Archive for the ‘Cyber-Hijack Terror’ Category

Flight MH370

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

SHOCK: 10 Reasons Why the Paris Terror Attacks Were Executed by the CIA

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
January 1, 2016
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the Obama administration (at the behest of CIA Headquarters beneath Lake Geneva) is preparing to execute a wave of airports-related terror attacks on New Year’s Day, January 1, 2016.

Exactly what type of airport-related terror is planned for the U.S. is not known, but a 9/11-style attack, bio-terror attack, gun-related massacre, suicide bombing, hostage crisis, and/or prolonged made-for-TV siege are the most likely terror scenarios. That being said, aiport hacks and airliners cyber-hijacks are also possible.

The 9/11-style attack may come from Malaysian Airlines Flight MH370 which was explicitly hijacked by CIA on March 8, 2014, in order to execute a surprise WMD attack. Flight MH370 could also be used to transport hundreds of ISIS terrorists from Iraq, Jordan and Syria into a western country via an airport.

Top Airport Terror Targets

1. JFK International Airport (New York, New York)
2. LaGuardia Airport (New York, New York)
3. LAX International Airport (Los Angeles, California)
4. Miami International Airport (Miami, Florida)
5. Newark Liberty International Airport (Newark, New Jersey)
6. Charles de Gaulle Airport (Paris, France)
7. Hartsfield–Jackson Atlanta International Airport (Atlanta, Georgia)
8. LA/Ontario International Airport (Los Angeles, California)
9. O’Hare International Airport (Chicago, Illinois)
10. EuroAirport (Basel, Switzerland)
11. Minneapolis-St.Paul International Airport (Minneapolis, Minnesota)

tsa-todd-starnes-620x362

TSA Terror Scandal
In order to sell the notion that U.S. airport security is flawed in a post-9/11 world, a scandal regarding the TSA was fabricated by the CIA on June 2, 2015, when it was reported that TSA screeners failed to test for and detect explosives and weapons. In response, Homeland Security reportedly beefed up airport security screening after the report, giving the U.S. government plausible deniability in the wake of an unprecedented U.S. airport-related attack. In order to make the TSA scandal appear real in nature, on June 2, 2015, the acting head of the TSA reassigned after the so-called watchdog report revealed the airport security failings. Less than a week later on June 9, 2015, the Inspector General released a report which stated that TSA officials failed to identify 73 workers who were “linked to terrorism” . The timely report confirmed, albeit in a de facto manner, that the impending U.S. airport attack will be an inside job, most likely executed rouge TSA agents Lastly, that same day, June 9, 2015, it was also reported that Homeland Security is now looking for the leaker of a report on U.S. airport-checkpoint failures. In other words, the weakest U.S. airport checkpoints are now public knowledge and will predictably be exploited in the near future by state-sponsored terrorists.

Airport Domestic

Domestic Airport Attack
Based on breaking news and events, it appears that the Obama administration (the behest of CIA Headquarters beneath Lake Geneva) is plotting a domestic terrorist attack on a U.S. airport. This particular narrative was first identified back on March 21, 2015, when the New Orleans Airport came under attack by a man who was carrying a bag with 6 Molotov cocktails. The airport attacker was reportedly armed with a machete and explosives. After executing the airport attack, the terror patsy was evidently double-crossed and executed by federal agents the same day, March 21, 2015. Roughly 3-months later on June 5, 2015, it was reported that a man was accused of plotting suicide bomb attack at a Kansas airport, an ominous sign of 9/11-style airport terror to come. Roughly 2-months later on July 29, 2015, a plane crashed at Milwaukee’s Timmerman Airport, killing at least one. Whether foul play was involved is not known, but it’s highly likely. Six days later on August 4, 2015, it was reported that a man drove his car through a New Orleans Airport fence and onto the runway. The incident was likely staged of fabricated in order to set the precedent for a domestic attack/assault on a U.S. airport. A week later on August 19, 2015, a man arrested after running onto the Denver airport ramp where he was allegedly trying to stop plane. Again, the incident was likely staged of fabricated in order to set the precedent for a domestic attack/assault on a U.S. airport. Eleven days later on August 31, 2015, a Kansas man was reportedly sentenced to 20 years in prison for plotting a suicide bomb attack at the Wichita airport. Consequently, a 9/11-style attack and/or suicide bombing may now be in order for a U.S. airport. Lastly, on September 17, 2015, a Texas man was accused of crashing through a gate at the Waco airport gate in attempt to steal executive jet. Again, the incident was likely staged of fabricated in order to set the precedent for a domestic attack, assault or hijacking at a U.S. airport. Needless to say, these reports, taken collectively, suggest that a state-sponsored domestic terror attack on a U.S. airport is imminent. Said attack will be executed by Special Forces (i.e., professional terrorists) but blamed on an anti-government militia.

090314_airport

Islamic Airport Attack
Back on April 10, 2014, a photo of San Francisco Airport appeared in al-Qaida’s magazine “Inspire”. Since Al Qaeda and ISIS are the primary terrorist arms of the CIA, the magazine’s “photos” are in essence the targets that the CIA is planning to attack. The notion that Islamic terrorists wants to execute an airport related terror attack was foreshadowed back on October 6, 2014, when a teenager was arrested at O’Hare Airport in Chicago after trying to join ISIS. Less than a week later on October 12, 2014, U.S. General Dempsey stated that ISIS had “straight shot” to Baghdad airport, implying that an ISIS airport attack may be forthcoming. Roughly 5-months later on March 7, 2015, a female ISIS recruiter was reportedly arrested at the Barcelona Airport. Less than 24.-hours on March 8, 2015, 2 teenagers were reportedly stopped at the Sydney Airport on suspicion of trying to join ISIS, further suggesting that an ISIS-related airport attack is imminent. Lastly, on September 21, 2015, it was reported that 5 ISIS terror suspects were nabbed at the Johannesburg airport with $6,000,000 in cash. The incident was obviously fabricated or staged in order to show that wealthy ISIS terrorists will target airports in the near future, most likely in America. Needless to say, these reports, taken collectively, confirm that an ISIS-related airport attack is now in play.

Islamic Airport Attacks:

1. June 9, 2014: ‘This is just the beginning’: Taliban claim Pakistan airport attack
2. June 10, 2014: Gunmen attack Karachi Airport security training facility in second assault
3. June 26, 2014: Separatists attack airport in east Ukraine, defy truce
4. July 17, 2014: Gunmen attack airport in Afghan capital
5. July 27, 2014: Over 50 dead in Tripoli airport battle as foreigners leave collapsing Libya
6. August 9, 2014: Rocket hits Kabul airport after Kerry departure
7. August 23, 2014: Libyan militants claim to have taken control of Tripoli’s main airport
8. November 11, 2014: Shiite rebels clash with security guards at Sanaa airport; 4 killed
9. December 21, 2014: 20 jihadists killed in failed east Syria airport attack
10. March 19, 2015: Clashes in southern Yemeni city force closure of airport
11. April 16, 2015: Al Qaeda captures major airport, seaport and oil terminal in southern Yemen
12. May 17, 2015: Suicide car bomb near Kabul airport kills at least 3
13. May 29, 2015: Islamic State affiliate in Libya takes civilian airport in Sirte
14. August 4, 2015: Yemen crisis: Houthi rebels ‘driven from key al-Anad airbase’
15. August 10, 2015: Suicide blast hits Kabul airport road amid surge in violence
16. September 18, 2015:
Taliban kill 29 in attack on Pakistan air force base’s mosque
17. September 30, 2015: NATO forces fight Taliban near besieged Kunduz airport
18. December 13, 2015: 70 Paris airport workers have security passes revoked over radical Muslim extremism

[Does not purport to be a complete list of Islamic airport attacks]

MSP-Terminal-50.jpg

Minneapolis-St.Paul International Airport
In what appears to be the latest U.S. airport slated for terror, it was reported on December 24, 2015, that  several hundred Black Lives Matter activists shut down Terminal 1 and Terminal 2 at the Minneapolis-St.Paul International Airport in Minnesota. Whether the timely shut down provided the necessary cover for the installation of weapons and/or explosives within the Minneapolis-St.Paul International Airport is not known, but it’s highly likely. Said weapons and/or explosives could be utilized at a later date in a coordinated state-sponsored airport-related terror attack. In order to sell the notion that terrorists have infiltrated the Minneapolis-St.Paul International Airport just prior to a state-sponsored terror attack, it was reported by the FBI two days prior on December 22, 2015, that an African Islamic terror suspect once worked at the airport. The timely propaganda report was evidently designed to sell the notion that alleged terrorist Abdirizak Warsame knows the inner workings of the airport, making the impending attack on the Minneapolis-St.Paul International Airport seem all the more plausible.

cyber hijack

Anonymous Airline Cyber-Hijack
The notion of airliner cyber-hijack was first raised by the Daily Mail back on March 16, 2014, when they published a report entitled “Is Missing Malaysian Jet the World’s First Cyber Hijack?”. The report cited an anti-terror expert who said that a plane’s altitude, speed and direction could be hacked by ‘codes’ and that planes could be landed using remote control. Roughly 8-months later on November 4, 2014, the software for a state-sponsored cyber-hijack of commercial airliners was evidently touted by Russia Today in a report entitled “Could Hackers Cyber-Hijack a Plane? UK Scientists Develop Tech to Fight Malware”. The software was likely built with a backdoor which specifically enables commercial airliners to be cyber-hijacked. In what appears to be pre-cyber-hijack attack propaganda, the Government Accountability Officer reported on April 14, 2015, that newer aircraft are vulnerable to hacking. A day later on April 15, 2015, Russia Today published a report entitled “Hijack Hack: Modern Planes Vulnerable to Remote Midair Takeover” which was designed to further sell the notion that airliners can now be hijacked by hackers. Roughly a week later on April 26, 2015, it was reported that an iPad glitch grounded two dozen American Airlines flights in America. The grounding was likely executed by the CIA in order to rig the planes with an electronic device and/or explosives which can be activated at a later date in order to bring the fleet of planes down simultaneously in the first-ever cyber-hijacking. Less than 2-weeks later on May 9, 2015, it was reported that an A400M Airbus cargo plane crashed near the Seville airport in Spain. According to follow-up report dated May 20, 2015, the Airbus A400M crash was linked to faulty software that had been installed. The Airbus A400M was evidently crashed by the CIA in order to set the precedent for a software-related airliner disaster. Post cyber-hijack attack, the May 2015 crash of the Airbus A400M will likely be touted as the first-ever cyber-hijack. Less than a week later on May 15, 2015, Wired magazine published a report entitled “Feds Say That Banned Researcher Commandeered a Plane”, further selling the notion that hackers could cyber-hijack commercial airliner just prior to it actually transpiring in reality. Three days later on May 18, 2015, Fox News published a report entitled “FBI Affidavit Claims Security Expert Admitted to Briefly Hacking Flight Controls”, confirming, albeit in a de facto manner, that the future cyber-hijack of commercial airliners will be executed by so-called “security experts” at the behest of the Swiss CIA. In order to associate Boeing (and thereby airplanes) with hackers just prior to an unprecedented cyber-attack on airliners, the Washington Post published a report on August 4, 2015, entitled “Hacked E-Mails: Boeing Wants its Drones to Hack Computers from the Sky”. A day later on August 5, 2015, Russia Today published a report entitled “‘Funtenna’ Uses Sound Waves, Radio to Hack Internet of Things”. Needless to say, airports and airliners are considered to be part of the so-called “Internet of Things”, a term used to describe real-world objects which are linked to the internet. The notion of a cyber-related attack on air travel was witnessed two days later on August 7, 2015, whenChinese hackers reportedly attacked the U.S. travel industry. The incident was likely staged or fabricated in order to sell the notion that China will target U.S. airliners in the future. Lastly, three days later on August 10, 2015, Yahoo News published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”, further associating aerial-related machines with hacking just prior to an unprecedented cyber-hijack attack on commercial airliners. Lastly, in what appears to be pre-airplane and/or airport cyber-hijack attack programing, it was reported on October 28, 2015, that therunaway military blimp landed in Pennsylvania. Needless to say, post cyber-attack on hundreds of airliners and/or airports, there will be scores of so-called runaway planes which subsequently are forced to crash-land around the world.

Airline “Glitches” Trending
Prior to a high-profile cyber-related terror attack on the airline industry, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, airline-related glitches and outages are now at an all-time high which suggests that a state-sponsored cyber-terror attack on the airline inducts

AIR TRAVEL GLITCH TIMELINE:

1. August 15, 2015: Computer outage at FAA center in D.C. delays flights in Northeast
2. August 15, 2015: Computer glitch grounds flights in New York, DC
3. September 17, 2015: American Airlines resolves issue that led to grounded flights at several hubs
4. October 12, 2015: Southwest says it has fixed glitch, expects flights to return to normal
5. October 15, 2015: Terror watch list program glitch blamed for flight delays at major airports
6. October 15, 2015: Customs computers crash at airports across US

[Does not purport to be a complete list of airline/airport-related glitches]

euroairport

Anonymous Airport Cyber-Attack
Based on breaking news and events, it appears that the CIA is plotting an airport-related cyber-attack that will bring the world busiest airports to a screeching halt, costing billions in damages. However, in the event that air traffic control loses contact with thousands of planes, chaos will ensue, possibly leading to numerous airplane-related crashes. In order to foreshadow the loss of human control over thousands of aircraft, the AP published a report back on September 14, 2015, entitled “Now Arriving: Airport Control Towers with No Humans Inside”. Roughly a month later on October 13, 2015, the AP published another report entitled “Union: Chronic Shortage of Air Traffic Controllers a Crisis”, foreshadowing that an air traffic control-related crisis is imminent. In what appears to be a beta-test for the impending air traffic control-related blackout via cyber-attack, Fox News published a report on October 15, 2015, entitled “Terror Watch List Program Glitch Blamed for Flight Delays at Major Airports”. The incident, which reportedly affected customs computers, was evidently staged in order to associate terrorism with airport computer malfunctions and flight delays just prior to a staged cyber-attack on airports across the world. Lastly, in what appears to be pre-airplane and/or airport cyber-hijack attack programing, it was reported on October 28, 2015, that a runaway U.S. military blimp landed in Pennsylvania. Needless to say, post cyber-attack, there will be scores of so-called runaway planes which subsequently are forced to crash-land around the world.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

china-nuke

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

TRUTHER.ORG TERROR ALERT TIMELINE: 

1. DEC 11, 2013: Comet ISON Declared Dead: Truther.org Alert: 1 Day Prior
2. JAN 13, 2014: Wesley Chapel Theater Shooting: Truther.org Alert: 38 Days Prior
3. MAY 23, 2014: Santa Barbara Massacre: Truther.org Alert: 26 Days Prior
4. OCT 28, 2014: 
Antares Rocket Launch Explosion: Truther.org Alert: 1 Day Prior
5. NOV 20, 2014:
Florida State University Shooting: Truther.org Alert: 2 Days Prior 
6. OCT 1, 2015: 
Umpqua Community College Shooting: Truther.org Alert: 7 Days Prior
7. NOV 27, 2015: Planned Parenthood Shooting:  Truther.org Alert: 1 Day Prior
8. NOV 13, 2015:
Paris Terror Attacks: Truther.org Alert: 4 Days Prior 
9. DEC 5, 2015:
London Undergroud Jihad Attack: Truther.org Alert: 9 Days Prior 
10. DEC 25, 2015:
The Philippines Terror Attack: Truther.org Alert: 1 Day Prior

[Does not purport to be complete list of timely Truther.org terror alerts]

SHOCK: 10 Reasons Why the Paris Terror Attacks Were Executed by the CIA

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
December 27, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese surprise attack and/or invasion of America, Japan and/or the Philippines while President Obama is on vacation in Hawaii until January 4, 2016. The Pearl Harbor-like redux attack will predictably lead to World War III.

The notion that war will find Obama while on vaction in Hawaii was foreshadowed in a Washington Post report from December 21, 2015, entitled “The War in Afghanistan Follows Obama to His Vacation in Hawaii“.  The report stated that Obama does not support “the idea of endless war”, something which would transpire in the aftermath of a Chinese attack.

In what appears to be pre-World War III programming, it was reported on December 21, 2015, that the Pentagon is now preparing for war with China. The timely propaganda report stated that the DOD is intent on triggering a military conflict with China over disputed islands in the South China Sea, likely at Clark Air Base in the Philippines where the U.S. has stationed numerous Boeing P-8A Poseidon advanced maritime surveillance aircraft.

The impending Chinese attack will likely involve one or more of the following: a) conventional nuclear attack; b) a TV-related cyber-hijack and subsequent nuclear attack; c) an EMP attack; and/or d) the full-scale Chinese invasion of Australia, Hawaii, Japan, the Philippines, Taiwan, and/or mainland U.S.

Consequently, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

That being said, the U.S. Navy began Annual Exercise 16 on November 16, 2015, a naval war game between Japan and the United States which featured the USS Ronald Reagan aircraft carrier. Consequently, a made-for-TV Chinese aerial attack on iconic aircraft carrier is expected.

Annual Exercise 16 was likely executed in order to provide a timely motive for an unprovoked attack by China on Japan which will likely result in the first ever Chinese beachhead and military base in Japan, a country which is currently home to numerous U.S. military bases.

In order to foreshadow the aformentioned attack on the USS Ronald Reagan aircraft carrier, the Washington Free Beacon published a report on December 15, 2015, entitled “Chinese Submarine Practiced Missile Attack on USS Reagan“. The incident  violated China’s 2014 commitment to the multinational Code for Unplanned Encounters at Sea, known as CUES, designed to reduce the risk of a shooting incident between naval vessels.

Four days later on December 19, 2015, USA Today published a report entitled “China Urges U.S. to Stop ‘Provocative Actions’ after B-52 Flights”, an action allegedly taken by the U.S. on December 10, 2015, which is designed to provide a timely motive for a revenge-like attack on America by China.

This notion was confimed the very same day on December 19, 2015, when the Examiner published a report entitled “China Blames U.S. for ‘Serious Military Provocation;’ Will Take Action“. Said action will likley be in the form of a suprise attack on Hawaii, Japan, the Philippines and/or mainland United States.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 20 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

China pearl harbor

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan
12. South China Sea (Disputed Islands)

South China Sea Attack
Based on breaking news and events, it appears that the CIA is plotting a Chinese attack on the U.S Navy which has ships trolling the disputed islands within the South China Sea. This latest Chinese attack narrative was first identified back on October 15, 2015, when the Guardian published a report entitled “Chinese Media: Military Must be Ready to Counter US in South China Sea”, foreshadowing that a confrontation may be imminent. Nine days later on October 24, 2015, Yahoo News published a report entitled “U.S. Patrols to Raise Stakes with Beijing in Disputed South China Sea”, further raising the specter of a naval confrontation with China. Three days later on October 27, 2015, Reuters published a report entitled “Angry China Shadows U.S. Warship Near Man-Made Islands”, foreshadowing a Chinese attack on the USS Lassen destroyer. Lastly, in what appear to be the final warning by China just prior to a surprise revenge-like attack, it was reported on October 27, 2015, that China has officially warned the United States after the USS Lassen passes near the disputed islands. Needless to say, these reports, taken collectively, suggest that a confrontation between the U.S. and China in the South China Sea is imminent.

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Anonymous

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
December 26, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is plotting an unprecedented wave of cyber and/or real-world terror attacks across the globe between December 26, 2015 and January 1, 2016.

The impending state-sponsored attacks will predictably be scapegoated onto the state-sponsored cyber-terror group known as of Anonymous whose has allegedly been responsible for a plethora of cyber-attacks over the last few weeks (see below).

Exactly what type of terror is planned between December 26, 2015 and January 1, 2016 is not known, but cyber-related attacks on airliners, airports, banks, nuclear reactors, oil and gas facilities, power facilities, social media platforms (e.g., Facebook, Twitter, etc.) and stock markets are likely forthcoming.

In order to set the precedent for a massive Anonymous cyber-related attack on America, it was reported on December 21, 2015, that Anonymous hacked 100 sites in Japan in online protest against wreckless whale slaughters.

In what appears to be pre-Anonymous attack on the NSA terror programming, it was reported a dday later on December 22, 2015, that members of Anonymous warned that “The NSA is coming to town” in its new Christmas video message.

The notion that Anonymous  is plotting a massive attack was confirmed on December 24, 2015, when it was reported that Anonymous has taken credit for a massive cyberattack on Turkey in which servers were bombarded for more than a week with some of the most intense cyberattacks in the country’s history.

Anoymous stated: “Dear government of Turkey, if you don’t stop supporting ISIS, we will continue attacking your Internet, your root DNS, your banks and take your government sites down…After the root DNS we will start to hit your airports, military assets and private state connections…We will destroy your critical banking infrastructure.” Consequently, an Anonymous attack on America’s airports, financial sector and military is now expected.

That same day, December 24, 2015, it was reported that Anonymous issued a chilling online recruitment video which encouraged people to join the hacktivist collective. The report was evidently designed to show that the group is expanding just prior to an unprecedented attack.

The notion of an Anonymous attack was also witnessed a day later on December 25, 2015, when it was reported that Anonymous hacked a Costa Rican website associated with Jurassic Park Island. <during the attack, Anonymous teamed up with Egyptian hackers associated with the Anonymous Rabaa Team. Consequently, post cyber-attack, Anonymous and anyone affiliated with the group will be linked with Islamic terrorists.

In order to sell the notion that Anonymous is capable of hacking even the most secure of government networks, it was reported back on October 19, 2015, that an Anonymous-related hacker was able to access the email of alleged CIA Director John Brennan.

Coincidentally, a day later on October 20, 2015, the Financial Times of London published a report entitled “Hacks Clear Path for US Cyber Bill”. Needless to say, in the aftermath of a world-changing cyber-related attack, draconian legislation in respect to internet censorship will be passed.

TOP CYBER-TERROR SCENARIOS (NOV 4-6, 2015):

1. Airplane Cyber-Attack/Hijack
2. Airport Cyber-Attack
3. Banking Cyber-Attack (e.g., Federal Reserve Bank)
4. NSA Cyber-Attack (e.g., Utah Data Center)
5. Nuclear Reactor Cyber Attack
6. Oil & Gas Cyber-Attack
7. Power Grid Attack
8. Stock-Market Cyber-Attack (e.g., New York Stock Exchange)
9. Social Media Cyber-Attack (e.g., Facebook, Instagram, Twitter, etc.)
10. Military Cyber-Attack

I. FINANCIAL ATTACK:

anonymous-image

1.1: Anonymous Attack on Stock Markets

In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely an alleged member of Anonymous.

1.2: Anonymous Cyber-Hijack of U.S. Economy
Although an unprecedented cyber-terror attack on the U.S. economy could be blamed on China, the Guardians of Peace, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack, funneling the stolen money into allegedly untraceable Bitcoin accounts. Coincidentally, on October 2, 2014, it was revealed that an FBI informant admittedly organized Anonymous attacks on government websites in 30 countries, further confirming that the group known as Anonymous is in fact state-sponsored. The timely report was designed to set the precedent for an Anonymous attack on government-related websites such as the FED, NYSE, SEC, etc. An Anonymous-based cyber-attack will enable the progenitors of terror (i.e., the CIA) to steal billions if not trillions of dollars from the U.S. economy without a trace. Should a sovereign country be deemed responsible for the heist, defrauded investors worldwide would collectively demand compensation from that particular country, something the CIA does not want to deal with. In what appears to be pre-Wall Street cyber-attack logistics, it was revealed back on July 8, 2014, that Wall Street has now hired a former NSA chief to help create a “cyber war council”. Translation: Wall Street and the NSA are teaming up together to execute a Wall Street cyber-hijack which will likely disappear trillions of dollars, bankrupting the U.S. economy. In the wake of the attack, the NSA chief will likely be scapegoated for the attack.

II. SOCIAL MEDIA ATTACK:

Anonymous Twitter

2.1: Twitter Cyber-Attack
Unable to execute a direct cyber-related attack on the New York Stock Exchange (NYSE), it now appears that the Obama administration (at the behest of the CIA in Switzerland) may resort to attacking Twitter instead, possibly with a fraudulent report that causes a massive stock market crash. This notion was foreshadowed back on July 14, 2015, when CNBC published a report entitled “Twitter Shares Jump on Fake Takeover Report”. The term “fake takeover” was evidently designed to foreshadow a real-life fake takeover, namely the terrorist hijacking of a major entity such as the New York Stock Exchange, White House or the U.S. Capitol Building. In the aftermath of this bogus report, investors would instantly lose all faith in America, dumping their collective stock and crashing the market. In order to foreshadow that Twitter will be used in an upcoming terror attack, Fox News published a report on July 24, 2015, entitled “Could Twitter Stop the Next Terror Attack?”. Properly translated, the headline should read “Twitter Will Start the Next Terror Attack”. This exact scenario was beta-tested back on April 23, 2015, when the Twitter account of the Associated Press (AP) allegedly suffered a cyber-attack. The state-sponsored hackers then tweeted: “Breaking: Two explosions in the White House and Obama is injured”. The fake tween caused a subsequent panic which ultimately resulted in a 3-minute plunge of the NYSE, wiping out a total of $136.5 billion of its value. Needless to say, a redux attack now appears to be in order, most likely by the state-sponsored hacking group known as Anonymous who is very active on Twitter.

Twitter NYSE

2.2: Flash Crash Cyber-Attack
It now appears that the CIA in Switzerland will attempt to execute an attack on the New York Stock Exchange (NYSE) another way—most likely via a false-flag power failure. This particular notion as foreshadowed on April 17, 2015, when Bloomberg screens went dark worldwide. Four days later on April 21, 2015, it was reported that a futures trader was charged for manipulating the stock market which contributed to the 2010 “Flash Crash”. Given the 5-year delay in the banker’s indictment, it can be deduced that the patsy was only charged in order to foreshadow the “Flash Crash” just prior to another one transpiring in reality, most likely post-power failure.

III. TRAVEL ATTACK:

cyber hijack

3.1: Anonymous Airline Cyber-Hijack
The notion of airliner cyber-hijack was first raised by the Daily Mail back on March 16, 2014, when they published a report entitled “Is Missing Malaysian Jet the World’s First Cyber Hijack?”. The report cited an anti-terror expert who said that a plane’s altitude, speed and direction could be hacked by ‘codes’ and that planes could be landed using remote control. Roughly 8-months later on November 4, 2014, the software for a state-sponsored cyber-hijack of commercial airliners was evidently touted by Russia Today in a report entitled “Could Hackers Cyber-Hijack a Plane? UK Scientists Develop Tech to Fight Malware”. The software was likely built with a backdoor which specifically enables commercial airliners to be cyber-hijacked. In what appears to be pre-cyber-hijack attack propaganda, the Government Accountability Officer reported on April 14, 2015, that newer aircraft are vulnerable to hacking. A day later on April 15, 2015, Russia Today published a report entitled “Hijack Hack: Modern Planes Vulnerable to Remote Midair Takeover” which was designed to further sell the notion that airliners can now be hijacked by hackers. Roughly a week later on April 26, 2015, it was reported that an iPad glitch grounded two dozen American Airlines flights in America. The grounding was likely executed by the CIA in order to rig the planes with an electronic device and/or explosives which can be activated at a later date in order to bring the fleet of planes down simultaneously in the first-ever cyber-hijacking. Less than 2-weeks later on May 9, 2015, it was reported that an A400M Airbus cargo plane crashed near the Seville airport in Spain. According to follow-up report dated May 20, 2015, the Airbus A400M crash was linked to faulty software that had been installed. The Airbus A400M was evidently crashed by the CIA in order to set the precedent for a software-related airliner disaster. Post cyber-hijack attack, the May 2015 crash of the Airbus A400M will likely be touted as the first-ever cyber-hijack. Less than a week later on May 15, 2015, Wired magazine published a report entitled “Feds Say That Banned Researcher Commandeered a Plane”, further selling the notion that hackers could cyber-hijack commercial airliner just prior to it actually transpiring in reality. Three days later on May 18, 2015, Fox News published a report entitled “FBI Affidavit Claims Security Expert Admitted to Briefly Hacking Flight Controls”, confirming, albeit in a de facto manner, that the future cyber-hijack of commercial airliners will be executed by so-called “security experts” at the behest of the Swiss CIA. In order to associate Boeing (and thereby airplanes) with hackers just prior to an unprecedented cyber-attack on airliners, the Washington Post published a report on August 4, 2015, entitled “Hacked E-Mails: Boeing Wants its Drones to Hack Computers from the Sky”. A day later on August 5, 2015, Russia Today published a report entitled “‘Funtenna’ Uses Sound Waves, Radio to Hack Internet of Things”. Needless to say, airports and airliners are considered to be part of the so-called “Internet of Things”, a term used to describe real-world objects which are linked to the internet. The notion of a cyber-related attack on air travel was witnessed two days later on August 7, 2015, when Chinese hackers reportedly attacked the U.S. travel industry. The incident was likely staged or fabricated in order to sell the notion that China will target U.S. airliners in the future. Lastly, three days later on August 10, 2015, Yahoo News published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”, further associating aerial-related machines with hacking just prior to an unprecedented cyber-hijack attack on commercial airliners. Lastly, in what appears to be pre-airplane and/or airport cyber-hijack attack programing, it was reported on October 28, 2015, that the runaway military blimp landed in Pennsylvania. Needless to say, post cyber-attack on hundreds of airliners and/or airports, there will be scores of so-called runaway planes which subsequently are forced to crash-land around the world.

3.2: Airline “Glitches” Trending
Prior to a high-profile cyber-related terror attack on the airline industry, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, airline-related glitches and outages are now at an all-time high which suggests that a state-sponsored cyber-terror attack on the airline inducts

AIR TRAVEL GLITCH TIMELINE:

1. August 15, 2015: Computer outage at FAA center in D.C. delays flights in Northeast
2. August 15, 2015: Computer glitch grounds flights in New York, DC
3. September 17, 2015: American Airlines resolves issue that led to grounded flights at several hubs
4. October 12, 2015: Southwest says it has fixed glitch, expects flights to return to normal
5. October 15, 2015: Terror watch list program glitch blamed for flight delays at major airports
6. October 15, 2015: Customs computers crash at airports across US

[Does not purport to be a complete list of airline/airport-related glitches]

euroairport

3.3: Anonymous Airport Cyber-Attack
Based on breaking news and events, it appears that the CIA is plotting an airport-related cyber-attack that will bring the world busiest airports to a screeching halt, costing billions in damages. However, in the event that air traffic control loses contact with thousands of planes, chaos will ensue, possibly leading to numerous airplane-related crashes. In order to foreshadow the loss of human control over thousands of aircraft, the AP published a report back on September 14, 2015, entitled “Now Arriving: Airport Control Towers with No Humans Inside”. Roughly a month later on October 13, 2015, the AP published another report entitled “Union: Chronic Shortage of Air Traffic Controllers a Crisis”, foreshadowing that an air traffic control-related crisis is imminent. In what appears to be a beta-test for the impending air traffic control-related blackout via cyber-attack, Fox News published a report on October 15, 2015, entitled “Terror Watch List Program Glitch Blamed for Flight Delays at Major Airports”. The incident, which reportedly affected customs computers, was evidently staged in order to associate terrorism with airport computer malfunctions and flight delays just prior to a staged cyber-attack on airports across the world. Lastly, in what appears to be pre-airplane and/or airport cyber-hijack attack programing, it was reported on October 28, 2015, that a runaway U.S. military blimp landed in Pennsylvania. Needless to say, post cyber-attack, there will be scores of so-called runaway planes which subsequently are forced to crash-land around the world.

IV. INFRASTRUCTURE ATTACK:



4.1: Nuclear Reactor Attack
The notion that terrorists want to attack nuclear reactors was recently witnessed back on July 9, 2014, when Hamas attempted to attack the Israeli nuclear reactor in Dimona. Two days later on July 11, 2014, a report entitled “Response to ‘Attack’ on Nuclear Reactor Is Praised” was published in response to U.S. government terror drills on nuclear reactors. According to the timely report, “Other mock attacks have been conducted at a handful of the nation’s 62 nuclear power plants”. Evidently, the U.S. federal government is perfecting their respective nuclear terror attack scenarios. Exactly when and where the attacks will take place is not known, but practice makes perfect. Back on August 20, 2014, it was revealed that hackers attacked Nuclear Regulatory Commission 3 times in 3 years, a report designed to show that cyber-terrorists are actively targeting American nuclear reactors. Four days later on August 24, 2014, an Israeli spy drone was shot downed near Iran’s Natanz nuclear plant, foreshadowing the notion of aerial attack on nuclear reactors. Roughly 7-months later on March 17, 2015, it was reported that South Korea is blaming North Korea for a nuclear reactor cyberattack, ultimately setting the precedent for a North Korean cyber-attack on nuclear reactors within the United States. That same day, March 17, 2015, it was also reported that a South African who previously attacked a nuclear power plant is now a hero to his government and fellow citizens. The timely report was evidently published in order to highlight nuclear reactor terror attacks just prior to another transpiring in reality. Lastly, a day later on March 18, 2015, the BBC published a report entitled “Chernobyl: Containing the World’s Worst Nuclear Accident”. The timely propaganda report was evidently published in order to acclimate the public for another nuclear reactor-related “accident”, possibly the worst in history. Lastly, in order to associate hackers with nuclear terrorism just prior to an unprecedented cyber-attack on nuclear reactors, the Express published a report back on October 25, 2015, entitled “Cyber Hackers are Greater Threat to UK Security than Nuclear Weapons”. Needless to say, these reports, taken collective, suggest that a state-sponsored cyber-attack on nuclear reactors is imminent.

NSAutah

4.2: Anonymous NSA Attack
An Anonymous cyber-attack, should it happen, will most likely target the NSA’s new Utah Data Center which will likely result in the collapse, malfunction and/or explosion of U.S.-related infrastructure on the west coast of America (e.g., the electoral grid, dams, oil, gas, nuclear, water and sewer facilities). Known as the “Utah Data Center“, the NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, was completed in September of 2013. The $1.5B data center is located at Camp Williams, Utah, just 25 miles (40 km) south of Salt Lake City.

Oil Gas Hack Cyber

4.3: Oil & Gas Cyber-Attack
As originally depicted in the August 16, 2015, Truther.org report entitled “Obama Plotting Environmental Disasters & Global Oil Crisis via Hacks on US Gas Stations, Oil Refineries & Oil Rigs”, it appears that the Obama administration (at the behest of the CIA in Switzerland) is preparing to execute a wave of cyber-related terror attacks on U.S. oil/gas-related facilities, namely their Automated Tank Gauges (see below). Needless to say, a hack on hundreds of U.S. oil/gas-related facilities would cause an environmental disaster as well as a global oil-crisis that would likely lead to war in the Middle East. In the aftermath of said attacks, the state-sponsored terror group ISIS or rouge states like Iran, Saudi Arabia or Syria would likely be blamed. The notion of a gas-related hack was witnessed back on May 11, 2011, when hackers tapped a California gas pump, making off with off with 528 gallons. Roughly 15 months later in 2012, the Saudi Aramco Hack (see below) was executed, crippling over 30,000 oil/gas-related workstations. Although a redux of the aforementioned oil/gas-related hacks is indeed possible, it’s far more likely that the CIA has more nefarious intentions. Although only conjecture, it’s highly likely that the CIA will execute cyber-related attacks on U.S. oil/gas-related entities such as gas stations, oil refineries and oil rigs. In the aftermath of said oil/gas-related cyber-attacks, hardware and software present at said entities will likely malfunction, causing oil and gas-related explosions and/or spills that could result in potentially hundreds of environmental disasters across America. In order to psychologically prepare the masses for a wave of oil/gas-related cyber-attacks that spawn an international oil crisis and subsequent wars in the Middle East, it was reported on January 23, 2015, that thousands of U.S. gas stations are vulnerable to cyberattacks. Roughly 6-months later on August 5, 2015, CNN published a report entitled “The Inside Story of The Biggest Hack in History”, rehashing the aforementioned Saudi Aramco Hack that crippled over 30,000 oil/gas-related stations just prior to a redux attack transpiring in reality. That same day, August 5, 2015, the EPA purposely caused the 2015 Gold King Mine Waste Water Spill near Silverton, Colorado. According to reports, a total of 3,000,000 U.S. gallons (11 ML) of polluted mine waste water including cadmium, lead, and arsenic were released. The spill was admittedly executed by EPA personal (at the behest of the CIA in Switzerland) in order to psychologically prepare Americans for massive oil/gas-related spills in the aftermath of a state-sponsored cyber-related attack on U.S. oil/gas-related facilities. Two days later on August 7, 2015, it was reported that hackers are now attacking U.S. gas stations. Needless to say, the propaganda report was spawned by the CIA in order to further sell the notion that America’s oil/gas-related infrastructure is now being targeted. This very notion was confirmed less than a week later on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. The headline confirms, albeit in a de facto manner, that an oil crisis will follow the impending wave of state-sponsored cyber-attacks. In what appears to be an ominous sign that oil/gas-related terror is imminent, it was reported on August 14, 2015, that a series of explosions rocked a Texas oil field chemical supplier. In the event of an attack, Galveston Bay, Texas (Port of Houston , Port of Texas City & Port of Galveston) will likely be destroyed. Lastly, in order to provide a timely motive for Islamic/Middle Eastern cyber-related terror attacks on America’s oil/gas-related infrastructure, MarketWatch published a report on August 15, 2015, entitled “Why Gas Prices are Rising as Oil Falls to 6-year Lows”. Needless to say, post oil/gas-related cyber-attacks, oil prices will skyrocket.

Oil Gas Terror

4.4: Cyber-Attack on Automated Tank Gauges (ATGs)
Back on January 22, 2015, a report entitled “The Internet of Gas Station Tank Gauges”, was published, foreshadowing exactly what the CIA has planned in respect to an oil/gas.-related cyber-terror attack. Needless to say, it’s not pretty. The report states that “Automated Tank Gauges (ATGs) are used to monitor fuel tank inventory levels, track deliveries, raise alarms that indicate problems with the tank or gauge (such as a fuel spill), and to perform leak tests in accordance with environmental regulatory compliance”. Because ATGs are used by nearly every fueling station in the U.S. and tens of thousands of systems internationally, a hack on them could theoretically cripple the oil and gas industry. In all likelihood, ATGs were likely put in place specifically so that a cyber-related attack could commence at a future date. The report goes on to state that “Approximately 5,800 ATGs were found to be exposed to the internet without a password. Over 5,300 of these ATGs are located in the United States, which works out to about 3 percent of the approximately 150,000 fueling stations in the country. An attacker with access to the serial port interface of an ATG may be able to shut down the station by spoofing the reported fuel level, generating false alarms, and locking the monitoring service out of the system. Tank gauge malfunctions are considered a serious issue due to the regulatory and safety issues that may apply”. In other words, a state-sponsored hacker could single-handedly decimate the oil industry which is evidently why the ATGs were installed in the first place.

hackers-cyber-crime-anonymousv1

4.5: Anonymous Gas Station Hack
In order to sell the notion that gas pumps and gas stations are vulnerable to cyber-terror attacks just prior to their fruition in reality, a rash of reports were published back in February of 2012 which were designed to sell the notion that the state-sponsored hacking group known as Anonymous is targeting America’s oil/-related infrastructure. This narrative was first identified on February 10, 2015, when a report entitled “Is Anonymous Attacking Internet Exposed Gas Pump Monitoring Systems in the US?”, was published. Although Anonymous could be scapegoated, a Middle Eastern country is far more likely. A day later on February 11, 2015, it was reported that a U.S. gas station pump was hacked with an ‘Anonymous’ tagline. The incident was likely executed at the behest of the CIA in order to set the precedent for a future gas station-related cyber-attack. That same day, February 11, 2015, the Register published a report entitled “Anonymous Hacked Gas Station – Could Cause Fuel Shortages”, further confirming the notion that the CIA is plotting an oil/gas-related cyber-attack in order to cause an oil crisis in America.

FLASHBACK: Saudi Aramco Oil Hack
The notion that the CIA is plotting an oil/gas-related cyber-terror attack was witnessed back on August 15, 2012, during the Saudi Aramco Hack when the state-sponsored hacking group entitled “Cutting Sword of Justice” allegedly attacked 30,000 Saudi Aramco workstations, virtually crippling the company. According to reports, the Saudi state-owned oil company’s computers, unleashed a computer virus that “erased data on three-quarters of Aramco’s corporate PCs (documents, spreadsheets, e-mails, files), replacing all of it with an image of a burning American flag”. Predictably, U.S. intelligence officials stated that the hackers were from Iran, although they offered no specific evidence to support the claim.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China pearl harbor

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
November 15, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese attack and/or invasion, most likely targeting the United States or her military, most likely in San Diego, Hawaii and/or the South China Sea.

The impending Chinese attack will likely involve one or more of the following: a) a cyber-related attack on the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Australia Hawaii, Japan, Taiwan, the Philippines and/or mainland United States.

Consequently, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 17 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan
12. South China Sea (Disputed Islands)

South China Sea Attack
Based on breaking news and events, it appears that the CIA is plotting a Chinese attack on the U.S Navy which has ships trolling the disputed islands within the South China Sea. This latest Chinese attack narrative was first identified back on October 15, 2015, when the Guardian published a report entitled “Chinese Media: Military Must be Ready to Counter US in South China Sea”, foreshadowing that a confrontation may be imminent. Nine days later on October 24, 2015, Yahoo News published a report entitled “U.S. Patrols to Raise Stakes with Beijing in Disputed South China Sea”, further raising the specter of a naval confrontation with China. Three days later on October 27, 2015, Reuters published a report entitled “Angry China Shadows U.S. Warship Near Man-Made Islands”, foreshadowing a Chinese attack on the USS Lassen destroyer. Lastly, in what appear to be the final warning by China just prior to a surprise revenge-like attack, it was reported on October 27, 2015, that China has officially warned the United States after the USS Lassen passes near the disputed islands. Needless to say, these reports, taken collectively, suggest that a confrontation between the U.S. and China in the South China Sea is imminent.

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China pearl harbor

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
November 8, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese attack and/or invasion, most likely targeting the United States or her military, most likely in San Diego, Hawaii and/or the South China Sea.

The impending Chinese attack will likely involve one or more of the following: a) a cyber-related attack on the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Australia Hawaii, Japan, Taiwan, the Philippines and/or mainland United States.

Consequently, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 17 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan
12. South China Sea (Disputed Islands)

South China Sea Attack
Based on breaking news and events, it appears that the CIA is plotting a Chinese attack on the U.S Navy which has ships trolling the disputed islands within the South China Sea. This latest Chinese attack narrative was first identified back on October 15, 2015, when the Guardian published a report entitled “Chinese Media: Military Must be Ready to Counter US in South China Sea”, foreshadowing that a confrontation may be imminent. Nine days later on October 24, 2015, Yahoo News published a report entitled “U.S. Patrols to Raise Stakes with Beijing in Disputed South China Sea”, further raising the specter of a naval confrontation with China. Three days later on October 27, 2015, Reuters published a report entitled “Angry China Shadows U.S. Warship Near Man-Made Islands”, foreshadowing a Chinese attack on the USS Lassen destroyer. Lastly, in what appear to be the final warning by China just prior to a surprise revenge-like attack, it was reported on October 27, 2015, that China has officially warned the United States after the USS Lassen passes near the disputed islands. Needless to say, these reports, taken collectively, suggest that a confrontation between the U.S. and China in the South China Sea is imminent.

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Anonymous

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
November 4, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is plotting an unprecedented wave of cyber and/or real-world terror attacks across the globe on November 4 through November 6, 2015.

The impending state-sponsored attacks will predictably be scapegoated onto the state-sponsored cyber-terror group known as of Anonymous whose unofficial holiday is November 5. That being said, revenge-like attacks by the state-sponsored KKK whom Anonymous is now targeting may also be forthcoming.

Exactly what type of terror is planned surrounding November 5, 2015, is not known, but cyber-related attacks on airliners, airports, banks, nuclear reactors, oil and gas facilities, power facilities, social media platforms (e.g., Facebook, Twitter, etc.), stock markets and the new Star Wars movie may be forthcoming.

Considering that “Remember, Remember, the Fifth of November” is the undeclared motto of the state-sponsored terror group Anonymous, their minions will be out in force before, during and after November 5, 2015, providing the perfect scapegoat for earth-changing cyber-attacks.

November 5 commemorates Guy Fawkes’ failed 1605 Gunpowder Plot to blow up the Houses of Parliament in London, England. The foiled terror attack which was recently made popular by the “V for Vendetta” (2005) propaganda film (see trailer).

In short, the movie “V for Vendetta” glorified the notion of domestic terrorism while it paved the way for the emergence of the state-sponsored terror group known as Anonymous. Consequently, the Anonymous mask, which has since become synonymous with rebellion in pop culture, will shortly be affiliated with terror.

According to Anonymous, protests will be held in 664 cities across the world, including the city of London which appears to be one of the slated targets. Protests will also be held at state capitols and city halls as well, providing a plethora of potential targets and patsies to choose from.

While a wave of state-sponsored terror is no doubt planned for November 5, 2015, it’s highly likely that attacks are also planned for November 4 and November 6, respectively. In all likelihood, the CIA will try and circumvent Truther.org terror alerts once again, hence this early report.

Although Anonymous-related cyber-attacks and violence are expected on November 5, 2015, it was reported that Anonymous will start a barrage against the KKK on November 4, 2015, with a tweetstorm using the hashtags #OpKKK, #HoodsOff, #KKKarma. Consequently, KKK revenge attacks may be forthcoming.

In order to sell the notion that Anonymous is capable of hacking even the most secure of government networks, it was reported back on October 19, 2015, that an Anonymous-related hacker was able to access the email of alleged CIA Director John Brennan.

Coincidentally, a day later on October 20, 2015, the Financial Times of London published a report entitled “Hacks Clear Path for US Cyber Bill”. Needless to say, in the aftermath of a world-changing cyber-related attack, draconian legislation in respect to internet censorship will be passed.

In what appears to be a CIA-spawned publicity stunt designed to raise the profile of Anonymous just prior to a wave of state-sponsored cyber-attacks, it was reported on October 29, 2015, that Anonymous intends to unveil names of up to 1,000 Ku Klux Klan members. Consequently, revenge-like attacks by the KKK may be forthcoming.

In what appears to be an ominous sign of Anonymous-spawned terror to come, it was reported that Anonymous is plotting a so-called “bonfire night” during the Million Mask March on November 5, 2015. Translation: Anonymous is planning to burn a number of cities to the ground.

In what appears to be a CIA-spawned publicity stunt designed to foreshadow a bank-related cyber-attack just prior to its fruition in reality, 2 protesters rappelled down from the balcony at the Colts-Panthers game at Bank of America Stadium in Charlotte, North Carolina on November 2, 2015.

The CIA protesters unveiled a black banner which read “BoA (Bank of America) … DUMP … Dominion …WeAreCovePoint.org”. Aside from foreshadowing the dump of the U.S. dollar post banking cyber-attack, the banner foreshadowed an Anonymous attack as their slogan is “We are Anonymous. Expect Us”.

There is also a chance that Anonymous will allegedly hack Lucasfilm and/or Walt Disney Studios
Motion Pictures
and release the “Star Wars: The Force Awakens” film for free online prior to its scheduled release on December 18, 2015. Consequently, the attack will forever be known as the “Star Wars Hack”.

The notion that the film “Star Wars: The Force Awakens” will be seen prior to its scheduled release date was foreshadowed on November 3, 2015, when Entertainment Weekly published a report entitled “Terminally Ill Star Wars Fan Asks to See The Force Awakens Early”.

Lastly, back on October 12, 2015, it was reported that Southwest Airlines suffered a so-called glitch, causing the discount airline to ground its entire fleet. Said grounding may have provided the necessary cover the alteration of the fleets electronics so that they are able to suffer a cyber-related hijack at a later date.

TOP CYBER-TERROR SCENARIOS (NOV 4-6, 2015):

1. Airplane Cyber-Attack/Hijack
2. Airport Cyber-Attack
3. Banking Cyber-Attack (e.g., Federal Reserve Bank)
4. NSA Cyber-Attack (e.g., Utah Data Center)
5. Nuclear Reactor Cyber Attack
6. Oil & Gas Cyber-Attack
7. Power Grid Attack
8. Stock-Market Cyber-Attack (e.g., New York Stock Exchange)
9. Twitter Cyber-Attack
10. Star Wars Cyber-Attack

I. REAL-WORLD ATTACK:

gaelx_-_anonymous

1.1: Anonymous Attack on London
Come November 5, 2015, Anonymous-related protests are scheduled to take place in Trafalgar Square and Parliament Square in London. However, it’s highly likely that the Anonymous protests will start in London a day early on November 4, 2015. The notion that violence is planned for London was confirmed back on November 1, 2015, when it was reported that clashes erupted overnight in London as police cracked down on partygoers. The so-called crackdown was evidently staged in order to foreshadow police vs. protester violence in London just prior to its fruition in reality. According to a November 4, 2015, report from the International Business Times entitled “Million Mask March London: Thousand-Strong Anonymous Protest has Police Prepare for Violence”, an ominous sign of Anonymous-related violence to come. According to reports, London Police are warning of the potential threat of violence and disorder in London during the annual Million Mask March. There are reportedly concerns that peaceful protest is the “last thing on the minds” of many of those planning to attend. The march has reportedly become synonymous with “anti-social behavior, criminal damage… and attacks on police officers” over the years. Chief Superintendent Pippa Mills, from the Metropolitan Police Service stated that “Last year hundreds of people on their way home from work, or out enjoying an evening in the Capital, were surrounded by people causing them huge concern. Buses were physically rocked, people jumped on car bonnets, as well as serious disorder in central London and damage to a number of buildings”.

1.2: Anonymous Attack on Capitals & City Halls
November 5th commemorates Guy Fawkes’ failed 1605 Gunpowder Plot to blow up the Houses of Parliament in London, England. The foiled terror attack was made popular by the “V for Vendetta” (2005) film (see trailer) which glorified the notion of vigilante terrorism, ultimately paving the way for the emergence of the state-sponsored terror group known as Anonymous who adopted the films credo and symbology. Consequently, a redux attack on the U.S. Capitol Building in Washington, D.C., and/or the Palace of Westminster (UK Parliament) in London may be in order. Coincidentally, Anonymous will be holding protests at state capitols and city halls across the world so real-world attacks at one or more of these locations is highly likely.

II. FINANCIAL ATTACK:

anonymous-image

2.1: Anonymous Attack on Stock Markets

In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely an alleged member of Anonymous.

2.2: Anonymous Cyber-Hijack of U.S. Economy
Although an unprecedented cyber-terror attack on the U.S. economy could be blamed on China, the Guardians of Peace, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack, funneling the stolen money into allegedly untraceable Bitcoin accounts. Coincidentally, on October 2, 2014, it was revealed that an FBI informant admittedly organized Anonymous attacks on government websites in 30 countries, further confirming that the group known as Anonymous is in fact state-sponsored. The timely report was designed to set the precedent for an Anonymous attack on government-related websites such as the FED, NYSE, SEC, etc. An Anonymous-based cyber-attack will enable the progenitors of terror (i.e., the CIA) to steal billions if not trillions of dollars from the U.S. economy without a trace. Should a sovereign country be deemed responsible for the heist, defrauded investors worldwide would collectively demand compensation from that particular country, something the CIA does not want to deal with. In what appears to be pre-Wall Street cyber-attack logistics, it was revealed back on July 8, 2014, that Wall Street has now hired a former NSA chief to help create a “cyber war council”. Translation: Wall Street and the NSA are teaming up together to execute a Wall Street cyber-hijack which will likely disappear trillions of dollars, bankrupting the U.S. economy. In the wake of the attack, the NSA chief will likely be scapegoated for the attack.

III. SOCIAL MEDIA ATTACK:

Anonymous Twitter

3.1: Twitter Cyber-Attack
Unable to execute a direct cyber-related attack on the New York Stock Exchange (NYSE), it now appears that the Obama administration (at the behest of the CIA in Switzerland) may resort to attacking Twitter instead, possibly with a fraudulent report that causes a massive stock market crash. This notion was foreshadowed back on July 14, 2015, when CNBC published a report entitled “Twitter Shares Jump on Fake Takeover Report”. The term “fake takeover” was evidently designed to foreshadow a real-life fake takeover, namely the terrorist hijacking of a major entity such as the New York Stock Exchange, White House or the U.S. Capitol Building. In the aftermath of this bogus report, investors would instantly lose all faith in America, dumping their collective stock and crashing the market. In order to foreshadow that Twitter will be used in an upcoming terror attack, Fox News published a report on July 24, 2015, entitled “Could Twitter Stop the Next Terror Attack?”. Properly translated, the headline should read “Twitter Will Start the Next Terror Attack”. This exact scenario was beta-tested back on April 23, 2015, when the Twitter account of the Associated Press (AP) allegedly suffered a cyber-attack. The state-sponsored hackers then tweeted: “Breaking: Two explosions in the White House and Obama is injured”. The fake tween caused a subsequent panic which ultimately resulted in a 3-minute plunge of the NYSE, wiping out a total of $136.5 billion of its value. Needless to say, a redux attack now appears to be in order, most likely by the state-sponsored hacking group known as Anonymous who is very active on Twitter.

Twitter NYSE

3.2: Flash Crash Cyber-Attack
It now appears that the CIA in Switzerland will attempt to execute an attack on the New York Stock Exchange (NYSE) another way—most likely via a false-flag power failure. This particular notion as foreshadowed on April 17, 2015, when Bloomberg screens went dark worldwide. Four days later on April 21, 2015, it was reported that a futures trader was charged for manipulating the stock market which contributed to the 2010 “Flash Crash”. Given the 5-year delay in the banker’s indictment, it can be deduced that the patsy was only charged in order to foreshadow the “Flash Crash” just prior to another one transpiring in reality, most likely post-power failure.

IV. TRAVEL ATTACK:

cyber hijack

4.1: Anonymous Airline Cyber-Hijack
The notion of airliner cyber-hijack was first raised by the Daily Mail back on March 16, 2014, when they published a report entitled “Is Missing Malaysian Jet the World’s First Cyber Hijack?”. The report cited an anti-terror expert who said that a plane’s altitude, speed and direction could be hacked by ‘codes’ and that planes could be landed using remote control. Roughly 8-months later on November 4, 2014, the software for a state-sponsored cyber-hijack of commercial airliners was evidently touted by Russia Today in a report entitled “Could Hackers Cyber-Hijack a Plane? UK Scientists Develop Tech to Fight Malware”. The software was likely built with a backdoor which specifically enables commercial airliners to be cyber-hijacked. In what appears to be pre-cyber-hijack attack propaganda, the Government Accountability Officer reported on April 14, 2015, that newer aircraft are vulnerable to hacking. A day later on April 15, 2015, Russia Today published a report entitled “Hijack Hack: Modern Planes Vulnerable to Remote Midair Takeover” which was designed to further sell the notion that airliners can now be hijacked by hackers. Roughly a week later on April 26, 2015, it was reported that an iPad glitch grounded two dozen American Airlines flights in America. The grounding was likely executed by the CIA in order to rig the planes with an electronic device and/or explosives which can be activated at a later date in order to bring the fleet of planes down simultaneously in the first-ever cyber-hijacking. Less than 2-weeks later on May 9, 2015, it was reported that an A400M Airbus cargo plane crashed near the Seville airport in Spain. According to follow-up report dated May 20, 2015, the Airbus A400M crash was linked to faulty software that had been installed. The Airbus A400M was evidently crashed by the CIA in order to set the precedent for a software-related airliner disaster. Post cyber-hijack attack, the May 2015 crash of the Airbus A400M will likely be touted as the first-ever cyber-hijack. Less than a week later on May 15, 2015, Wired magazine published a report entitled “Feds Say That Banned Researcher Commandeered a Plane”, further selling the notion that hackers could cyber-hijack commercial airliner just prior to it actually transpiring in reality. Three days later on May 18, 2015, Fox News published a report entitled “FBI Affidavit Claims Security Expert Admitted to Briefly Hacking Flight Controls”, confirming, albeit in a de facto manner, that the future cyber-hijack of commercial airliners will be executed by so-called “security experts” at the behest of the Swiss CIA. In order to associate Boeing (and thereby airplanes) with hackers just prior to an unprecedented cyber-attack on airliners, the Washington Post published a report on August 4, 2015, entitled “Hacked E-Mails: Boeing Wants its Drones to Hack Computers from the Sky”. A day later on August 5, 2015, Russia Today published a report entitled “‘Funtenna’ Uses Sound Waves, Radio to Hack Internet of Things”. Needless to say, airports and airliners are considered to be part of the so-called “Internet of Things”, a term used to describe real-world objects which are linked to the internet. The notion of a cyber-related attack on air travel was witnessed two days later on August 7, 2015, when Chinese hackers reportedly attacked the U.S. travel industry. The incident was likely staged or fabricated in order to sell the notion that China will target U.S. airliners in the future. Lastly, three days later on August 10, 2015, Yahoo News published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”, further associating aerial-related machines with hacking just prior to an unprecedented cyber-hijack attack on commercial airliners. Lastly, in what appears to be pre-airplane and/or airport cyber-hijack attack programing, it was reported on October 28, 2015, that the runaway military blimp landed in Pennsylvania. Needless to say, post cyber-attack on hundreds of airliners and/or airports, there will be scores of so-called runaway planes which subsequently are forced to crash-land around the world.

4.2: Airline “Glitches” Trending
Prior to a high-profile cyber-related terror attack on the airline industry, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, airline-related glitches and outages are now at an all-time high which suggests that a state-sponsored cyber-terror attack on the airline inducts

AIR TRAVEL GLITCH TIMELINE:

1. August 15, 2015: Computer outage at FAA center in D.C. delays flights in Northeast
2. August 15, 2015: Computer glitch grounds flights in New York, DC
3. September 17, 2015: American Airlines resolves issue that led to grounded flights at several hubs
4. October 12, 2015: Southwest says it has fixed glitch, expects flights to return to normal
5. October 15, 2015: Terror watch list program glitch blamed for flight delays at major airports
6. October 15, 2015: Customs computers crash at airports across US

[Does not purport to be a complete list of airline/airport-related glitches]

euroairport

4.3: Anonymous Airport Cyber-Attack
Based on breaking news and events, it appears that the CIA is plotting an airport-related cyber-attack that will bring the world busiest airports to a screeching halt, costing billions in damages. However, in the event that air traffic control loses contact with thousands of planes, chaos will ensue, possibly leading to numerous airplane-related crashes. In order to foreshadow the loss of human control over thousands of aircraft, the AP published a report back on September 14, 2015, entitled “Now Arriving: Airport Control Towers with No Humans Inside”. Roughly a month later on October 13, 2015, the AP published another report entitled “Union: Chronic Shortage of Air Traffic Controllers a Crisis”, foreshadowing that an air traffic control-related crisis is imminent. In what appears to be a beta-test for the impending air traffic control-related blackout via cyber-attack, Fox News published a report on October 15, 2015, entitled “Terror Watch List Program Glitch Blamed for Flight Delays at Major Airports”. The incident, which reportedly affected customs computers, was evidently staged in order to associate terrorism with airport computer malfunctions and flight delays just prior to a staged cyber-attack on airports across the world. Lastly, in what appears to be pre-airplane and/or airport cyber-hijack attack programing, it was reported on October 28, 2015, that a runaway U.S. military blimp landed in Pennsylvania. Needless to say, post cyber-attack, there will be scores of so-called runaway planes which subsequently are forced to crash-land around the world.

V. INFRASTRUCTURE ATTACK:



5.1: Nuclear Reactor Attack
The notion that terrorists want to attack nuclear reactors was recently witnessed back on July 9, 2014, when Hamas attempted to attack the Israeli nuclear reactor in Dimona. Two days later on July 11, 2014, a report entitled “Response to ‘Attack’ on Nuclear Reactor Is Praised” was published in response to U.S. government terror drills on nuclear reactors. According to the timely report, “Other mock attacks have been conducted at a handful of the nation’s 62 nuclear power plants”. Evidently, the U.S. federal government is perfecting their respective nuclear terror attack scenarios. Exactly when and where the attacks will take place is not known, but practice makes perfect. Back on August 20, 2014, it was revealed that hackers attacked Nuclear Regulatory Commission 3 times in 3 years, a report designed to show that cyber-terrorists are actively targeting American nuclear reactors. Four days later on August 24, 2014, an Israeli spy drone was shot downed near Iran’s Natanz nuclear plant, foreshadowing the notion of aerial attack on nuclear reactors. Roughly 7-months later on March 17, 2015, it was reported that South Korea is blaming North Korea for a nuclear reactor cyberattack, ultimately setting the precedent for a North Korean cyber-attack on nuclear reactors within the United States. That same day, March 17, 2015, it was also reported that a South African who previously attacked a nuclear power plant is now a hero to his government and fellow citizens. The timely report was evidently published in order to highlight nuclear reactor terror attacks just prior to another transpiring in reality. Lastly, a day later on March 18, 2015, the BBC published a report entitled “Chernobyl: Containing the World’s Worst Nuclear Accident”. The timely propaganda report was evidently published in order to acclimate the public for another nuclear reactor-related “accident”, possibly the worst in history. Lastly, in order to associate hackers with nuclear terrorism just prior to an unprecedented cyber-attack on nuclear reactors, the Express published a report back on October 25, 2015, entitled “Cyber Hackers are Greater Threat to UK Security than Nuclear Weapons”. Needless to say, these reports, taken collective, suggest that a state-sponsored cyber-attack on nuclear reactors is imminent.

NSAutah

5.2: Anonymous NSA Attack
An Anonymous cyber-attack, should it happen, will most likely target the NSA’s new Utah Data Center which will likely result in the collapse, malfunction and/or explosion of U.S.-related infrastructure on the west coast of America (e.g., the electoral grid, dams, oil, gas, nuclear, water and sewer facilities). Known as the “Utah Data Center“, the NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, was completed in September of 2013. The $1.5B data center is located at Camp Williams, Utah, just 25 miles (40 km) south of Salt Lake City.

Oil Gas Hack Cyber

5.3: Oil & Gas Cyber-Attack
As originally depicted in the August 16, 2015, Truther.org report entitled “Obama Plotting Environmental Disasters & Global Oil Crisis via Hacks on US Gas Stations, Oil Refineries & Oil Rigs”, it appears that the Obama administration (at the behest of the CIA in Switzerland) is preparing to execute a wave of cyber-related terror attacks on U.S. oil/gas-related facilities, namely their Automated Tank Gauges (see below). Needless to say, a hack on hundreds of U.S. oil/gas-related facilities would cause an environmental disaster as well as a global oil-crisis that would likely lead to war in the Middle East. In the aftermath of said attacks, the state-sponsored terror group ISIS or rouge states like Iran, Saudi Arabia or Syria would likely be blamed. The notion of a gas-related hack was witnessed back on May 11, 2011, when hackers tapped a California gas pump, making off with off with 528 gallons. Roughly 15 months later in 2012, the Saudi Aramco Hack (see below) was executed, crippling over 30,000 oil/gas-related workstations. Although a redux of the aforementioned oil/gas-related hacks is indeed possible, it’s far more likely that the CIA has more nefarious intentions. Although only conjecture, it’s highly likely that the CIA will execute cyber-related attacks on U.S. oil/gas-related entities such as gas stations, oil refineries and oil rigs. In the aftermath of said oil/gas-related cyber-attacks, hardware and software present at said entities will likely malfunction, causing oil and gas-related explosions and/or spills that could result in potentially hundreds of environmental disasters across America. In order to psychologically prepare the masses for a wave of oil/gas-related cyber-attacks that spawn an international oil crisis and subsequent wars in the Middle East, it was reported on January 23, 2015, that thousands of U.S. gas stations are vulnerable to cyberattacks. Roughly 6-months later on August 5, 2015, CNN published a report entitled “The Inside Story of The Biggest Hack in History”, rehashing the aforementioned Saudi Aramco Hack that crippled over 30,000 oil/gas-related stations just prior to a redux attack transpiring in reality. That same day, August 5, 2015, the EPA purposely caused the 2015 Gold King Mine Waste Water Spill near Silverton, Colorado. According to reports, a total of 3,000,000 U.S. gallons (11 ML) of polluted mine waste water including cadmium, lead, and arsenic were released. The spill was admittedly executed by EPA personal (at the behest of the CIA in Switzerland) in order to psychologically prepare Americans for massive oil/gas-related spills in the aftermath of a state-sponsored cyber-related attack on U.S. oil/gas-related facilities. Two days later on August 7, 2015, it was reported that hackers are now attacking U.S. gas stations. Needless to say, the propaganda report was spawned by the CIA in order to further sell the notion that America’s oil/gas-related infrastructure is now being targeted. This very notion was confirmed less than a week later on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. The headline confirms, albeit in a de facto manner, that an oil crisis will follow the impending wave of state-sponsored cyber-attacks. In what appears to be an ominous sign that oil/gas-related terror is imminent, it was reported on August 14, 2015, that a series of explosions rocked a Texas oil field chemical supplier. In the event of an attack, Galveston Bay, Texas (Port of Houston , Port of Texas City & Port of Galveston) will likely be destroyed. Lastly, in order to provide a timely motive for Islamic/Middle Eastern cyber-related terror attacks on America’s oil/gas-related infrastructure, MarketWatch published a report on August 15, 2015, entitled “Why Gas Prices are Rising as Oil Falls to 6-year Lows”. Needless to say, post oil/gas-related cyber-attacks, oil prices will skyrocket.

Oil Gas Terror

5.4: Cyber-Attack on Automated Tank Gauges (ATGs)
Back on January 22, 2015, a report entitled “The Internet of Gas Station Tank Gauges”, was published, foreshadowing exactly what the CIA has planned in respect to an oil/gas.-related cyber-terror attack. Needless to say, it’s not pretty. The report states that “Automated Tank Gauges (ATGs) are used to monitor fuel tank inventory levels, track deliveries, raise alarms that indicate problems with the tank or gauge (such as a fuel spill), and to perform leak tests in accordance with environmental regulatory compliance”. Because ATGs are used by nearly every fueling station in the U.S. and tens of thousands of systems internationally, a hack on them could theoretically cripple the oil and gas industry. In all likelihood, ATGs were likely put in place specifically so that a cyber-related attack could commence at a future date. The report goes on to state that “Approximately 5,800 ATGs were found to be exposed to the internet without a password. Over 5,300 of these ATGs are located in the United States, which works out to about 3 percent of the approximately 150,000 fueling stations in the country. An attacker with access to the serial port interface of an ATG may be able to shut down the station by spoofing the reported fuel level, generating false alarms, and locking the monitoring service out of the system. Tank gauge malfunctions are considered a serious issue due to the regulatory and safety issues that may apply”. In other words, a state-sponsored hacker could single-handedly decimate the oil industry which is evidently why the ATGs were installed in the first place.

hackers-cyber-crime-anonymousv1

5.5: Anonymous Gas Station Hack
In order to sell the notion that gas pumps and gas stations are vulnerable to cyber-terror attacks just prior to their fruition in reality, a rash of reports were published back in February of 2012 which were designed to sell the notion that the state-sponsored hacking group known as Anonymous is targeting America’s oil/-related infrastructure. This narrative was first identified on February 10, 2015, when a report entitled “Is Anonymous Attacking Internet Exposed Gas Pump Monitoring Systems in the US?”, was published. Although Anonymous could be scapegoated, a Middle Eastern country is far more likely. A day later on February 11, 2015, it was reported that a U.S. gas station pump was hacked with an ‘Anonymous’ tagline. The incident was likely executed at the behest of the CIA in order to set the precedent for a future gas station-related cyber-attack. That same day, February 11, 2015, the Register published a report entitled “Anonymous Hacked Gas Station – Could Cause Fuel Shortages”, further confirming the notion that the CIA is plotting an oil/gas-related cyber-attack in order to cause an oil crisis in America.

FLASHBACK: Saudi Aramco Hack
The notion that the CIA is plotting an oil/gas-related cyber-terror attack was witnessed back on August 15, 2012, during the Saudi Aramco Hack when the state-sponsored hacking group entitled “Cutting Sword of Justice” allegedly attacked 30,000 Saudi Aramco workstations, virtually crippling the company. According to reports, the Saudi state-owned oil company’s computers, unleashed a computer virus that “erased data on three-quarters of Aramco’s corporate PCs (documents, spreadsheets, e-mails, files), replacing all of it with an image of a burning American flag”. Predictably, U.S. intelligence officials stated that the hackers were from Iran, although they offered no specific evidence to support the claim.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China pearl harbor

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

WORLD WAR III: CIA Plotting Proxy War Between US & Russia in Syria to Spark World War III—Russian-Based Nuclear Missile Strike on US and/or Russian-Based Attack/Invasion of Alaska, Syria and/or Ukraine Imminent

RED DAWN SCENARIO: CIA Plotting Chinese Pearl Harbor-Like Surprise Attack—Cloaked Chinese Drone Attack, US Drone Cyber-Hijack Attack & Sub-Based Nuclear Strike on US Top Terror Scenarios

NUCLEAR HOLOCAUST: CIA Plotting Iranian Nuclear Terror Attack on America—LA, NYC, DC & NFL Cities Most Likely to Suffer Attack

ISIS ENDGAME:
How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BOOM: CIA Plotting Man-Made Asteroid Strike this October—JADE HELM States, Gulf of Mexico & Pacific Rim of Fire Most Likely to Suffer Attack

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
November 1, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese attack and/or invasion, most likely targeting the United States or her military, possibly in Hawaii and/or the South China Sea.

The impending Chinese attack will likely involve one or more of the following: a) a cyber-related attack on the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Australia Hawaii, Japan, Taiwan, the Philippines and/or mainland United States.

Consequently, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 17 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan
12. South China Sea (Disputed Islands)

South China Sea Attack
Based on breaking news and events, it appears that the CIA is plotting a Chinese attack on the U.S Navy which has ships trolling the disputed islands within the South China Sea. This latest Chinese attack narrative was first identified back on October 15, 2015, when the Guardian published a report entitled “Chinese Media: Military Must be Ready to Counter US in South China Sea”, foreshadowing that a confrontation may be imminent. Nine days later on October 24, 2015, Yahoo News published a report entitled “U.S. Patrols to Raise Stakes with Beijing in Disputed South China Sea”, further raising the specter of a naval confrontation with China. Three days later on October 27, 2015, Reuters published a report entitled “Angry China Shadows U.S. Warship Near Man-Made Islands”, foreshadowing a Chinese attack on the USS Lassen destroyer. Lastly, in what appear to be the final warning by China just prior to a surprise revenge-like attack, it was reported on October 27, 2015, that China has officially warned the United States after the USS Lassen passes near the disputed islands. Needless to say, these reports, taken collectively, suggest that a confrontation between the U.S. and China in the South China Sea is imminent.

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss