulated”. Needless to say, Un is a patsy of the CIA who holds no real power. Like his father, he will be assassinated once he fulfills his respective mission which evidently consists of an unprovoked attack on the United States while Obama is in office.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, s state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: If I Am Assassinated, Framed, Kidnapped, Held Hostage, Suicided or Killed via Terror Attack in Switzerland—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
truther-rss

CFP

Download & Forward PDF

David Chase Taylor
January 12, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA in Switzerland) will attempt to execute at least 2 nuclear terror attacks on or during the first-ever College Football Playoff (CFP) on Monday, January 12, 2015.

Known as the Super Bowl of NCAA college football, the CFP will feature the Ohio State Buckeyes versus the Oregon Ducks at AT&T Stadium in Arlington, Texas. The game, which will be aired “live” on ESPN, will likely rival the Super Bowl in its amount of viewers, making the game a very lucrative state-sponsored terror target.

The first terror plot is a cyber-hijack of the ESPN broadcast by the Sony Hackers which will predictably be identified as China. Once the football broadcast is hijacked, viewers will be treated to one or more nuclear detonations on the West Coast of America (e.g., Los Angeles, Portland, San Francisco, Seattle, etc.), courtesy of Chinese subs in the Pacific Ocean.

The second terror plot is a redux of the 2011 Super Bowl XLV Nuclear Terror Plot in Dallas, Texas, whereby Islamic terrorists (e.g., Al Qaeda, ISIS, etc.) will allegedly sneak a nuclear bomb into the United States via Mexico, attacking at AT&T Stadium in Arlington, Texas.

Needless to say, either terror plot will result in a nuclear World War III. In the event that the Chinese nuclear attack is executed, a full scale war in the Pacific will likely commence within the hour. In the event that the Islamic nuclear attack is executed, Pakistan, a nuclear nation, will likely be fingered as the supplier of the bomb.

I. CHINESE CYBER-HIACK & NUKE ATTACK:

1.1: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise and earth changing cyber-attack by an Asian country was ominously foreshadowed by the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. In order to bring unprecedented media exposure to cyber-security (or lack thereof), it was revealed on January 11, 2015, that President Obama plans to promote a cybersecurity plan this week. According to the White House the three-day series of events will focus on “protecting American consumers and families, securing the nation’s businesses and infrastructure in cyberspace, and increasing broadband access”. The TV cyber-hijack nuke attack is a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. Interestingly, the notion of a rouge submarine attack was ominously foreshadowed on January 9, 2015, when a suspected Russian submarine was reported lurking off the Scottish coast.

Live TV Nuke

1.2: ESPN Cyber-Hijack

Back on December 31, 2014, the state-sponsored Sony Hackers threatened U.S. news media organizations, namely CNN. Although CNN could theoretically suffer a cyber-hijack of its airwaves, ESPN appears the slated targeted. Coincidentally, 4 days later on January 4, 2015, longtime ESPN sports anchor Stuart Scott died at 49, an apparent Roman-like blood sacrifice to a successful cyber-attack on ESPN. In order to sell the notion of a media-related attack to the public, another state-sponsored terror attack occurred on January 7, 2014, when gunmen attacked a Paris magazine, leaving 12 dead. That same day, January 7, 2015, a Maryland TV station’s Twitter account and website hacked by ISIS supporters, setting the precedent for a TV-related cyber-attack. The notion of a full-scale cyber-war was ominously foreshadowed in the January 9, 2015, CNN report entitled “Anonymous Declares War over Charlie Hebdo Attack”.

fallout

1.3: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

1.4: Golden Gate Bridge Attack

To make a Chinese attack on the U.S. even more psychologically terrorizing, a well-known landmark such as the Golden Gate Bridge in San Francisco must be destroyed in order to serve as life-long reminder of that horrific day (e.g., Twin Towers on 9/11). Back on January 9, 2015, it was reported that the Golden Gate Bridge is taking its first-ever weekend off in order to install a security barrier. Whether the timely closure of the bridge has provided the necessary cover for the installation of demolition explosives is not known, but it’s highly likely. Said explosives could be detonated at a later date in order to give the appearance of a coordinated Chinese attack. In other words, the bridge will be demolished with shaped explosives while the U.S. government publicly blames China.

II. ISLAMIC NUCLEAR ATTACK
:

?????????????????????????????????????????????????????????????????????????????

2.1: Dallas Nuclear Attack
Aside from the fact that Dallas, Texas was home to the Super Bowl XLV Nuclear Terror Plot of February 6, 2011, nuclear-related headlines are now trending which suggests that a nuclear terror attack may be imminent. The particular narrative was most recently identified on December 8, 2014, when it was reported that ISIS claims to have smuggled a “radioactive device” into Europe. A day later on December 9, 2014, it was reported that police in Moldova detained seven people suspected of smuggling radioactive Uranium-238 on a train from Russia, a substance which could allegedly be used to make a “dirty bomb”. Therefore, a future terror scenario in which nuclear material is shipped into America via train in order to construct a dirty bomb or nuclear bomb is now theoretically possible. Whether or not it will happen in Dallas, Texas is not known, but it’s highly likely.

2.2: U.S. Border Security Compromised
In order to sell the notion to the American public that the U.S. border is porous and vulnerable to attack, a number of propaganda reports have been disseminated by the CIA. For example, on December 26, 2014, it was reported that a drug cartel claims that they have kidnapped a U.S. Border Patrol agent. Predictably, this agent and/or his identification will be used by Islamic terrorists to sneak a nuclear bomb into the United States, namely Dallas, Texas. The notion that illegal immigrants will resort to violence and/or terrorism was revealed on December 29, 2014, when the U.S. Border Patrol stated that illegal immigrants are now becoming more “aggressive”. Less than a week later on January 3, 2015, a U.S. Congressional report stated that 700 miles of U.S.-Mexico border are still insecure, making the notion of a security breach by Islamic terrorists seem all the more plausible.

ISIS-Nukes

2.3: ISIS Nuclear Attack
In order to create the necessary media narrative that ISIS is capable of executing a nuclear terror attack, a number of CIA-spawned propaganda reports have been published within the last 6-months. For example, on May 2, 2014, it was reported by Veterans Today that 1.05 tons of stolen Pakistani nuclear material is now headed to the United States, ultimately connecting Pakistan to a future nuclear terror strike on America. The notion of an ISIS nuclear terrorist attack was witnessed on June 23, 2014, when ISIS terrorists reportedly threatened a nuke attack on Israel, a laughable notion to be sure. A few weeks later on July 9, 2014, it was reported that ISIS seized 88 pounds of Uranium in Northern Iraq, ultimately providing them will enough uranium to make a nuclear bomb. This report was corroborated a day later on July 10, 2014, by Russia Today who reported that Sunni insurgents have taken over nuclear materials in northern Iraq. These preliminary reports were ultimately confirmed by Fox News on July 10, 2014, in a report entitled “ISIS Seizes Uranium from Lab; Experts Downplay ‘Dirty Bomb’ Threat”. Roughly 6-weeks later on August 28, 2014, it was reported that a black Dell laptop was found in an ISIS safe house in Syria which contained instructions on how to weaponize the bubonic plague as well as “missives on using WMDs (Weapons of Mass Destruction)”. Needless to say, the ISIS endgame is a biological and/or nuclear terror attack. Anything less would be unsatisfactory to the CIA which is in command and control of ISIS. In order to raise the specter of an ISIS-related nuclear terror attack just prior to it transpiring in reality, Obama reportedly stated that he will send US troops to fight ISIS if they get nukes on November 18, 2014. Needless to say, the publicity stunt was orchestrated by the CIA is order foreshadow an ISIS-related nuclear attack.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, s state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: If I Am Assassinated, Framed, Kidnapped, Held Hostage, Suicided or Killed via Terror Attack in Switzerland—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
truther-rss

d

Download & Forward PDF

David Chase Taylor
December 31, 2014
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears the Swiss CIA, which is in command and control of all 206 countries of the underworld, will attempt to stage a Chinese attack on the USS Ranger (CV-61) in Pacific Ocean, and/or an Iranian attack on the USNS Invincible (T-AGM-24) in the Persian Gulf.

Based on previous ship-related false-flag terror plots exposed by Truther.org (e.g., the USS Bataan Terror Plot, the USS Mesa Verde Terror Plot, the USS George H. W. Bush Terror Plot, the USS Harry S. Truman Terror Plot, etc.), it’s highly likely that the aforementioned ships will suffer a false-flag terror attack that will most likely lead to nuclear war.

Back on December 24, 2014, it was revealed that the U.S. aircraft carrier entitled the USS Ranger (CV-61) will embark on its final voyage around South America from Bremerton, Washington to the International Shipbreaking’s facility in Brownsville, Texas. According to reports, the ship will leave “early 2015”, most likely on around January 1, 2014.

There is also a high probability that Iran will attack the USNS Invincible (T-AGM-24) which is currently cruising the Persian Gulf. According to a report from December 30, 2014, entitled “The U.S. Air Force Has a Spy Ship — Yes, Ship — in the Persian Gulf”, the inconspicuous spy ship is in the Persian Gulf in order to spy on Iran’s missile launches.

Last-Ride-2

Chinese Attack
In what appears to pre-Chinese aircraft carrier attack propaganda, The Blaze published a report on December 24, 2014, entitled “If China Attacks, This Is the Ship Taiwan Will Use to Sink Chinese Aircraft Carriers”. The headline consummated the terms “China”, “Attack”, and “Aircraft Carrier”, foreshadowing the attack depicted herein. In the event that the USS Ranger (CV-61) is attacked by China, a nuclear attack will likely follow via a nuclear missile launched by a Chinese submarine. Coincidentally, back on December 9, 2014, the International Business Times published a report entitled “Long-Range Nuclear Missiles Aboard China’s Stealth Submarines Can Reach US, Western Pacific And Beyond”, foreshadowing a West Coast nuclear attack by China. To date, at least 7 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, resulting in the deaths of over 60 Chinese officials who suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots.

IMG_9994pcHd-4RInvincible2

Iranian Attack

In what appears to be the drill for an Iranian attack on the USNS Invincible (T-AGM-24), it was reported on December 25, 2014, that Iran staged a massive military display to ‘send message of peace’ to its neighbors. According to reports, the drill by the Iranian Navy tested warships and submarines. In order to highlight Iran just prior to the attack, it was reported on December 29, 2014, that President Obama stated that Iran has a “chance to get right with the world”, implying, albeit in a de facto manner, that they are currently “wrong” with the world. The notion that Iran would attack a U.S. ship was first identified back on February 8, 2014, when the Times of Israel reported that Iranian TV had aired the simulated bombing of the USS Abraham Lincoln (see: 9:45 in video). Low and behold, 40 days later on March 20, 2014, it was reported that Iran was building an aircraft carrier similar to a U.S. aircraft carrier, ultimately foreshadowing that Iran is drilling for a U.S. aircraft carrier attack. Three days later on March 22, 2014, USA Today published a report entitled “Iranians Up to ‘No Good’ with U.S. Aircraft Carrier Mock-Up”, further confirming Iranian foul play is afoot. That same day, Iranian media responded by stating that the fake U.S. ship was only a movie set. Regardless of the fake ship’s alleged purpose, it was designed to bring unprecedented attention to both Iran and U.S. ships in the Persian Gulf just prior to a “surprise” attack by Iran.

Ship Terror Trending
In order to set the precedent for ship-related terror, a number of ship disasters have been staged over the last week. For example, on December 28, 2014, 400 people were reportedly trapped aboard a burning ferry off a Greek island in the Mediterranean. Two days later on December 30, 2014, another ship off the Greek island of Corfu issued a distress signal. Three days later on December 31, 2014, hundreds of migrants were rescued by Italy’s coast guard when their ship almost crashed. Needless to say, 3 major ship-related disasters in 3 days is no accident.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, as well as The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I Am Assassinated, Framed, Kidnapped, Held Hostage, Suicided or Killed via Terror Attack in Switzerland—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the Swiss CIA. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
truther-rss

 

 

 

College Football Playoff Announces The College Football Playoff Selection Committee - News Conference

Download & Forward PDF

David Chase Taylor
December 23, 2014
Truther.org

SWITZERLAND, Zurich — To date, Truther.org has foiled at least 3 major NCAA football-related terror plots (see below). Therefore, it nakedly apparent that the Obama administration (at the behest of the CIA) is actively targeting NCAA football games. The only question remaining is when and where the next state-sponsored NCAA football terror attack will take place.

The notion of a full-scale collegiate-related terror attack was recently witnessed back on September 17, 2014, when gunmen set off bombs and open fired at college in Nigeria, killing 13. The attack, which was most likely executed by state-sponsored terrorists (i.e., Special Forces), may have been practice for a much larger and deadlier collegiate attack in America.

Although a gun-related massacre or suicide bombing is the most likely NCAA football terror scenario, there is always the possibility that the feds may execute a so-called “accident” or “natural disaster” (e.g., bio-terror attack, fire, gas explosion, plane crash, vehicle crash, stadium collapse, stampede, etc.) which would inevitably kill and terrorize scores of college football students and fans in attendance.

Back in 2013, the Obama administration was caught red-handed, twice, attempting to execute state-sponsored terror attacks at high-profile NCAA football games. These terror plots include but are not limited to the Alabama vs. Texas A&M terror plot of September 14, 2013, and the Alabama vs. LSU terror plot of November 9, 2013.

The latter terror plot, which featured prominently in Terrorgate Scandal, resulted in the murder of at least 18 U.S. and E.U. Special Forces, as well as the unprecedented arrest of 3 top U.S. Navy brass. Needless to say, it’s just a matter of time before another similar type of terror plot is devised by the CIA.

2014-2015 NCAA Bowl Games
Although any one of the remaining 12 NCAA college football bowl games could theoretically be attacked, games with their respective date highlighted in red are the most vulnerable mainly due to: a) the location of the games; b) the teams involved; c) the team’s national ranking and reputation; and d) the bowls respective name, sponsor and reputation. The higher ranked a given NCAA football team is, the more television viewers that particular game has.

Remaining 2015 NCAA Bowl Games:

1. JAN 1: Outback Bowl: (19) Auburn vs. (18) Wisconsin (Tampa, FL): ESPN 2
2. JAN 1: Goodyear Cotton Bowl: (8) Michigan State vs. (5) Baylor (Arlington, TX): ESPN
3. JAN 1: Buffalo Wild Wings Citrus Bowl: (25) Minnesota vs. (16) Missouri (Orlando, FL): ABC
4. JAN 1: Rose Bowl Game: (2) Oregon vs. (3) Florida State (Pasadena, CA): ESPN
5. JAN 1: Allstate Sugar Bowl: (1) Alabama vs. (4) Ohio State (New Orleans, LA):
6. JAN 2: Lockheed Martin Armed Forces Bowl: Houston vs. Pittsburgh (Fort Worth, TX): ESPN
7. JAN 2: TaxSlayer Bowl: Iowa vs. Tennessee (Jacksonville, FL): ESPN
8. JAN 2: Valero Alamo Bowl: (11) Kansas State vs. (14) UCLA (San Antonio, TX): ESPN
9. JAN 2: TicketCity Cactus Bowl: Washington vs. Oklahoma State (Tempe, AZ): ESPN
10. JAN 3: Birmingham Bowl: East Carolina vs. Florida (Birmingham, AL): ESPN
11. JAN 4: GoDaddy Bowl: Toledo vs. Arkansas State (Mobile, AL): ESPN
12. JAN 12: College Football Championship Game: SF Winner vs. SF Winner (Arlington, TX): ESPN

I. TOP 4 NCAA FOOTBALL ATTACK SCENARIOS:

nk-nuke

NCAA EMP Attack
Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA) is planning to execute a North Korean nuclear EMP attack on the West Coast of the U.S. If and when the nuclear attack happens, it will likely take place at night during a high profile NBA, NCAA or NFL game so that the nuclear explosion will be aired “live” on television in high-definition. One potential date for the attack is Januaray 1, 2014, during the Rose Bowl Game in Pasedena when the: #2 Oregon Ducks play the #3 Florida State Seminoles on ESPN. A nuclear EMP attack on the U.S. will likely come via a missile from a North Korean submarine in the Pacific Ocean. In order to create the narrative that this is in fact possible, it was reported on September 15, 2014, that South Korea has now confirmed that North Korea has modified their subs to launch missiles. Nine days later on September 24, 2014, it was reported that North Korea may launch a ballistic missile from one of their submarines. Roughly 2-months later on November 2, 2014, it was reported that North Korea has modernized its Soviet missile-capable submarines, confirming that a submarine-based nuclear strike by North Korea is the working terror narrative. Back on October 24, 2014, a U.S. general stated that North Korea may have nuke missile knowhow. In other words, a nuclear strike on the United States by North Korea is being planned by the CIA and U.S. generals have been instructed to speak about it publically so that the public will already be acclimated to the idea when it happens. A North Korean nuclear EMP attack will render the West Coast of America electricity-less for decades. In reality however, U.S. electricity companies will simply turn off the power at the same time that the nuclear missile explodes, causing people to believe the two acts are somehow interconnected. Showing the duplicity of the U.S. government, a United Nations report from March 29, 2014, found that U.S. parts are now in North Korean rockets. In the wake of a North Korean EMP attack, parts of the rocket will be blown across the U.S. Therefore, the report was published premeditatively in order to counter any “conspiracy theories” that the rocket was made and launched by the U.S. military. In other to provide a solid motive for an unprovoked North Korean nuclear EMP attack on the U.S., it was revealed on April 6, 2014, that the U.S. will send 2 more ships to Japan by 2017 to counter North Korea’s nuclear threat. Roughly a month later on May 14, 2014, North Korean dictator Kim Jong UN took on the U.S. Army in a new video game, a publicity stunt designed to show that Un is planning to attack the United States.

North Korean EMP Attack
Prior to executing an alleged North Korean nuclear EMP attack on the United States, the CIA must establish a believable narrative through their governments and media platforms that North Korea has an active EMP weapons program. For example, on June 16, 2011, it was reported that North Korea tested a “super-EMP” nuclear weapon. Roughly 18-months later December 19, 2012, the Washington Times reported that a North Korean EMP attack could destroy United States and that Obama must take immediate action to avoid this scenario (which he obviously has not). Roughly a year later on November 5, 2013, it was revealed that North Korea is indeed developing “electromagnetic pulse weapons”. Less than a year later on April 9, 2014, a DHS study found that North Korea is indeed capable of launching an EMP attack on the United States. Roughly a month later on May 8, 2014, a hearing on Capitol Hill found that America’s electric grid is vulnerable to an EMP attack. In order to provide plausible deniability for the U.S. government after an EMP attack, it was reported on August 19, 2014, that the U.S. is defenseless against a North Korean EMP attack. Needless to say, these reports, taken collectively, suggest that an unprecedented nuclear EMP attack by North Korea is imminent.

chinese-emp-nuke-drone-attack

1.2: Chinese Attack
Back on December 20, 2014, Trutehr.org published a report entitled “Pearl Harbor-Like Surprise Attack by China Imminent—Cyber, EMP, Drone or Nuclear Attack Most Likely”. Consequently, there are three perspective NCAA Bowl Games which could be attacked by China: the San Diego County CU Poinsettia Bowl featuring Navy vs. San Diego State on December 23, 2014; the National University Holiday Bowl featuring Nebraska vs. (24) USC in San Diego, California on December 27, 2014; and the Foster Farms Bowl featuring Maryland vs. Stanford in Santa Clara, California on December 30, 2014. The notion that the CIA is actively trying to trigger World War III between the U.S. and China has been exposed ad nauseam by Truther.org. To date, at least 7 different of Chinese “surprise” attack plots have been identified and exposed, resulting in the deaths of over 60 Chinese officials who suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots.

flight-mh-370-terror-attack

1.3: Flight MH370 Attack
As previously reported, it appears that the CIA is ready to execute a terror attack using the previously hijacked Malaysian Airlines Flight MH370 which was explicitly disappeared by CIA on March 8, 2014, in order to execute a surprise WMD attack on America. Since there are 7 games on the Atlantic and Gulf Coasts, any one of them could be targeted by Flight MH370 in an unprecedented bio-terror attack. The Boca Raton Bowl featuring Marshall vs. Northern Illinois in Boca Raton, Florida on December 23, 2014; the Popeyes Bahamas Bowl featuring Central Michigan vs. WKU in Nassau, Bahamas on December 24, 2014; the Bitcoin St. Petersburg Bowl featuring NC State vs. UCF in St. Petersburg, Florida on December 26, 2014; the Belk Bowl featuring (13) Georgia vs. (21) Louisville in Charlotte, North Carolina on December 30, 2014; the Capital One Orange Bowl featuring (7) Mississippi St. vs. (12) Georgia Tech in Miami, Florida on December 31, 2014; the Outback Bowl featuring (19) Auburn vs. (18) Wisconsin in Tampa, Florida on January 1, 2014; and the TaxSlayer Bowl featuring Iowa vs. Tennessee in Jacksonville, Florida on January 2, 2014 could be targeted. Because the aforementioned bowl cities are located just off the Atlantic Ocean or Gulf of Mexico, Flight MH 370 could theoretically fly in off the water from an undisclosed location at full speed, attacking one of the football games in question prior to a retaliatory military response from the U.S. Air Force.

1.4: NCAA Military Attack
There are three military-related NCAA bowl games which may suffer an attack either by so-called “domestic terrorists” or by state-sponsored Islamic terrorists such as ISIS. The San Diego County CU Poinsettia Bowl featuring Navy vs. San Diego State on December 23, 2014, in San Diego, California; the Military Bowl featuring Cincinnati vs. Virginia Tech in Annapolis, Maryland on December 27, 2014; and the Valero Alamo Bowl featuring (11) Kansas State vs. (14) UCLA in San Antonio, Texas on January 2, 2014 may be targeted for terror. The latter game is near Fort Hood, Texas, home to the Fort Hood Massacre. Back on May 8, 2007, it was reported that 6 foreign-born Muslims were arrested and accused of plotting to attack the Army’s Fort Dix and massacre scores of U.S. soldiers, a plot the FBI says was foiled when the men took a video of themselves firing assault weapons to a store to have the footage put onto a DVD. In addition to plotting the attack on Fort Dix, the Islamic defendants spoke of attacking a Navy installation during the annual Army-Navy football game, and conducted surveillance at other military installations in the region, prosecutors said.

II. NCAA TERROR:

2.1: Collegiate Terror Trending
The latest wave of collegiate-related terror started on October 4, 2014, when Harvard cops were put on alert after hundreds of students received a “shooting’ threat”. Roughly 2-weeks later on October 20, 2014, a California man was charged with killing a Saudi Arabian college student, providing a timely motive for a revenge-like attack by Islamic jihadists. Less than 24-hours later on October 21, 2014, a UNCC student was found dead in a parking garage. Ten days later on October 31, 2014, a UNC nursing student was found dead in her car in Chapel Hill, North Carolina. A day later on November 1, 2014, a fire was reported near the University of Southern Maine in Portland, Maine. According to the report, a total of 5 people were killed in the blaze. The deadly fire was likely set in order to set the precedent for a deadly fire at another NCAA college or university. Three days later on November 3, 2014, a gunman reportedly shot a student at Delaware State University. Considering the alleged victim was taken to the hospital with non-life threatening injuries, it’s likely that the entire incident was staged in order to set the precedent for a deadly NCAA-related massacre. Nine days later on November 12, 2014, female suicide bomber kills reportedly killed 1 and injured 7 at college in Nigeria. Whether the attack was state-sponsored is not known, but it has set the precedent for Islamic-related collegiate terror, possibly in the United States. Two days later on November 14, 2014, an Appalachian State student was reportedly found dead on campus. Five days later on November 19, 2014, a second Appalachian State student was found dead on campus. A day later on November 20, 2014, a gunman allegedly shot three students at Florida State University before being executed by police. Needless to say, NCAA is trending which suggests that a state-sponsored NCAA-related attack is imminent.

homeland_security_teamfd490aef-5be0-4cae-9841-09116ee1d5a40000_20110317144156_640_480

2.2: DHS & NCAA Terror Partnership
In an ominous sign that acts of state-sponsored NCAA terror are indeed being planned, it was revealed on September 12, 2011 that the U.S. Department of Homeland Security (DHS) had officially partnered with the NCAA in a terror partnership publically entitled “If You See Something, Say Something”. According to the report, Secretary of Homeland Security Janet Napolitano stated that “Every citizen plays a critical role in identifying and reporting suspicious activities and threats. By expanding the ‘If You See Something, Say Something” campaign we are working together to ensure the safety and security of fans, players, employees, and students”.

2.3: Obama Targeting NCAA
Roughly 2 months after the DHS and NCAA terror partnership was signed, the Obama administration began targeting the NCAA for terror. The first instance occurred was when an elaborate Obama assassination “event” was planned for the NCAA and U.S. military’s “Carrier Classic” in San Diego, California on November 11, 2011. Roughly a year later on December 8, 2011, a major “homegrown” jihad terror attack was planned for the NCAA sanctioned Army-Navy football game in Philadelphia, Pennsylvania, where Obama was once again in attendance. Roughly 16 months later on April 8, 2013, the Obama administration was again caught trying to execute a deadly militia-based bio-terror attack on the NCAA’s men’s basketball tournament in Atlanta, Georgia. Considering that the DHS and NCAA terror partnership has not been canceled, it stands to reason the NCAA will once again be targeted for terror in the very near future.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I Am Assassinated, Framed, Kidnapped, Held Hostage, Suicided or Killed via Terror Attack in Switzerland—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss