Archive for the ‘Cyber-Hijack Terror’ Category

Flight MH370

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

SHOCK: 10 Reasons Why the Paris Terror Attacks Were Executed by the CIA

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
January 1, 2016
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the Obama administration (at the behest of CIA Headquarters beneath Lake Geneva) is preparing to execute a wave of airports-related terror attacks on New Year’s Day, January 1, 2016.

Exactly what type of airport-related terror is planned for the U.S. is not known, but a 9/11-style attack, bio-terror attack, gun-related massacre, suicide bombing, hostage crisis, and/or prolonged made-for-TV siege are the most likely terror scenarios. That being said, aiport hacks and airliners cyber-hijacks are also possible.

The 9/11-style attack may come from Malaysian Airlines Flight MH370 which was explicitly hijacked by CIA on March 8, 2014, in order to execute a surprise WMD attack. Flight MH370 could also be used to transport hundreds of ISIS terrorists from Iraq, Jordan and Syria into a western country via an airport.

Top Airport Terror Targets

1. JFK International Airport (New York, New York)
2. LaGuardia Airport (New York, New York)
3. LAX International Airport (Los Angeles, California)
4. Miami International Airport (Miami, Florida)
5. Newark Liberty International Airport (Newark, New Jersey)
6. Charles de Gaulle Airport (Paris, France)
7. Hartsfield–Jackson Atlanta International Airport (Atlanta, Georgia)
8. LA/Ontario International Airport (Los Angeles, California)
9. O’Hare International Airport (Chicago, Illinois)
10. EuroAirport (Basel, Switzerland)
11. Minneapolis-St.Paul International Airport (Minneapolis, Minnesota)

tsa-todd-starnes-620x362

TSA Terror Scandal
In order to sell the notion that U.S. airport security is flawed in a post-9/11 world, a scandal regarding the TSA was fabricated by the CIA on June 2, 2015, when it was reported that TSA screeners failed to test for and detect explosives and weapons. In response, Homeland Security reportedly beefed up airport security screening after the report, giving the U.S. government plausible deniability in the wake of an unprecedented U.S. airport-related attack. In order to make the TSA scandal appear real in nature, on June 2, 2015, the acting head of the TSA reassigned after the so-called watchdog report revealed the airport security failings. Less than a week later on June 9, 2015, the Inspector General released a report which stated that TSA officials failed to identify 73 workers who were “linked to terrorism” . The timely report confirmed, albeit in a de facto manner, that the impending U.S. airport attack will be an inside job, most likely executed rouge TSA agents Lastly, that same day, June 9, 2015, it was also reported that Homeland Security is now looking for the leaker of a report on U.S. airport-checkpoint failures. In other words, the weakest U.S. airport checkpoints are now public knowledge and will predictably be exploited in the near future by state-sponsored terrorists.

Airport Domestic

Domestic Airport Attack
Based on breaking news and events, it appears that the Obama administration (the behest of CIA Headquarters beneath Lake Geneva) is plotting a domestic terrorist attack on a U.S. airport. This particular narrative was first identified back on March 21, 2015, when the New Orleans Airport came under attack by a man who was carrying a bag with 6 Molotov cocktails. The airport attacker was reportedly armed with a machete and explosives. After executing the airport attack, the terror patsy was evidently double-crossed and executed by federal agents the same day, March 21, 2015. Roughly 3-months later on June 5, 2015, it was reported that a man was accused of plotting suicide bomb attack at a Kansas airport, an ominous sign of 9/11-style airport terror to come. Roughly 2-months later on July 29, 2015, a plane crashed at Milwaukee’s Timmerman Airport, killing at least one. Whether foul play was involved is not known, but it’s highly likely. Six days later on August 4, 2015, it was reported that a man drove his car through a New Orleans Airport fence and onto the runway. The incident was likely staged of fabricated in order to set the precedent for a domestic attack/assault on a U.S. airport. A week later on August 19, 2015, a man arrested after running onto the Denver airport ramp where he was allegedly trying to stop plane. Again, the incident was likely staged of fabricated in order to set the precedent for a domestic attack/assault on a U.S. airport. Eleven days later on August 31, 2015, a Kansas man was reportedly sentenced to 20 years in prison for plotting a suicide bomb attack at the Wichita airport. Consequently, a 9/11-style attack and/or suicide bombing may now be in order for a U.S. airport. Lastly, on September 17, 2015, a Texas man was accused of crashing through a gate at the Waco airport gate in attempt to steal executive jet. Again, the incident was likely staged of fabricated in order to set the precedent for a domestic attack, assault or hijacking at a U.S. airport. Needless to say, these reports, taken collectively, suggest that a state-sponsored domestic terror attack on a U.S. airport is imminent. Said attack will be executed by Special Forces (i.e., professional terrorists) but blamed on an anti-government militia.

090314_airport

Islamic Airport Attack
Back on April 10, 2014, a photo of San Francisco Airport appeared in al-Qaida’s magazine “Inspire”. Since Al Qaeda and ISIS are the primary terrorist arms of the CIA, the magazine’s “photos” are in essence the targets that the CIA is planning to attack. The notion that Islamic terrorists wants to execute an airport related terror attack was foreshadowed back on October 6, 2014, when a teenager was arrested at O’Hare Airport in Chicago after trying to join ISIS. Less than a week later on October 12, 2014, U.S. General Dempsey stated that ISIS had “straight shot” to Baghdad airport, implying that an ISIS airport attack may be forthcoming. Roughly 5-months later on March 7, 2015, a female ISIS recruiter was reportedly arrested at the Barcelona Airport. Less than 24.-hours on March 8, 2015, 2 teenagers were reportedly stopped at the Sydney Airport on suspicion of trying to join ISIS, further suggesting that an ISIS-related airport attack is imminent. Lastly, on September 21, 2015, it was reported that 5 ISIS terror suspects were nabbed at the Johannesburg airport with $6,000,000 in cash. The incident was obviously fabricated or staged in order to show that wealthy ISIS terrorists will target airports in the near future, most likely in America. Needless to say, these reports, taken collectively, confirm that an ISIS-related airport attack is now in play.

Islamic Airport Attacks:

1. June 9, 2014: ‘This is just the beginning’: Taliban claim Pakistan airport attack
2. June 10, 2014: Gunmen attack Karachi Airport security training facility in second assault
3. June 26, 2014: Separatists attack airport in east Ukraine, defy truce
4. July 17, 2014: Gunmen attack airport in Afghan capital
5. July 27, 2014: Over 50 dead in Tripoli airport battle as foreigners leave collapsing Libya
6. August 9, 2014: Rocket hits Kabul airport after Kerry departure
7. August 23, 2014: Libyan militants claim to have taken control of Tripoli’s main airport
8. November 11, 2014: Shiite rebels clash with security guards at Sanaa airport; 4 killed
9. December 21, 2014: 20 jihadists killed in failed east Syria airport attack
10. March 19, 2015: Clashes in southern Yemeni city force closure of airport
11. April 16, 2015: Al Qaeda captures major airport, seaport and oil terminal in southern Yemen
12. May 17, 2015: Suicide car bomb near Kabul airport kills at least 3
13. May 29, 2015: Islamic State affiliate in Libya takes civilian airport in Sirte
14. August 4, 2015: Yemen crisis: Houthi rebels ‘driven from key al-Anad airbase’
15. August 10, 2015: Suicide blast hits Kabul airport road amid surge in violence
16. September 18, 2015:
Taliban kill 29 in attack on Pakistan air force base’s mosque
17. September 30, 2015: NATO forces fight Taliban near besieged Kunduz airport
18. December 13, 2015: 70 Paris airport workers have security passes revoked over radical Muslim extremism

[Does not purport to be a complete list of Islamic airport attacks]

MSP-Terminal-50.jpg

Minneapolis-St.Paul International Airport
In what appears to be the latest U.S. airport slated for terror, it was reported on December 24, 2015, that  several hundred Black Lives Matter activists shut down Terminal 1 and Terminal 2 at the Minneapolis-St.Paul International Airport in Minnesota. Whether the timely shut down provided the necessary cover for the installation of weapons and/or explosives within the Minneapolis-St.Paul International Airport is not known, but it’s highly likely. Said weapons and/or explosives could be utilized at a later date in a coordinated state-sponsored airport-related terror attack. In order to sell the notion that terrorists have infiltrated the Minneapolis-St.Paul International Airport just prior to a state-sponsored terror attack, it was reported by the FBI two days prior on December 22, 2015, that an African Islamic terror suspect once worked at the airport. The timely propaganda report was evidently designed to sell the notion that alleged terrorist Abdirizak Warsame knows the inner workings of the airport, making the impending attack on the Minneapolis-St.Paul International Airport seem all the more plausible.

cyber hijack

Anonymous Airline Cyber-Hijack
The notion of airliner cyber-hijack was first raised by the Daily Mail back on March 16, 2014, when they published a report entitled “Is Missing Malaysian Jet the World’s First Cyber Hijack?”. The report cited an anti-terror expert who said that a plane’s altitude, speed and direction could be hacked by ‘codes’ and that planes could be landed using remote control. Roughly 8-months later on November 4, 2014, the software for a state-sponsored cyber-hijack of commercial airliners was evidently touted by Russia Today in a report entitled “Could Hackers Cyber-Hijack a Plane? UK Scientists Develop Tech to Fight Malware”. The software was likely built with a backdoor which specifically enables commercial airliners to be cyber-hijacked. In what appears to be pre-cyber-hijack attack propaganda, the Government Accountability Officer reported on April 14, 2015, that newer aircraft are vulnerable to hacking. A day later on April 15, 2015, Russia Today published a report entitled “Hijack Hack: Modern Planes Vulnerable to Remote Midair Takeover” which was designed to further sell the notion that airliners can now be hijacked by hackers. Roughly a week later on April 26, 2015, it was reported that an iPad glitch grounded two dozen American Airlines flights in America. The grounding was likely executed by the CIA in order to rig the planes with an electronic device and/or explosives which can be activated at a later date in order to bring the fleet of planes down simultaneously in the first-ever cyber-hijacking. Less than 2-weeks later on May 9, 2015, it was reported that an A400M Airbus cargo plane crashed near the Seville airport in Spain. According to follow-up report dated May 20, 2015, the Airbus A400M crash was linked to faulty software that had been installed. The Airbus A400M was evidently crashed by the CIA in order to set the precedent for a software-related airliner disaster. Post cyber-hijack attack, the May 2015 crash of the Airbus A400M will likely be touted as the first-ever cyber-hijack. Less than a week later on May 15, 2015, Wired magazine published a report entitled “Feds Say That Banned Researcher Commandeered a Plane”, further selling the notion that hackers could cyber-hijack commercial airliner just prior to it actually transpiring in reality. Three days later on May 18, 2015, Fox News published a report entitled “FBI Affidavit Claims Security Expert Admitted to Briefly Hacking Flight Controls”, confirming, albeit in a de facto manner, that the future cyber-hijack of commercial airliners will be executed by so-called “security experts” at the behest of the Swiss CIA. In order to associate Boeing (and thereby airplanes) with hackers just prior to an unprecedented cyber-attack on airliners, the Washington Post published a report on August 4, 2015, entitled “Hacked E-Mails: Boeing Wants its Drones to Hack Computers from the Sky”. A day later on August 5, 2015, Russia Today published a report entitled “‘Funtenna’ Uses Sound Waves, Radio to Hack Internet of Things”. Needless to say, airports and airliners are considered to be part of the so-called “Internet of Things”, a term used to describe real-world objects which are linked to the internet. The notion of a cyber-related attack on air travel was witnessed two days later on August 7, 2015, whenChinese hackers reportedly attacked the U.S. travel industry. The incident was likely staged or fabricated in order to sell the notion that China will target U.S. airliners in the future. Lastly, three days later on August 10, 2015, Yahoo News published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”, further associating aerial-related machines with hacking just prior to an unprecedented cyber-hijack attack on commercial airliners. Lastly, in what appears to be pre-airplane and/or airport cyber-hijack attack programing, it was reported on October 28, 2015, that therunaway military blimp landed in Pennsylvania. Needless to say, post cyber-attack on hundreds of airliners and/or airports, there will be scores of so-called runaway planes which subsequently are forced to crash-land around the world.

Airline “Glitches” Trending
Prior to a high-profile cyber-related terror attack on the airline industry, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, airline-related glitches and outages are now at an all-time high which suggests that a state-sponsored cyber-terror attack on the airline inducts

AIR TRAVEL GLITCH TIMELINE:

1. August 15, 2015: Computer outage at FAA center in D.C. delays flights in Northeast
2. August 15, 2015: Computer glitch grounds flights in New York, DC
3. September 17, 2015: American Airlines resolves issue that led to grounded flights at several hubs
4. October 12, 2015: Southwest says it has fixed glitch, expects flights to return to normal
5. October 15, 2015: Terror watch list program glitch blamed for flight delays at major airports
6. October 15, 2015: Customs computers crash at airports across US

[Does not purport to be a complete list of airline/airport-related glitches]

euroairport

Anonymous Airport Cyber-Attack
Based on breaking news and events, it appears that the CIA is plotting an airport-related cyber-attack that will bring the world busiest airports to a screeching halt, costing billions in damages. However, in the event that air traffic control loses contact with thousands of planes, chaos will ensue, possibly leading to numerous airplane-related crashes. In order to foreshadow the loss of human control over thousands of aircraft, the AP published a report back on September 14, 2015, entitled “Now Arriving: Airport Control Towers with No Humans Inside”. Roughly a month later on October 13, 2015, the AP published another report entitled “Union: Chronic Shortage of Air Traffic Controllers a Crisis”, foreshadowing that an air traffic control-related crisis is imminent. In what appears to be a beta-test for the impending air traffic control-related blackout via cyber-attack, Fox News published a report on October 15, 2015, entitled “Terror Watch List Program Glitch Blamed for Flight Delays at Major Airports”. The incident, which reportedly affected customs computers, was evidently staged in order to associate terrorism with airport computer malfunctions and flight delays just prior to a staged cyber-attack on airports across the world. Lastly, in what appears to be pre-airplane and/or airport cyber-hijack attack programing, it was reported on October 28, 2015, that a runaway U.S. military blimp landed in Pennsylvania. Needless to say, post cyber-attack, there will be scores of so-called runaway planes which subsequently are forced to crash-land around the world.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

china-nuke

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

TRUTHER.ORG TERROR ALERT TIMELINE: 

1. DEC 11, 2013: Comet ISON Declared Dead: Truther.org Alert: 1 Day Prior
2. JAN 13, 2014: Wesley Chapel Theater Shooting: Truther.org Alert: 38 Days Prior
3. MAY 23, 2014: Santa Barbara Massacre: Truther.org Alert: 26 Days Prior
4. OCT 28, 2014: 
Antares Rocket Launch Explosion: Truther.org Alert: 1 Day Prior
5. NOV 20, 2014:
Florida State University Shooting: Truther.org Alert: 2 Days Prior 
6. OCT 1, 2015: 
Umpqua Community College Shooting: Truther.org Alert: 7 Days Prior
7. NOV 27, 2015: Planned Parenthood Shooting:  Truther.org Alert: 1 Day Prior
8. NOV 13, 2015:
Paris Terror Attacks: Truther.org Alert: 4 Days Prior 
9. DEC 5, 2015:
London Undergroud Jihad Attack: Truther.org Alert: 9 Days Prior 
10. DEC 25, 2015:
The Philippines Terror Attack: Truther.org Alert: 1 Day Prior

[Does not purport to be complete list of timely Truther.org terror alerts]

SHOCK: 10 Reasons Why the Paris Terror Attacks Were Executed by the CIA

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
December 27, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese surprise attack and/or invasion of America, Japan and/or the Philippines while President Obama is on vacation in Hawaii until January 4, 2016. The Pearl Harbor-like redux attack will predictably lead to World War III.

The notion that war will find Obama while on vaction in Hawaii was foreshadowed in a Washington Post report from December 21, 2015, entitled “The War in Afghanistan Follows Obama to His Vacation in Hawaii“.  The report stated that Obama does not support “the idea of endless war”, something which would transpire in the aftermath of a Chinese attack.

In what appears to be pre-World War III programming, it was reported on December 21, 2015, that the Pentagon is now preparing for war with China. The timely propaganda report stated that the DOD is intent on triggering a military conflict with China over disputed islands in the South China Sea, likely at Clark Air Base in the Philippines where the U.S. has stationed numerous Boeing P-8A Poseidon advanced maritime surveillance aircraft.

The impending Chinese attack will likely involve one or more of the following: a) conventional nuclear attack; b) a TV-related cyber-hijack and subsequent nuclear attack; c) an EMP attack; and/or d) the full-scale Chinese invasion of Australia, Hawaii, Japan, the Philippines, Taiwan, and/or mainland U.S.

Consequently, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

That being said, the U.S. Navy began Annual Exercise 16 on November 16, 2015, a naval war game between Japan and the United States which featured the USS Ronald Reagan aircraft carrier. Consequently, a made-for-TV Chinese aerial attack on iconic aircraft carrier is expected.

Annual Exercise 16 was likely executed in order to provide a timely motive for an unprovoked attack by China on Japan which will likely result in the first ever Chinese beachhead and military base in Japan, a country which is currently home to numerous U.S. military bases.

In order to foreshadow the aformentioned attack on the USS Ronald Reagan aircraft carrier, the Washington Free Beacon published a report on December 15, 2015, entitled “Chinese Submarine Practiced Missile Attack on USS Reagan“. The incident  violated China’s 2014 commitment to the multinational Code for Unplanned Encounters at Sea, known as CUES, designed to reduce the risk of a shooting incident between naval vessels.

Four days later on December 19, 2015, USA Today published a report entitled “China Urges U.S. to Stop ‘Provocative Actions’ after B-52 Flights”, an action allegedly taken by the U.S. on December 10, 2015, which is designed to provide a timely motive for a revenge-like attack on America by China.

This notion was confimed the very same day on December 19, 2015, when the Examiner published a report entitled “China Blames U.S. for ‘Serious Military Provocation;’ Will Take Action“. Said action will likley be in the form of a suprise attack on Hawaii, Japan, the Philippines and/or mainland United States.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 20 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

China pearl harbor

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan
12. South China Sea (Disputed Islands)

South China Sea Attack
Based on breaking news and events, it appears that the CIA is plotting a Chinese attack on the U.S Navy which has ships trolling the disputed islands within the South China Sea. This latest Chinese attack narrative was first identified back on October 15, 2015, when the Guardian published a report entitled “Chinese Media: Military Must be Ready to Counter US in South China Sea”, foreshadowing that a confrontation may be imminent. Nine days later on October 24, 2015, Yahoo News published a report entitled “U.S. Patrols to Raise Stakes with Beijing in Disputed South China Sea”, further raising the specter of a naval confrontation with China. Three days later on October 27, 2015, Reuters published a report entitled “Angry China Shadows U.S. Warship Near Man-Made Islands”, foreshadowing a Chinese attack on the USS Lassen destroyer. Lastly, in what appear to be the final warning by China just prior to a surprise revenge-like attack, it was reported on October 27, 2015, that China has officially warned the United States after the USS Lassen passes near the disputed islands. Needless to say, these reports, taken collectively, suggest that a confrontation between the U.S. and China in the South China Sea is imminent.

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Anonymous

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
December 26, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is plotting an unprecedented wave of cyber and/or real-world terror attacks across the globe between December 26, 2015 and January 1, 2016.

The impending state-sponsored attacks will predictably be scapegoated onto the state-sponsored cyber-terror group known as of Anonymous whose has allegedly been responsible for a plethora of cyber-attacks over the last few weeks (see below).

Exactly what type of terror is planned between December 26, 2015 and January 1, 2016 is not known, but cyber-related attacks on airliners, airports, banks, nuclear reactors, oil and gas facilities, power facilities, social media platforms (e.g., Facebook, Twitter, etc.) and stock markets are likely forthcoming.

In order to set the precedent for a massive Anonymous cyber-related attack on America, it was reported on December 21, 2015, that Anonymous hacked 100 sites in Japan in online protest against wreckless whale slaughters.

In what appears to be pre-Anonymous attack on the NSA terror programming, it was reported a dday later on December 22, 2015, that members of Anonymous warned that “The NSA is coming to town” in its new Christmas video message.

The notion that Anonymous  is plotting a massive attack was confirmed on December 24, 2015, when it was reported that Anonymous has taken credit for a massive cyberattack on Turkey in which servers were bombarded for more than a week with some of the most intense cyberattacks in the country’s history.

Anoymous stated: “Dear government of Turkey, if you don’t stop supporting ISIS, we will continue attacking your Internet, your root DNS, your banks and take your government sites down…After the root DNS we will start to hit your airports, military assets and private state connections…We will destroy your critical banking infrastructure.” Consequently, an Anonymous attack on America’s airports, financial sector and military is now expected.

That same day, December 24, 2015, it was reported that Anonymous issued a chilling online recruitment video which encouraged people to join the hacktivist collective. The report was evidently designed to show that the group is expanding just prior to an unprecedented attack.

The notion of an Anonymous attack was also witnessed a day later on December 25, 2015, when it was reported that Anonymous hacked a Costa Rican website associated with Jurassic Park Island. <during the attack, Anonymous teamed up with Egyptian hackers associated with the Anonymous Rabaa Team. Consequently, post cyber-attack, Anonymous and anyone affiliated with the group will be linked with Islamic terrorists.

In order to sell the notion that Anonymous is capable of hacking even the most secure of government networks, it was reported back on October 19, 2015, that an Anonymous-related hacker was able to access the email of alleged CIA Director John Brennan.

Coincidentally, a day later on October 20, 2015, the Financial Times of London published a report entitled “Hacks Clear Path for US Cyber Bill”. Needless to say, in the aftermath of a world-changing cyber-related attack, draconian legislation in respect to internet censorship will be passed.

TOP CYBER-TERROR SCENARIOS (NOV 4-6, 2015):

1. Airplane Cyber-Attack/Hijack
2. Airport Cyber-Attack
3. Banking Cyber-Attack (e.g., Federal Reserve Bank)
4. NSA Cyber-Attack (e.g., Utah Data Center)
5. Nuclear Reactor Cyber Attack
6. Oil & Gas Cyber-Attack
7. Power Grid Attack
8. Stock-Market Cyber-Attack (e.g., New York Stock Exchange)
9. Social Media Cyber-Attack (e.g., Facebook, Instagram, Twitter, etc.)
10. Military Cyber-Attack

I. FINANCIAL ATTACK:

anonymous-image

1.1: Anonymous Attack on Stock Markets

In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely an alleged member of Anonymous.

1.2: Anonymous Cyber-Hijack of U.S. Economy
Although an unprecedented cyber-terror attack on the U.S. economy could be blamed on China, the Guardians of Peace, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack, funneling the stolen money into allegedly untraceable Bitcoin accounts. Coincidentally, on October 2, 2014, it was revealed that an FBI informant admittedly organized Anonymous attacks on government websites in 30 countries, further confirming that the group known as Anonymous is in fact state-sponsored. The timely report was designed to set the precedent for an Anonymous attack on government-related websites such as the FED, NYSE, SEC, etc. An Anonymous-based cyber-attack will enable the progenitors of terror (i.e., the CIA) to steal billions if not trillions of dollars from the U.S. economy without a trace. Should a sovereign country be deemed responsible for the heist, defrauded investors worldwide would collectively demand compensation from that particular country, something the CIA does not want to deal with. In what appears to be pre-Wall Street cyber-attack logistics, it was revealed back on July 8, 2014, that Wall Street has now hired a former NSA chief to help create a “cyber war council”. Translation: Wall Street and the NSA are teaming up together to execute a Wall Street cyber-hijack which will likely disappear trillions of dollars, bankrupting the U.S. economy. In the wake of the attack, the NSA chief will likely be scapegoated for the attack.

II. SOCIAL MEDIA ATTACK:

Anonymous Twitter

2.1: Twitter Cyber-Attack
Unable to execute a direct cyber-related attack on the New York Stock Exchange (NYSE), it now appears that the Obama administration (at the behest of the CIA in Switzerland) may resort to attacking Twitter instead, possibly with a fraudulent report that causes a massive stock market crash. This notion was foreshadowed back on July 14, 2015, when CNBC published a report entitled “Twitter Shares Jump on Fake Takeover Report”. The term “fake takeover” was evidently designed to foreshadow a real-life fake takeover, namely the terrorist hijacking of a major entity such as the New York Stock Exchange, White House or the U.S. Capitol Building. In the aftermath of this bogus report, investors would instantly lose all faith in America, dumping their collective stock and crashing the market. In order to foreshadow that Twitter will be used in an upcoming terror attack, Fox News published a report on July 24, 2015, entitled “Could Twitter Stop the Next Terror Attack?”. Properly translated, the headline should read “Twitter Will Start the Next Terror Attack”. This exact scenario was beta-tested back on April 23, 2015, when the Twitter account of the Associated Press (AP) allegedly suffered a cyber-attack. The state-sponsored hackers then tweeted: “Breaking: Two explosions in the White House and Obama is injured”. The fake tween caused a subsequent panic which ultimately resulted in a 3-minute plunge of the NYSE, wiping out a total of $136.5 billion of its value. Needless to say, a redux attack now appears to be in order, most likely by the state-sponsored hacking group known as Anonymous who is very active on Twitter.

Twitter NYSE

2.2: Flash Crash Cyber-Attack
It now appears that the CIA in Switzerland will attempt to execute an attack on the New York Stock Exchange (NYSE) another way—most likely via a false-flag power failure. This particular notion as foreshadowed on April 17, 2015, when Bloomberg screens went dark worldwide. Four days later on April 21, 2015, it was reported that a futures trader was charged for manipulating the stock market which contributed to the 2010 “Flash Crash”. Given the 5-year delay in the banker’s indictment, it can be deduced that the patsy was only charged in order to foreshadow the “Flash Crash” just prior to another one transpiring in reality, most likely post-power failure.

III. TRAVEL ATTACK:

cyber hijack

3.1: Anonymous Airline Cyber-Hijack
The notion of airliner cyber-hijack was first raised by the Daily Mail back on March 16, 2014, when they published a report entitled “Is Missing Malaysian Jet the World’s First Cyber Hijack?”. The report cited an anti-terror expert who said that a plane’s altitude, speed and direction could be hacked by ‘codes’ and that planes could be landed using remote control. Roughly 8-months later on November 4, 2014, the software for a state-sponsored cyber-hijack of commercial airliners was evidently touted by Russia Today in a report entitled “Could Hackers Cyber-Hijack a Plane? UK Scientists Develop Tech to Fight Malware”. The software was likely built with a backdoor which specifically enables commercial airliners to be cyber-hijacked. In what appears to be pre-cyber-hijack attack propaganda, the Government Accountability Officer reported on April 14, 2015, that newer aircraft are vulnerable to hacking. A day later on April 15, 2015, Russia Today published a report entitled “Hijack Hack: Modern Planes Vulnerable to Remote Midair Takeover” which was designed to further sell the notion that airliners can now be hijacked by hackers. Roughly a week later on April 26, 2015, it was reported that an iPad glitch grounded two dozen American Airlines flights in America. The grounding was likely executed by the CIA in order to rig the planes with an electronic device and/or explosives which can be activated at a later date in order to bring the fleet of planes down simultaneously in the first-ever cyber-hijacking. Less than 2-weeks later on May 9, 2015, it was reported that an A400M Airbus cargo plane crashed near the Seville airport in Spain. According to follow-up report dated May 20, 2015, the Airbus A400M crash was linked to faulty software that had been installed. The Airbus A400M was evidently crashed by the CIA in order to set the precedent for a software-related airliner disaster. Post cyber-hijack attack, the May 2015 crash of the Airbus A400M will likely be touted as the first-ever cyber-hijack. Less than a week later on May 15, 2015, Wired magazine published a report entitled “Feds Say That Banned Researcher Commandeered a Plane”, further selling the notion that hackers could cyber-hijack commercial airliner just prior to it actually transpiring in reality. Three days later on May 18, 2015, Fox News published a report entitled “FBI Affidavit Claims Security Expert Admitted to Briefly Hacking Flight Controls”, confirming, albeit in a de facto manner, that the future cyber-hijack of commercial airliners will be executed by so-called “security experts” at the behest of the Swiss CIA. In order to associate Boeing (and thereby airplanes) with hackers just prior to an unprecedented cyber-attack on airliners, the Washington Post published a report on August 4, 2015, entitled “Hacked E-Mails: Boeing Wants its Drones to Hack Computers from the Sky”. A day later on August 5, 2015, Russia Today published a report entitled “‘Funtenna’ Uses Sound Waves, Radio to Hack Internet of Things”. Needless to say, airports and airliners are considered to be part of the so-called “Internet of Things”, a term used to describe real-world objects which are linked to the internet. The notion of a cyber-related attack on air travel was witnessed two days later on August 7, 2015, when Chinese hackers reportedly attacked the U.S. travel industry. The incident was likely staged or fabricated in order to sell the notion that China will target U.S. airliners in the future. Lastly, three days later on August 10, 2015, Yahoo News published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”, further associating aerial-related machines with hacking just prior to an unprecedented cyber-hijack attack on commercial airliners. Lastly, in what appears to be pre-airplane and/or airport cyber-hijack attack programing, it was reported on October 28, 2015, that the runaway military blimp landed in Pennsylvania. Needless to say, post cyber-attack on hundreds of airliners and/or airports, there will be scores of so-called runaway planes which subsequently are forced to crash-land around the world.

3.2: Airline “Glitches” Trending
Prior to a high-profile cyber-related terror attack on the airline industry, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, airline-related glitches and outages are now at an all-time high which suggests that a state-sponsored cyber-terror attack on the airline inducts

AIR TRAVEL GLITCH TIMELINE:

1. August 15, 2015: Computer outage at FAA center in D.C. delays flights in Northeast
2. August 15, 2015: Computer glitch grounds flights in New York, DC
3. September 17, 2015: American Airlines resolves issue that led to grounded flights at several hubs
4. October 12, 2015: Southwest says it has fixed glitch, expects flights to return to normal
5. October 15, 2015: Terror watch list program glitch blamed for flight delays at major airports
6. October 15, 2015: Customs computers crash at airports across US

[Does not purport to be a complete list of airline/airport-related glitches]

euroairport

3.3: Anonymous Airport Cyber-Attack
Based on breaking news and events, it appears that the CIA is plotting an airport-related cyber-attack that will bring the world busiest airports to a screeching halt, costing billions in damages. However, in the event that air traffic control loses contact with thousands of planes, chaos will ensue, possibly leading to numerous airplane-related crashes. In order to foreshadow the loss of human control over thousands of aircraft, the AP published a report back on September 14, 2015, entitled “Now Arriving: Airport Control Towers with No Humans Inside”. Roughly a month later on October 13, 2015, the AP published another report entitled “Union: Chronic Shortage of Air Traffic Controllers a Crisis”, foreshadowing that an air traffic control-related crisis is imminent. In what appears to be a beta-test for the impending air traffic control-related blackout via cyber-attack, Fox News published a report on October 15, 2015, entitled “Terror Watch List Program Glitch Blamed for Flight Delays at Major Airports”. The incident, which reportedly affected customs computers, was evidently staged in order to associate terrorism with airport computer malfunctions and flight delays just prior to a staged cyber-attack on airports across the world. Lastly, in what appears to be pre-airplane and/or airport cyber-hijack attack programing, it was reported on October 28, 2015, that a runaway U.S. military blimp landed in Pennsylvania. Needless to say, post cyber-attack, there will be scores of so-called runaway planes which subsequently are forced to crash-land around the world.

IV. INFRASTRUCTURE ATTACK:



4.1: Nuclear Reactor Attack
The notion that terrorists want to attack nuclear reactors was recently witnessed back on July 9, 2014, when Hamas attempted to attack the Israeli nuclear reactor in Dimona. Two days later on July 11, 2014, a report entitled “Response to ‘Attack’ on Nuclear Reactor Is Praised” was published in response to U.S. government terror drills on nuclear reactors. According to the timely report, “Other mock attacks have been conducted at a handful of the nation’s 62 nuclear power plants”. Evidently, the U.S. federal government is perfecting their respective nuclear terror attack scenarios. Exactly when and where the attacks will take place is not known, but practice makes perfect. Back on August 20, 2014, it was revealed that hackers attacked Nuclear Regulatory Commission 3 times in 3 years, a report designed to show that cyber-terrorists are actively targeting American nuclear reactors. Four days later on August 24, 2014, an Israeli spy drone was shot downed near Iran’s Natanz nuclear plant, foreshadowing the notion of aerial attack on nuclear reactors. Roughly 7-months later on March 17, 2015, it was reported that South Korea is blaming North Korea for a nuclear reactor cyberattack, ultimately setting the precedent for a North Korean cyber-attack on nuclear reactors within the United States. That same day, March 17, 2015, it was also reported that a South African who previously attacked a nuclear power plant is now a hero to his government and fellow citizens. The timely report was evidently published in order to highlight nuclear reactor terror attacks just prior to another transpiring in reality. Lastly, a day later on March 18, 2015, the BBC published a report entitled “Chernobyl: Containing the World’s Worst Nuclear Accident”. The timely propaganda report was evidently published in order to acclimate the public for another nuclear reactor-related “accident”, possibly the worst in history. Lastly, in order to associate hackers with nuclear terrorism just prior to an unprecedented cyber-attack on nuclear reactors, the Express published a report back on October 25, 2015, entitled “Cyber Hackers are Greater Threat to UK Security than Nuclear Weapons”. Needless to say, these reports, taken collective, suggest that a state-sponsored cyber-attack on nuclear reactors is imminent.

NSAutah

4.2: Anonymous NSA Attack
An Anonymous cyber-attack, should it happen, will most likely target the NSA’s new Utah Data Center which will likely result in the collapse, malfunction and/or explosion of U.S.-related infrastructure on the west coast of America (e.g., the electoral grid, dams, oil, gas, nuclear, water and sewer facilities). Known as the “Utah Data Center“, the NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, was completed in September of 2013. The $1.5B data center is located at Camp Williams, Utah, just 25 miles (40 km) south of Salt Lake City.

Oil Gas Hack Cyber

4.3: Oil & Gas Cyber-Attack
As originally depicted in the August 16, 2015, Truther.org report entitled “Obama Plotting Environmental Disasters & Global Oil Crisis via Hacks on US Gas Stations, Oil Refineries & Oil Rigs”, it appears that the Obama administration (at the behest of the CIA in Switzerland) is preparing to execute a wave of cyber-related terror attacks on U.S. oil/gas-related facilities, namely their Automated Tank Gauges (see below). Needless to say, a hack on hundreds of U.S. oil/gas-related facilities would cause an environmental disaster as well as a global oil-crisis that would likely lead to war in the Middle East. In the aftermath of said attacks, the state-sponsored terror group ISIS or rouge states like Iran, Saudi Arabia or Syria would likely be blamed. The notion of a gas-related hack was witnessed back on May 11, 2011, when hackers tapped a California gas pump, making off with off with 528 gallons. Roughly 15 months later in 2012, the Saudi Aramco Hack (see below) was executed, crippling over 30,000 oil/gas-related workstations. Although a redux of the aforementioned oil/gas-related hacks is indeed possible, it’s far more likely that the CIA has more nefarious intentions. Although only conjecture, it’s highly likely that the CIA will execute cyber-related attacks on U.S. oil/gas-related entities such as gas stations, oil refineries and oil rigs. In the aftermath of said oil/gas-related cyber-attacks, hardware and software present at said entities will likely malfunction, causing oil and gas-related explosions and/or spills that could result in potentially hundreds of environmental disasters across America. In order to psychologically prepare the masses for a wave of oil/gas-related cyber-attacks that spawn an international oil crisis and subsequent wars in the Middle East, it was reported on January 23, 2015, that thousands of U.S. gas stations are vulnerable to cyberattacks. Roughly 6-months later on August 5, 2015, CNN published a report entitled “The Inside Story of The Biggest Hack in History”, rehashing the aforementioned Saudi Aramco Hack that crippled over 30,000 oil/gas-related stations just prior to a redux attack transpiring in reality. That same day, August 5, 2015, the EPA purposely caused the 2015 Gold King Mine Waste Water Spill near Silverton, Colorado. According to reports, a total of 3,000,000 U.S. gallons (11 ML) of polluted mine waste water including cadmium, lead, and arsenic were released. The spill was admittedly executed by EPA personal (at the behest of the CIA in Switzerland) in order to psychologically prepare Americans for massive oil/gas-related spills in the aftermath of a state-sponsored cyber-related attack on U.S. oil/gas-related facilities. Two days later on August 7, 2015, it was reported that hackers are now attacking U.S. gas stations. Needless to say, the propaganda report was spawned by the CIA in order to further sell the notion that America’s oil/gas-related infrastructure is now being targeted. This very notion was confirmed less than a week later on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. The headline confirms, albeit in a de facto manner, that an oil crisis will follow the impending wave of state-sponsored cyber-attacks. In what appears to be an ominous sign that oil/gas-related terror is imminent, it was reported on August 14, 2015, that a series of explosions rocked a Texas oil field chemical supplier. In the event of an attack, Galveston Bay, Texas (Port of Houston , Port of Texas City & Port of Galveston) will likely be destroyed. Lastly, in order to provide a timely motive for Islamic/Middle Eastern cyber-related terror attacks on America’s oil/gas-related infrastructure, MarketWatch published a report on August 15, 2015, entitled “Why Gas Prices are Rising as Oil Falls to 6-year Lows”. Needless to say, post oil/gas-related cyber-attacks, oil prices will skyrocket.

Oil Gas Terror

4.4: Cyber-Attack on Automated Tank Gauges (ATGs)
Back on January 22, 2015, a report entitled “The Internet of Gas Station Tank Gauges”, was published, foreshadowing exactly what the CIA has planned in respect to an oil/gas.-related cyber-terror attack. Needless to say, it’s not pretty. The report states that “Automated Tank Gauges (ATGs) are used to monitor fuel tank inventory levels, track deliveries, raise alarms that indicate problems with the tank or gauge (such as a fuel spill), and to perform leak tests in accordance with environmental regulatory compliance”. Because ATGs are used by nearly every fueling station in the U.S. and tens of thousands of systems internationally, a hack on them could theoretically cripple the oil and gas industry. In all likelihood, ATGs were likely put in place specifically so that a cyber-related attack could commence at a future date. The report goes on to state that “Approximately 5,800 ATGs were found to be exposed to the internet without a password. Over 5,300 of these ATGs are located in the United States, which works out to about 3 percent of the approximately 150,000 fueling stations in the country. An attacker with access to the serial port interface of an ATG may be able to shut down the station by spoofing the reported fuel level, generating false alarms, and locking the monitoring service out of the system. Tank gauge malfunctions are considered a serious issue due to the regulatory and safety issues that may apply”. In other words, a state-sponsored hacker could single-handedly decimate the oil industry which is evidently why the ATGs were installed in the first place.

hackers-cyber-crime-anonymousv1

4.5: Anonymous Gas Station Hack
In order to sell the notion that gas pumps and gas stations are vulnerable to cyber-terror attacks just prior to their fruition in reality, a rash of reports were published back in February of 2012 which were designed to sell the notion that the state-sponsored hacking group known as Anonymous is targeting America’s oil/-related infrastructure. This narrative was first identified on February 10, 2015, when a report entitled “Is Anonymous Attacking Internet Exposed Gas Pump Monitoring Systems in the US?”, was published. Although Anonymous could be scapegoated, a Middle Eastern country is far more likely. A day later on February 11, 2015, it was reported that a U.S. gas station pump was hacked with an ‘Anonymous’ tagline. The incident was likely executed at the behest of the CIA in order to set the precedent for a future gas station-related cyber-attack. That same day, February 11, 2015, the Register published a report entitled “Anonymous Hacked Gas Station – Could Cause Fuel Shortages”, further confirming the notion that the CIA is plotting an oil/gas-related cyber-attack in order to cause an oil crisis in America.

FLASHBACK: Saudi Aramco Oil Hack
The notion that the CIA is plotting an oil/gas-related cyber-terror attack was witnessed back on August 15, 2012, during the Saudi Aramco Hack when the state-sponsored hacking group entitled “Cutting Sword of Justice” allegedly attacked 30,000 Saudi Aramco workstations, virtually crippling the company. According to reports, the Saudi state-owned oil company’s computers, unleashed a computer virus that “erased data on three-quarters of Aramco’s corporate PCs (documents, spreadsheets, e-mails, files), replacing all of it with an image of a burning American flag”. Predictably, U.S. intelligence officials stated that the hackers were from Iran, although they offered no specific evidence to support the claim.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China pearl harbor

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
November 15, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese attack and/or invasion, most likely targeting the United States or her military, most likely in San Diego, Hawaii and/or the South China Sea.

The impending Chinese attack will likely involve one or more of the following: a) a cyber-related attack on the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Australia Hawaii, Japan, Taiwan, the Philippines and/or mainland United States.

Consequently, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 17 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan
12. South China Sea (Disputed Islands)

South China Sea Attack
Based on breaking news and events, it appears that the CIA is plotting a Chinese attack on the U.S Navy which has ships trolling the disputed islands within the South China Sea. This latest Chinese attack narrative was first identified back on October 15, 2015, when the Guardian published a report entitled “Chinese Media: Military Must be Ready to Counter US in South China Sea”, foreshadowing that a confrontation may be imminent. Nine days later on October 24, 2015, Yahoo News published a report entitled “U.S. Patrols to Raise Stakes with Beijing in Disputed South China Sea”, further raising the specter of a naval confrontation with China. Three days later on October 27, 2015, Reuters published a report entitled “Angry China Shadows U.S. Warship Near Man-Made Islands”, foreshadowing a Chinese attack on the USS Lassen destroyer. Lastly, in what appear to be the final warning by China just prior to a surprise revenge-like attack, it was reported on October 27, 2015, that China has officially warned the United States after the USS Lassen passes near the disputed islands. Needless to say, these reports, taken collectively, suggest that a confrontation between the U.S. and China in the South China Sea is imminent.

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China pearl harbor

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
November 8, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese attack and/or invasion, most likely targeting the United States or her military, most likely in San Diego, Hawaii and/or the South China Sea.

The impending Chinese attack will likely involve one or more of the following: a) a cyber-related attack on the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Australia Hawaii, Japan, Taiwan, the Philippines and/or mainland United States.

Consequently, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 17 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan
12. South China Sea (Disputed Islands)

South China Sea Attack
Based on breaking news and events, it appears that the CIA is plotting a Chinese attack on the U.S Navy which has ships trolling the disputed islands within the South China Sea. This latest Chinese attack narrative was first identified back on October 15, 2015, when the Guardian published a report entitled “Chinese Media: Military Must be Ready to Counter US in South China Sea”, foreshadowing that a confrontation may be imminent. Nine days later on October 24, 2015, Yahoo News published a report entitled “U.S. Patrols to Raise Stakes with Beijing in Disputed South China Sea”, further raising the specter of a naval confrontation with China. Three days later on October 27, 2015, Reuters published a report entitled “Angry China Shadows U.S. Warship Near Man-Made Islands”, foreshadowing a Chinese attack on the USS Lassen destroyer. Lastly, in what appear to be the final warning by China just prior to a surprise revenge-like attack, it was reported on October 27, 2015, that China has officially warned the United States after the USS Lassen passes near the disputed islands. Needless to say, these reports, taken collectively, suggest that a confrontation between the U.S. and China in the South China Sea is imminent.

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Anonymous

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
November 4, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is plotting an unprecedented wave of cyber and/or real-world terror attacks across the globe on November 4 through November 6, 2015.

The impending state-sponsored attacks will predictably be scapegoated onto the state-sponsored cyber-terror group known as of Anonymous whose unofficial holiday is November 5. That being said, revenge-like attacks by the state-sponsored KKK whom Anonymous is now targeting may also be forthcoming.

Exactly what type of terror is planned surrounding November 5, 2015, is not known, but cyber-related attacks on airliners, airports, banks, nuclear reactors, oil and gas facilities, power facilities, social media platforms (e.g., Facebook, Twitter, etc.), stock markets and the new Star Wars movie may be forthcoming.

Considering that “Remember, Remember, the Fifth of November” is the undeclared motto of the state-sponsored terror group Anonymous, their minions will be out in force before, during and after November 5, 2015, providing the perfect scapegoat for earth-changing cyber-attacks.

November 5 commemorates Guy Fawkes’ failed 1605 Gunpowder Plot to blow up the Houses of Parliament in London, England. The foiled terror attack which was recently made popular by the “V for Vendetta” (2005) propaganda film (see trailer).

In short, the movie “V for Vendetta” glorified the notion of domestic terrorism while it paved the way for the emergence of the state-sponsored terror group known as Anonymous. Consequently, the Anonymous mask, which has since become synonymous with rebellion in pop culture, will shortly be affiliated with terror.

According to Anonymous, protests will be held in 664 cities across the world, including the city of London which appears to be one of the slated targets. Protests will also be held at state capitols and city halls as well, providing a plethora of potential targets and patsies to choose from.

While a wave of state-sponsored terror is no doubt planned for November 5, 2015, it’s highly likely that attacks are also planned for November 4 and November 6, respectively. In all likelihood, the CIA will try and circumvent Truther.org terror alerts once again, hence this early report.

Although Anonymous-related cyber-attacks and violence are expected on November 5, 2015, it was reported that Anonymous will start a barrage against the KKK on November 4, 2015, with a tweetstorm using the hashtags #OpKKK, #HoodsOff, #KKKarma. Consequently, KKK revenge attacks may be forthcoming.

In order to sell the notion that Anonymous is capable of hacking even the most secure of government networks, it was reported back on October 19, 2015, that an Anonymous-related hacker was able to access the email of alleged CIA Director John Brennan.

Coincidentally, a day later on October 20, 2015, the Financial Times of London published a report entitled “Hacks Clear Path for US Cyber Bill”. Needless to say, in the aftermath of a world-changing cyber-related attack, draconian legislation in respect to internet censorship will be passed.

In what appears to be a CIA-spawned publicity stunt designed to raise the profile of Anonymous just prior to a wave of state-sponsored cyber-attacks, it was reported on October 29, 2015, that Anonymous intends to unveil names of up to 1,000 Ku Klux Klan members. Consequently, revenge-like attacks by the KKK may be forthcoming.

In what appears to be an ominous sign of Anonymous-spawned terror to come, it was reported that Anonymous is plotting a so-called “bonfire night” during the Million Mask March on November 5, 2015. Translation: Anonymous is planning to burn a number of cities to the ground.

In what appears to be a CIA-spawned publicity stunt designed to foreshadow a bank-related cyber-attack just prior to its fruition in reality, 2 protesters rappelled down from the balcony at the Colts-Panthers game at Bank of America Stadium in Charlotte, North Carolina on November 2, 2015.

The CIA protesters unveiled a black banner which read “BoA (Bank of America) … DUMP … Dominion …WeAreCovePoint.org”. Aside from foreshadowing the dump of the U.S. dollar post banking cyber-attack, the banner foreshadowed an Anonymous attack as their slogan is “We are Anonymous. Expect Us”.

There is also a chance that Anonymous will allegedly hack Lucasfilm and/or Walt Disney Studios
Motion Pictures
and release the “Star Wars: The Force Awakens” film for free online prior to its scheduled release on December 18, 2015. Consequently, the attack will forever be known as the “Star Wars Hack”.

The notion that the film “Star Wars: The Force Awakens” will be seen prior to its scheduled release date was foreshadowed on November 3, 2015, when Entertainment Weekly published a report entitled “Terminally Ill Star Wars Fan Asks to See The Force Awakens Early”.

Lastly, back on October 12, 2015, it was reported that Southwest Airlines suffered a so-called glitch, causing the discount airline to ground its entire fleet. Said grounding may have provided the necessary cover the alteration of the fleets electronics so that they are able to suffer a cyber-related hijack at a later date.

TOP CYBER-TERROR SCENARIOS (NOV 4-6, 2015):

1. Airplane Cyber-Attack/Hijack
2. Airport Cyber-Attack
3. Banking Cyber-Attack (e.g., Federal Reserve Bank)
4. NSA Cyber-Attack (e.g., Utah Data Center)
5. Nuclear Reactor Cyber Attack
6. Oil & Gas Cyber-Attack
7. Power Grid Attack
8. Stock-Market Cyber-Attack (e.g., New York Stock Exchange)
9. Twitter Cyber-Attack
10. Star Wars Cyber-Attack

I. REAL-WORLD ATTACK:

gaelx_-_anonymous

1.1: Anonymous Attack on London
Come November 5, 2015, Anonymous-related protests are scheduled to take place in Trafalgar Square and Parliament Square in London. However, it’s highly likely that the Anonymous protests will start in London a day early on November 4, 2015. The notion that violence is planned for London was confirmed back on November 1, 2015, when it was reported that clashes erupted overnight in London as police cracked down on partygoers. The so-called crackdown was evidently staged in order to foreshadow police vs. protester violence in London just prior to its fruition in reality. According to a November 4, 2015, report from the International Business Times entitled “Million Mask March London: Thousand-Strong Anonymous Protest has Police Prepare for Violence”, an ominous sign of Anonymous-related violence to come. According to reports, London Police are warning of the potential threat of violence and disorder in London during the annual Million Mask March. There are reportedly concerns that peaceful protest is the “last thing on the minds” of many of those planning to attend. The march has reportedly become synonymous with “anti-social behavior, criminal damage… and attacks on police officers” over the years. Chief Superintendent Pippa Mills, from the Metropolitan Police Service stated that “Last year hundreds of people on their way home from work, or out enjoying an evening in the Capital, were surrounded by people causing them huge concern. Buses were physically rocked, people jumped on car bonnets, as well as serious disorder in central London and damage to a number of buildings”.

1.2: Anonymous Attack on Capitals & City Halls
November 5th commemorates Guy Fawkes’ failed 1605 Gunpowder Plot to blow up the Houses of Parliament in London, England. The foiled terror attack was made popular by the “V for Vendetta” (2005) film (see trailer) which glorified the notion of vigilante terrorism, ultimately paving the way for the emergence of the state-sponsored terror group known as Anonymous who adopted the films credo and symbology. Consequently, a redux attack on the U.S. Capitol Building in Washington, D.C., and/or the Palace of Westminster (UK Parliament) in London may be in order. Coincidentally, Anonymous will be holding protests at state capitols and city halls across the world so real-world attacks at one or more of these locations is highly likely.

II. FINANCIAL ATTACK:

anonymous-image

2.1: Anonymous Attack on Stock Markets

In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely an alleged member of Anonymous.

2.2: Anonymous Cyber-Hijack of U.S. Economy
Although an unprecedented cyber-terror attack on the U.S. economy could be blamed on China, the Guardians of Peace, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack, funneling the stolen money into allegedly untraceable Bitcoin accounts. Coincidentally, on October 2, 2014, it was revealed that an FBI informant admittedly organized Anonymous attacks on government websites in 30 countries, further confirming that the group known as Anonymous is in fact state-sponsored. The timely report was designed to set the precedent for an Anonymous attack on government-related websites such as the FED, NYSE, SEC, etc. An Anonymous-based cyber-attack will enable the progenitors of terror (i.e., the CIA) to steal billions if not trillions of dollars from the U.S. economy without a trace. Should a sovereign country be deemed responsible for the heist, defrauded investors worldwide would collectively demand compensation from that particular country, something the CIA does not want to deal with. In what appears to be pre-Wall Street cyber-attack logistics, it was revealed back on July 8, 2014, that Wall Street has now hired a former NSA chief to help create a “cyber war council”. Translation: Wall Street and the NSA are teaming up together to execute a Wall Street cyber-hijack which will likely disappear trillions of dollars, bankrupting the U.S. economy. In the wake of the attack, the NSA chief will likely be scapegoated for the attack.

III. SOCIAL MEDIA ATTACK:

Anonymous Twitter

3.1: Twitter Cyber-Attack
Unable to execute a direct cyber-related attack on the New York Stock Exchange (NYSE), it now appears that the Obama administration (at the behest of the CIA in Switzerland) may resort to attacking Twitter instead, possibly with a fraudulent report that causes a massive stock market crash. This notion was foreshadowed back on July 14, 2015, when CNBC published a report entitled “Twitter Shares Jump on Fake Takeover Report”. The term “fake takeover” was evidently designed to foreshadow a real-life fake takeover, namely the terrorist hijacking of a major entity such as the New York Stock Exchange, White House or the U.S. Capitol Building. In the aftermath of this bogus report, investors would instantly lose all faith in America, dumping their collective stock and crashing the market. In order to foreshadow that Twitter will be used in an upcoming terror attack, Fox News published a report on July 24, 2015, entitled “Could Twitter Stop the Next Terror Attack?”. Properly translated, the headline should read “Twitter Will Start the Next Terror Attack”. This exact scenario was beta-tested back on April 23, 2015, when the Twitter account of the Associated Press (AP) allegedly suffered a cyber-attack. The state-sponsored hackers then tweeted: “Breaking: Two explosions in the White House and Obama is injured”. The fake tween caused a subsequent panic which ultimately resulted in a 3-minute plunge of the NYSE, wiping out a total of $136.5 billion of its value. Needless to say, a redux attack now appears to be in order, most likely by the state-sponsored hacking group known as Anonymous who is very active on Twitter.

Twitter NYSE

3.2: Flash Crash Cyber-Attack
It now appears that the CIA in Switzerland will attempt to execute an attack on the New York Stock Exchange (NYSE) another way—most likely via a false-flag power failure. This particular notion as foreshadowed on April 17, 2015, when Bloomberg screens went dark worldwide. Four days later on April 21, 2015, it was reported that a futures trader was charged for manipulating the stock market which contributed to the 2010 “Flash Crash”. Given the 5-year delay in the banker’s indictment, it can be deduced that the patsy was only charged in order to foreshadow the “Flash Crash” just prior to another one transpiring in reality, most likely post-power failure.

IV. TRAVEL ATTACK:

cyber hijack

4.1: Anonymous Airline Cyber-Hijack
The notion of airliner cyber-hijack was first raised by the Daily Mail back on March 16, 2014, when they published a report entitled “Is Missing Malaysian Jet the World’s First Cyber Hijack?”. The report cited an anti-terror expert who said that a plane’s altitude, speed and direction could be hacked by ‘codes’ and that planes could be landed using remote control. Roughly 8-months later on November 4, 2014, the software for a state-sponsored cyber-hijack of commercial airliners was evidently touted by Russia Today in a report entitled “Could Hackers Cyber-Hijack a Plane? UK Scientists Develop Tech to Fight Malware”. The software was likely built with a backdoor which specifically enables commercial airliners to be cyber-hijacked. In what appears to be pre-cyber-hijack attack propaganda, the Government Accountability Officer reported on April 14, 2015, that newer aircraft are vulnerable to hacking. A day later on April 15, 2015, Russia Today published a report entitled “Hijack Hack: Modern Planes Vulnerable to Remote Midair Takeover” which was designed to further sell the notion that airliners can now be hijacked by hackers. Roughly a week later on April 26, 2015, it was reported that an iPad glitch grounded two dozen American Airlines flights in America. The grounding was likely executed by the CIA in order to rig the planes with an electronic device and/or explosives which can be activated at a later date in order to bring the fleet of planes down simultaneously in the first-ever cyber-hijacking. Less than 2-weeks later on May 9, 2015, it was reported that an A400M Airbus cargo plane crashed near the Seville airport in Spain. According to follow-up report dated May 20, 2015, the Airbus A400M crash was linked to faulty software that had been installed. The Airbus A400M was evidently crashed by the CIA in order to set the precedent for a software-related airliner disaster. Post cyber-hijack attack, the May 2015 crash of the Airbus A400M will likely be touted as the first-ever cyber-hijack. Less than a week later on May 15, 2015, Wired magazine published a report entitled “Feds Say That Banned Researcher Commandeered a Plane”, further selling the notion that hackers could cyber-hijack commercial airliner just prior to it actually transpiring in reality. Three days later on May 18, 2015, Fox News published a report entitled “FBI Affidavit Claims Security Expert Admitted to Briefly Hacking Flight Controls”, confirming, albeit in a de facto manner, that the future cyber-hijack of commercial airliners will be executed by so-called “security experts” at the behest of the Swiss CIA. In order to associate Boeing (and thereby airplanes) with hackers just prior to an unprecedented cyber-attack on airliners, the Washington Post published a report on August 4, 2015, entitled “Hacked E-Mails: Boeing Wants its Drones to Hack Computers from the Sky”. A day later on August 5, 2015, Russia Today published a report entitled “‘Funtenna’ Uses Sound Waves, Radio to Hack Internet of Things”. Needless to say, airports and airliners are considered to be part of the so-called “Internet of Things”, a term used to describe real-world objects which are linked to the internet. The notion of a cyber-related attack on air travel was witnessed two days later on August 7, 2015, when Chinese hackers reportedly attacked the U.S. travel industry. The incident was likely staged or fabricated in order to sell the notion that China will target U.S. airliners in the future. Lastly, three days later on August 10, 2015, Yahoo News published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”, further associating aerial-related machines with hacking just prior to an unprecedented cyber-hijack attack on commercial airliners. Lastly, in what appears to be pre-airplane and/or airport cyber-hijack attack programing, it was reported on October 28, 2015, that the runaway military blimp landed in Pennsylvania. Needless to say, post cyber-attack on hundreds of airliners and/or airports, there will be scores of so-called runaway planes which subsequently are forced to crash-land around the world.

4.2: Airline “Glitches” Trending
Prior to a high-profile cyber-related terror attack on the airline industry, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, airline-related glitches and outages are now at an all-time high which suggests that a state-sponsored cyber-terror attack on the airline inducts

AIR TRAVEL GLITCH TIMELINE:

1. August 15, 2015: Computer outage at FAA center in D.C. delays flights in Northeast
2. August 15, 2015: Computer glitch grounds flights in New York, DC
3. September 17, 2015: American Airlines resolves issue that led to grounded flights at several hubs
4. October 12, 2015: Southwest says it has fixed glitch, expects flights to return to normal
5. October 15, 2015: Terror watch list program glitch blamed for flight delays at major airports
6. October 15, 2015: Customs computers crash at airports across US

[Does not purport to be a complete list of airline/airport-related glitches]

euroairport

4.3: Anonymous Airport Cyber-Attack
Based on breaking news and events, it appears that the CIA is plotting an airport-related cyber-attack that will bring the world busiest airports to a screeching halt, costing billions in damages. However, in the event that air traffic control loses contact with thousands of planes, chaos will ensue, possibly leading to numerous airplane-related crashes. In order to foreshadow the loss of human control over thousands of aircraft, the AP published a report back on September 14, 2015, entitled “Now Arriving: Airport Control Towers with No Humans Inside”. Roughly a month later on October 13, 2015, the AP published another report entitled “Union: Chronic Shortage of Air Traffic Controllers a Crisis”, foreshadowing that an air traffic control-related crisis is imminent. In what appears to be a beta-test for the impending air traffic control-related blackout via cyber-attack, Fox News published a report on October 15, 2015, entitled “Terror Watch List Program Glitch Blamed for Flight Delays at Major Airports”. The incident, which reportedly affected customs computers, was evidently staged in order to associate terrorism with airport computer malfunctions and flight delays just prior to a staged cyber-attack on airports across the world. Lastly, in what appears to be pre-airplane and/or airport cyber-hijack attack programing, it was reported on October 28, 2015, that a runaway U.S. military blimp landed in Pennsylvania. Needless to say, post cyber-attack, there will be scores of so-called runaway planes which subsequently are forced to crash-land around the world.

V. INFRASTRUCTURE ATTACK:



5.1: Nuclear Reactor Attack
The notion that terrorists want to attack nuclear reactors was recently witnessed back on July 9, 2014, when Hamas attempted to attack the Israeli nuclear reactor in Dimona. Two days later on July 11, 2014, a report entitled “Response to ‘Attack’ on Nuclear Reactor Is Praised” was published in response to U.S. government terror drills on nuclear reactors. According to the timely report, “Other mock attacks have been conducted at a handful of the nation’s 62 nuclear power plants”. Evidently, the U.S. federal government is perfecting their respective nuclear terror attack scenarios. Exactly when and where the attacks will take place is not known, but practice makes perfect. Back on August 20, 2014, it was revealed that hackers attacked Nuclear Regulatory Commission 3 times in 3 years, a report designed to show that cyber-terrorists are actively targeting American nuclear reactors. Four days later on August 24, 2014, an Israeli spy drone was shot downed near Iran’s Natanz nuclear plant, foreshadowing the notion of aerial attack on nuclear reactors. Roughly 7-months later on March 17, 2015, it was reported that South Korea is blaming North Korea for a nuclear reactor cyberattack, ultimately setting the precedent for a North Korean cyber-attack on nuclear reactors within the United States. That same day, March 17, 2015, it was also reported that a South African who previously attacked a nuclear power plant is now a hero to his government and fellow citizens. The timely report was evidently published in order to highlight nuclear reactor terror attacks just prior to another transpiring in reality. Lastly, a day later on March 18, 2015, the BBC published a report entitled “Chernobyl: Containing the World’s Worst Nuclear Accident”. The timely propaganda report was evidently published in order to acclimate the public for another nuclear reactor-related “accident”, possibly the worst in history. Lastly, in order to associate hackers with nuclear terrorism just prior to an unprecedented cyber-attack on nuclear reactors, the Express published a report back on October 25, 2015, entitled “Cyber Hackers are Greater Threat to UK Security than Nuclear Weapons”. Needless to say, these reports, taken collective, suggest that a state-sponsored cyber-attack on nuclear reactors is imminent.

NSAutah

5.2: Anonymous NSA Attack
An Anonymous cyber-attack, should it happen, will most likely target the NSA’s new Utah Data Center which will likely result in the collapse, malfunction and/or explosion of U.S.-related infrastructure on the west coast of America (e.g., the electoral grid, dams, oil, gas, nuclear, water and sewer facilities). Known as the “Utah Data Center“, the NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, was completed in September of 2013. The $1.5B data center is located at Camp Williams, Utah, just 25 miles (40 km) south of Salt Lake City.

Oil Gas Hack Cyber

5.3: Oil & Gas Cyber-Attack
As originally depicted in the August 16, 2015, Truther.org report entitled “Obama Plotting Environmental Disasters & Global Oil Crisis via Hacks on US Gas Stations, Oil Refineries & Oil Rigs”, it appears that the Obama administration (at the behest of the CIA in Switzerland) is preparing to execute a wave of cyber-related terror attacks on U.S. oil/gas-related facilities, namely their Automated Tank Gauges (see below). Needless to say, a hack on hundreds of U.S. oil/gas-related facilities would cause an environmental disaster as well as a global oil-crisis that would likely lead to war in the Middle East. In the aftermath of said attacks, the state-sponsored terror group ISIS or rouge states like Iran, Saudi Arabia or Syria would likely be blamed. The notion of a gas-related hack was witnessed back on May 11, 2011, when hackers tapped a California gas pump, making off with off with 528 gallons. Roughly 15 months later in 2012, the Saudi Aramco Hack (see below) was executed, crippling over 30,000 oil/gas-related workstations. Although a redux of the aforementioned oil/gas-related hacks is indeed possible, it’s far more likely that the CIA has more nefarious intentions. Although only conjecture, it’s highly likely that the CIA will execute cyber-related attacks on U.S. oil/gas-related entities such as gas stations, oil refineries and oil rigs. In the aftermath of said oil/gas-related cyber-attacks, hardware and software present at said entities will likely malfunction, causing oil and gas-related explosions and/or spills that could result in potentially hundreds of environmental disasters across America. In order to psychologically prepare the masses for a wave of oil/gas-related cyber-attacks that spawn an international oil crisis and subsequent wars in the Middle East, it was reported on January 23, 2015, that thousands of U.S. gas stations are vulnerable to cyberattacks. Roughly 6-months later on August 5, 2015, CNN published a report entitled “The Inside Story of The Biggest Hack in History”, rehashing the aforementioned Saudi Aramco Hack that crippled over 30,000 oil/gas-related stations just prior to a redux attack transpiring in reality. That same day, August 5, 2015, the EPA purposely caused the 2015 Gold King Mine Waste Water Spill near Silverton, Colorado. According to reports, a total of 3,000,000 U.S. gallons (11 ML) of polluted mine waste water including cadmium, lead, and arsenic were released. The spill was admittedly executed by EPA personal (at the behest of the CIA in Switzerland) in order to psychologically prepare Americans for massive oil/gas-related spills in the aftermath of a state-sponsored cyber-related attack on U.S. oil/gas-related facilities. Two days later on August 7, 2015, it was reported that hackers are now attacking U.S. gas stations. Needless to say, the propaganda report was spawned by the CIA in order to further sell the notion that America’s oil/gas-related infrastructure is now being targeted. This very notion was confirmed less than a week later on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. The headline confirms, albeit in a de facto manner, that an oil crisis will follow the impending wave of state-sponsored cyber-attacks. In what appears to be an ominous sign that oil/gas-related terror is imminent, it was reported on August 14, 2015, that a series of explosions rocked a Texas oil field chemical supplier. In the event of an attack, Galveston Bay, Texas (Port of Houston , Port of Texas City & Port of Galveston) will likely be destroyed. Lastly, in order to provide a timely motive for Islamic/Middle Eastern cyber-related terror attacks on America’s oil/gas-related infrastructure, MarketWatch published a report on August 15, 2015, entitled “Why Gas Prices are Rising as Oil Falls to 6-year Lows”. Needless to say, post oil/gas-related cyber-attacks, oil prices will skyrocket.

Oil Gas Terror

5.4: Cyber-Attack on Automated Tank Gauges (ATGs)
Back on January 22, 2015, a report entitled “The Internet of Gas Station Tank Gauges”, was published, foreshadowing exactly what the CIA has planned in respect to an oil/gas.-related cyber-terror attack. Needless to say, it’s not pretty. The report states that “Automated Tank Gauges (ATGs) are used to monitor fuel tank inventory levels, track deliveries, raise alarms that indicate problems with the tank or gauge (such as a fuel spill), and to perform leak tests in accordance with environmental regulatory compliance”. Because ATGs are used by nearly every fueling station in the U.S. and tens of thousands of systems internationally, a hack on them could theoretically cripple the oil and gas industry. In all likelihood, ATGs were likely put in place specifically so that a cyber-related attack could commence at a future date. The report goes on to state that “Approximately 5,800 ATGs were found to be exposed to the internet without a password. Over 5,300 of these ATGs are located in the United States, which works out to about 3 percent of the approximately 150,000 fueling stations in the country. An attacker with access to the serial port interface of an ATG may be able to shut down the station by spoofing the reported fuel level, generating false alarms, and locking the monitoring service out of the system. Tank gauge malfunctions are considered a serious issue due to the regulatory and safety issues that may apply”. In other words, a state-sponsored hacker could single-handedly decimate the oil industry which is evidently why the ATGs were installed in the first place.

hackers-cyber-crime-anonymousv1

5.5: Anonymous Gas Station Hack
In order to sell the notion that gas pumps and gas stations are vulnerable to cyber-terror attacks just prior to their fruition in reality, a rash of reports were published back in February of 2012 which were designed to sell the notion that the state-sponsored hacking group known as Anonymous is targeting America’s oil/-related infrastructure. This narrative was first identified on February 10, 2015, when a report entitled “Is Anonymous Attacking Internet Exposed Gas Pump Monitoring Systems in the US?”, was published. Although Anonymous could be scapegoated, a Middle Eastern country is far more likely. A day later on February 11, 2015, it was reported that a U.S. gas station pump was hacked with an ‘Anonymous’ tagline. The incident was likely executed at the behest of the CIA in order to set the precedent for a future gas station-related cyber-attack. That same day, February 11, 2015, the Register published a report entitled “Anonymous Hacked Gas Station – Could Cause Fuel Shortages”, further confirming the notion that the CIA is plotting an oil/gas-related cyber-attack in order to cause an oil crisis in America.

FLASHBACK: Saudi Aramco Hack
The notion that the CIA is plotting an oil/gas-related cyber-terror attack was witnessed back on August 15, 2012, during the Saudi Aramco Hack when the state-sponsored hacking group entitled “Cutting Sword of Justice” allegedly attacked 30,000 Saudi Aramco workstations, virtually crippling the company. According to reports, the Saudi state-owned oil company’s computers, unleashed a computer virus that “erased data on three-quarters of Aramco’s corporate PCs (documents, spreadsheets, e-mails, files), replacing all of it with an image of a burning American flag”. Predictably, U.S. intelligence officials stated that the hackers were from Iran, although they offered no specific evidence to support the claim.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China pearl harbor

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

WORLD WAR III: CIA Plotting Proxy War Between US & Russia in Syria to Spark World War III—Russian-Based Nuclear Missile Strike on US and/or Russian-Based Attack/Invasion of Alaska, Syria and/or Ukraine Imminent

RED DAWN SCENARIO: CIA Plotting Chinese Pearl Harbor-Like Surprise Attack—Cloaked Chinese Drone Attack, US Drone Cyber-Hijack Attack & Sub-Based Nuclear Strike on US Top Terror Scenarios

NUCLEAR HOLOCAUST: CIA Plotting Iranian Nuclear Terror Attack on America—LA, NYC, DC & NFL Cities Most Likely to Suffer Attack

ISIS ENDGAME:
How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BOOM: CIA Plotting Man-Made Asteroid Strike this October—JADE HELM States, Gulf of Mexico & Pacific Rim of Fire Most Likely to Suffer Attack

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
November 1, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese attack and/or invasion, most likely targeting the United States or her military, possibly in Hawaii and/or the South China Sea.

The impending Chinese attack will likely involve one or more of the following: a) a cyber-related attack on the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Australia Hawaii, Japan, Taiwan, the Philippines and/or mainland United States.

Consequently, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 17 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan
12. South China Sea (Disputed Islands)

South China Sea Attack
Based on breaking news and events, it appears that the CIA is plotting a Chinese attack on the U.S Navy which has ships trolling the disputed islands within the South China Sea. This latest Chinese attack narrative was first identified back on October 15, 2015, when the Guardian published a report entitled “Chinese Media: Military Must be Ready to Counter US in South China Sea”, foreshadowing that a confrontation may be imminent. Nine days later on October 24, 2015, Yahoo News published a report entitled “U.S. Patrols to Raise Stakes with Beijing in Disputed South China Sea”, further raising the specter of a naval confrontation with China. Three days later on October 27, 2015, Reuters published a report entitled “Angry China Shadows U.S. Warship Near Man-Made Islands”, foreshadowing a Chinese attack on the USS Lassen destroyer. Lastly, in what appear to be the final warning by China just prior to a surprise revenge-like attack, it was reported on October 27, 2015, that China has officially warned the United States after the USS Lassen passes near the disputed islands. Needless to say, these reports, taken collectively, suggest that a confrontation between the U.S. and China in the South China Sea is imminent.

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China pearl harbor

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

WORLD WAR III: CIA Plotting Proxy War Between US & Russia in Syria to Spark World War III—Russian-Based Nuclear Missile Strike on US and/or Russian-Based Attack/Invasion of Alaska, Syria and/or Ukraine Imminent

RED DAWN SCENARIO: CIA Plotting Chinese Pearl Harbor-Like Surprise Attack—Cloaked Chinese Drone Attack, US Drone Cyber-Hijack Attack & Sub-Based Nuclear Strike on US Top Terror Scenarios

NUCLEAR HOLOCAUST: CIA Plotting Iranian Nuclear Terror Attack on America—LA, NYC, DC & NFL Cities Most Likely to Suffer Attack

ISIS ENDGAME:
How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BOOM: CIA Plotting Man-Made Asteroid Strike this October—JADE HELM States, Gulf of Mexico & Pacific Rim of Fire Most Likely to Suffer Attack

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
October 25, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese attack and/or invasion, most likely targeting the countries of Australia, Japan, the Philippines, Taiwan, and/or the United States.

The impending Chinese attack will likely involve one or more of the following: a) a cyber-related attack on the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Australia Hawaii, Japan, Taiwan, the Philippines and/or mainland United States.

That being said, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

Based on previous Chinese surprise attack plots targeting the National Football League (NFL), an attack on the San Diego Chargers vs. Oakland Raiders game at Qualcomm Stadium in San Diego, California is likely forthcoming. Said attack will also target the numerous U.S. military bases in San Diego County.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 14 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China pearl harbor

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

WORLD WAR III: CIA Plotting Proxy War Between US & Russia in Syria to Spark World War III—Russian-Based Nuclear Missile Strike on US and/or Russian-Based Attack/Invasion of Alaska, Syria and/or Ukraine Imminent

RED DAWN SCENARIO: CIA Plotting Chinese Pearl Harbor-Like Surprise Attack—Cloaked Chinese Drone Attack, US Drone Cyber-Hijack Attack & Sub-Based Nuclear Strike on US Top Terror Scenarios

NUCLEAR HOLOCAUST: CIA Plotting Iranian Nuclear Terror Attack on America—LA, NYC, DC & NFL Cities Most Likely to Suffer Attack

ISIS ENDGAME:
How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BOOM: CIA Plotting Man-Made Asteroid Strike this October—JADE HELM States, Gulf of Mexico & Pacific Rim of Fire Most Likely to Suffer Attack

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
October 22, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese attack and/or invasion, most likely targeting the countries of Australia, Japan, the Philippines, Taiwan, and/or the United States.

The impending Chinese attack will likely involve one or more of the following: a) a cyber-related attack on the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Australia Hawaii, Japan, Taiwan, the Philippines and/or mainland United States.

That being said, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 14 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Obama China

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

WORLD WAR III: CIA Plotting Proxy War Between US & Russia in Syria to Spark World War III—Russian-Based Nuclear Missile Strike on US and/or Russian-Based Attack/Invasion of Alaska, Syria and/or Ukraine Imminent

RED DAWN SCENARIO: CIA Plotting Chinese Pearl Harbor-Like Surprise Attack—Cloaked Chinese Drone Attack, US Drone Cyber-Hijack Attack & Sub-Based Nuclear Strike on US Top Terror Scenarios

NUCLEAR HOLOCAUST: CIA Plotting Iranian Nuclear Terror Attack on America—LA, NYC, DC & NFL Cities Most Likely to Suffer Attack

ISIS ENDGAME:
How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BOOM: CIA Plotting Man-Made Asteroid Strike this October—JADE HELM States, Gulf of Mexico & Pacific Rim of Fire Most Likely to Suffer Attack

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
October 22, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA Headquarters beneath Lake Geneva will attempt to stage an October 2015 cyber-related terror attack on the New York Stock Exchange (NYSE), the US Security and Exchange Commission (SEC), the Federal Reserve Bank (FED). That being said, other global financial institutions may also suffer an attack.

Although the impending attack could theoretically be scapegoated onto ISIS or rouge nation states such as Iran, North Korea, or Syria, the countries of China, Russia and the state-sponsored hacking group known as Anonymous are the most likely to be scapegoated for the unprecedented cyber-related attacks and cyber-heists.

Back on December 18, 2014, the U.S. House cybersecurity chairman warned that Wall Street may be the next cyber target of the state-sponsored Sony hackers. The warning confirms, albeit in a de facto manner, that a full-scale cyber-related attack on Wall Street is imminent.

The notion that the New York Stock Exchange (NYSE) is about to suffer a massive cyber-related attack was further highlighted on March 13, 2015, when the owner of the NYSE warned of cyber risks to the market. Any future cyber-attack on the NYSE will have the seal of approval of its owner who stands to gain from such an attack.

In May of 2015, the National Defense Magazine published a report entitled “DHS Rolls out Cyber Security Program for Federal Agencies”. Said program is likely cover for a backdoor whereby DHS can execute a cyber-related attack on any U.S. government agency, namely stock exchanges.

Roughly 2-months later on July 21, 2015, 4 people were reportedly arrested in Florida and Israel for the cyber-attack on JPMorgan. The arrests were designed to sell the notion that hackers are actively targeting financial institutions prior to an unprecedented cyber-heist of the NYSE.

Two days later on July 23, 2015, 3 Estonian men were reportedly sentenced for cyber-related attacks that reached 100 countries. Again, the arrests were designed to further sell the notion that hackers are actively targeting financial institutions prior to an unprecedented cyber-heist of the NYSE.

In what appears to be pre-banking terror propaganda, the Telegraph published a report on August 17, 2015, entitled “Doomsday Clock for Global Market Crash Strikes One Minute to Midnight as Central Banks Lose Control”. Needless to say, the Federal Reserve is the only central bank in America.

Two days later on August 19, 2015, traitorous Infowars published a report entitled “Federal Reserve Directly Responsible for Recessions, Depressions”, providing a timely motive for a so-called domestic terror attack on one or more Federal Reserve Banks.

Roughly a week later on August 25, 2015, a former J.P. Morgan analyst was reportedly charged with a $600,000 insider trading scheme. The indictment was designed to further sell the notion that insiders are actively targeting financial institutions just prior to an unprecedented financial-related cyber-heist.

Less than a week later on August 30, 2015, the Guardian published a report entitled “Central Banks Can’t Save the Markets from a Crash. They Shouldn’t Even Try”. The timely report was designed to foreshadow the notion that a central banks, namely the Federal Reserve, are about to crash.

That same day, August 30, 2015, the Blaze published a report stating that ISIS is now plotting a “Second Blow” to the U.S. financial system. Although an ISIS-related attack on the U.S. economy is theoretically possible, an attack by Anonymous, China, or Russia is far more likely.

Lastly, on August 31, 2015, traitorous Infowars published a report entitled “No Paychecks After Cashless Society “Glitch”” which was evidently designed to foreshadow the notion that banks will crash and people will lose access to their bank accounts, most likely in the aftermath of an unprecedented cyber-related attack.

I. TOP ATTACK SCENARIOS:

Anonymous Twitter

1.1: Twitter Cyber-Attack
Unable to execute a direct cyber-related attack on the New York Stock Exchange (NYSE), it now appears that the Obama administration (at the behest of the CIA in Switzerland) may resort to attacking Twitter instead, possibly with a fraudulent report that causes a massive stock market crash. This notion was foreshadowed back on July 14, 2015, when CNBC published a report entitled “Twitter Shares Jump on Fake Takeover Report”. The term “fake takeover” was evidently designed to foreshadow a real-life fake takeover, namely the terrorist hijacking of a major entity such as the New York Stock Exchange, White House or the U.S. Capitol Building. In the aftermath of this bogus report, investors would instantly lose all faith in America, dumping their collective stock and crashing the market. In order to foreshadow that Twitter will be used in an upcoming terror attack, Fox News published a report on July 24, 2015, entitled “Could Twitter Stop the Next Terror Attack?”. Properly translated, the headline should read “Twitter Will Start the Next Terror Attack”. This exact scenario was beta-tested back on April 23, 2015, when the Twitter account of the Associated Press (AP) allegedly suffered a cyber-attack. The state-sponsored hackers then tweeted: “Breaking: Two explosions in the White House and Obama is injured”. The fake tween caused a subsequent panic which ultimately resulted in a 3-minute plunge of the NYSE, wiping out a total of $136.5 billion of its value. Needless to say, a redux attack now appears to be in order, most likely by the state-sponsored hacking group known as Anonymous who is very active on Twitter.

Twitter NYSE

1.2: Flash Crash Cyber-Attack

It now appears that the CIA in Switzerland will attempt to execute an attack on the New York Stock Exchange (NYSE) another way—most likely via a false-flag power failure. This particular notion as foreshadowed on April 17, 2015, when Bloomberg screens went dark worldwide. Four days later on April 21, 2015, it was reported that a futures trader was charged for manipulating the stock market which contributed to the 2010 “Flash Crash”. Given the 5-year delay in the banker’s indictment, it can be deduced that the patsy was only charged in order to foreshadow the “Flash Crash” just prior to another one transpiring in reality, most likely post-power failure.

nyse1

1.3: NYSE Cyber-Attack
The latest New York Stock Exchange (NYSE) cyber-terror plot appears to be a redux of two previously foiled terror plots as depicted in the March 20, 2014 Truther.org report entitled “Impending Wall Street Banking Cyber-Heist to Transfer Billions to Bitcoin”, and the April 15, 2014 Truther.org report entitled “Feds Planning High Frequency Trading Cyber-Attack via “Heartbleed” Bug”. In short, hackers will cause a “High Frequency Trading” sell-off (which they will short-sell), the profits of which will be deposited in untraceable Bitcoin accounts. In order to provide a motive for a Bitcoin-related cyber-terror attack, the IRS declared that Bitcoin was not an official currency on March 25, 2014. Roughly 3-months later on June 13, 2014, it was revealed that the FBI will auction off seized Bitcoins worth $18m on June 27, 2014, the impending date of the attack. In order to raise the profile of banks prior to a debilitating cyber-terror attack that will likely bankrupt millions of investors, Vice President Joe Biden stated on June 23, 2014 that “I don’t have a savings account”. Two days later on June 25, 2014, the U.S. Federal Reserve warned that banks face “tougher tests” ahead, an ominous sign that a so-called “test” (i.e., attack) is imminent. Although impossible to prove, it appears that Bitcoin was specifically created to be an untraceable depository for stolen funds from a Wall Street cyber-attack. In other words, the hackers play the role of Robin Hood by stealing from the rich (i.e., Wall Street) and giving to the poor (i.e., Bitcoin)—the only catch being that Robin Hood is invisible.

II. TOP CYBER SCAPEGOATS:

hackers-cyber-crime-anonymousv1

2.1: Anonymous Cyber-Hijack of U.S. Economy
Although an unprecedented cyber-terror attack on the U.S. economy could be blamed on China, the Guardians of Peace, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack, funneling the stolen money into allegedly untraceable Bitcoin accounts. Coincidentally, on October 2, 2014, it was revealed that an FBI informant admittedly organized Anonymous attacks on government websites in 30 countries, further confirming that the group known as Anonymous is in fact state-sponsored. The timely report was designed to set the precedent for an Anonymous attack on government-related websites such as the FED, NYSE, SEC, etc. An Anonymous-based cyber-attack will enable the progenitors of terror (i.e., the CIA) to steal billions if not trillions of dollars from the U.S. economy without a trace. Should a sovereign country be deemed responsible for the heist, defrauded investors worldwide would collectively demand compensation from that particular country, something the CIA does not want to deal with. In what appears to be pre-Wall Street cyber-attack logistics, it was revealed back on July 8, 2014, that Wall Street has now hired a former NSA chief to help create a “cyber war council”. Translation: Wall Street and the NSA are teaming up together to execute a Wall Street cyber-hijack which will likely disappear trillions of dollars, bankrupting the U.S. economy. In the wake of the attack, the NSA chief will likely be scapegoated for the attack.

2.2: Anonymous Stock Market Attack
In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely an alleged member of Anonymous.

China Chinese Hack Cyber II

2.3: Chinese Cyber Attack
Back on July 7, 2015, Truther.org published a report entitled “Swiss CIA Plotting Chinese-Based Hack & Cyber-Heist of Global Stock Markets”, warning of an impending cyber-attack on the New York Stock Exchange (NYSE). Less than 24-hours later on July 8, 2015, trading at the NYSE was inexplicably shut down for 4-hours. According to the CEO of the NYSE, the shutdown was “probably” due to a cyberattack. That same day, July 8, 2015, the state-sponsored hacking group known as Anonymous published a tweet on Twitter “predicting” the NYSE glitch. Since Twitter is run by the CIA they can pre-date tweets as was evidently the case. By blaming Anonymous, it took the focus off of China which Truther.org predicted would be scapegoated for the cyber-attack on the New York Stock Exchange.

2.4: Russian Cyber-Scapegoat
In the aftermath of unprecedented cyber-related terror attacks on Europe and/or the United States, the Swiss CIA may finger Russia. In order to create the narrative in the media that Russia is actively targeting America with cyber-related attacks, it was reported back on April 8, 2015, that Russia hacked the Obama White House. Roughly 2-weeks later on April 23, 2015, it was revealed that Russians hacked the Pentagon’s network, a fraudulent notion to be sure. Two days later on April 25, 2015, it was reported that Russian hackers read Obama’s unclassified emails. Roughly 3-weeks later on May 14, 2015, it was reported that Russian hackers are now targeting U.S. banks, an apparent preview of things to come. Less than 2-week later on May 27, 2015, it was reported that the IRS now believes that a recent cyberattack on its network originated in Russia. Needless to say, these reports, taken collectively, suggest that Russia will be scapegoated in the aftermath of an unprecedented cyber-terror attack targeting the U.S. financial system, leading to a new Cold War.

III. THE SET-UP:

reign-malware-1000x520

3.1: Regin Malware
In what appears to be pre-financial cyber-attack hardware, on November 23, 2014. CNN published a report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure has been hijacked by the Regin malware and therefore any type of cyber-related attack on America’s financial infrastructure is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.2: Federal Security Breaches
If reports are to be believed, the U.S. federal government is highly susceptible to cyber-attacks, making the likelihood of a major financial cyber-hijack all the more believable. For example, on November 4, 2014, it was reported that a cyber-attack on a federal security contractor wasn’t noticed for months. Therefore, if the FED, NYSE or SEC is hacked in 2014, it won’t be noticed days or even weeks. This in essence allows the CIA to stage a financial-related attack whenever they want without any forewarning. Six days later on November 10, 2014, it was reported that federal firewalls are struggling against the increasing number of cyber-attacks. The timely report was designed to give the U.S. government plausible deniability in the wake of a financial-related terror attacks that bankrupt the U.S. economy. Also on November 10, 2014, the U.S, Postal Service was reportedly hacked, resulting in employee and customer information being compromised. Needless to say, the incident was designed to set the precedent for a far worse cyber-attack on the U.S. federal government, most likely the FED or SEC.

Ukraine’s-Election-Commission-Denies-Cyber-Attack

3.3: Financial Cyber-Attacks Trending
A preview of financial related cyber-terror recently occurred on July 10, 2014, when it was reported that Norwegian banks suffered the largest-ever DDoS attack in their history, an act which the state-sponsored terror group known as Anonymous predictably took credit for. Because all 206 countries are under the command and control of the CIA, events tend to happen in other countries before transpire in America on a much larger scale. Roughly 2-weeks later on July 25, 2014, the European Central Bank was allegedly hacked and personal data stolen. Roughly a month later on August 27, 2014, it was revealed that the FBI is now investigating a cyber-attack on JPMorgan. Roughly 3-weeks later on September 17, 2014, members from Anonymous and an Occupy Wall Street group reportedly abolishes nearly $4 million in student loan debt on September 17, 2014, foreshadowing the notion of Anonymous vanishing millions into thin air. Roughly 3-weeks alter on October 3, 2014, the New York Times published a report entitled “Hackers’ Attack Cracked 10 Financial Firms in Major Assault”, further foreshadowing financial-related cyber-terror. Also on October 3, 2014, it was reported that the JP Morgan data breach affected 76 million households, a laughable notion considering that the population of the U.S. is only 300 million people. A few weeks later on October 20, 2014, U.S. officials warned 500 million financial records may have been hacked. The timely propaganda report was evidently published in order to show that financial-related cyber-terror is imminent just prior to an unprecedented attack on the U.S. financial system. Taken collectively, these timely reports have set the precedent for future bank-related cyber-terror attacks, most likely targeting the FED, NYSE, or SEC.

VI. BANKING DRILLS & WAR GAMES:

Cyber War China

4.1: Banking Cyber-Attack War Games
Back on January 16, 2015, it was revealed that a so-called “cyber-attack war games” will be staged by US and UK at a future and undisclosed date. War games have a history of going “live” which is why they are staged in the first place. The first war game will reportedly involve the Bank of England and commercial banks, targeting the City of London and Wall Street. These war games will be followed by “further exercises to test critical national infrastructure”. In other words, the entire financial system of the West will likely suffer a massive cyber-related terror attack.

4.2: Bank Terror Drills
In what appears to be cover drills for the controlled demolition of the U.S. economy, it was reported on October 10, 2014, that the U.S. and the UK will execute a “big bank collapse” simulation. According to reports, officials will “get together in a war room next week to see if they can cope with any possible fall-out when the next big bank topples over”. The banking collapse drill will reportedly involve Federal Reserve Chair Janet Yellen and Bank of England Governor Mark Carney, and be hosted by the U.S. Federal Deposit Insurance Corporation (FDIC). The drill will involve the hypothetical failure of U.S. banks, most likely the Federal Reserve. Needless to say, key term such as “collapse” and “topples over” are designed to foreshadow that a controlled demolition of the U.S. economy is indeed planned. Roughly 2-weeks late on October 26, 2014, it was reported that four in five Eurozone banks pass European Central Bank health test. Interestedly, the very next day, October 27, 2014, it was reported that 25 European Union banks failed a “stress test” exposing a $31billion shortfall. The bi-polar reporting was evidently designed to insinuate that banks are on the verge stressed to the point of collapse.

Major-US-Financial-Institutions-to-Take-Part-in-Quantum-Dawn-2-Cyber-Exercise

4.3: “Quantum Dawn II″ Terror Drill
Prior to a major cyber-terror attack on the New York Stock Exchange (NYSE), one would expect there to be some stock-market related terror drills to prepare Wall Street insiders for the attack. Coincidentally, on June 13th, 2013, it was reported that Wall Street executed “Quantum Dawn 2”, a cyber-terror war-game apparently meant to give insiders an opportunity to make financial moves before the market crashes—for good. According to the report, Cyber Strategies oversaw a terror exercise which included Citigroup, Bank of America, the Department of Homeland Security, the Treasury Department, the Federal Reserve, the Securities and Exchange Commission, as well as 40 other firms. The drill, which featured a hacker, possibly from China, operating from a fake trading platform, prompted a response in which the participants facilitated a conference call to “figure out what was going on”. In other words, the drill simulated a real-life scenario in which insider firms received the “heads up” about an impending cyber-attack and subsequently shared this information accordingly so that their bank accounts and those of their clients would not be affected. The same sort of thing occurred just prior to 9/11 when “put options” or bets were taken out on United Airlines and American Airlines, the two airline companies involved in the attacks. According to the “9/11 Commission Report”, “some unusual trading did in fact occur”, however, it claimed that, “each such trade proved to have an innocuous explanation”.

4.4: “Quantum Dawn II” Fallout
In the October 23, 2013, Fox Business report entitled “‘White Hat’ Hackers Expose Flaws of U.S. Stock Market”, the details of the “Quantum Dawn 2”  cyber-attack exercise were revealed. According to the report, ethical “white hat” hackers intentionally “looking to expose the cyber vulnerabilities of U.S. equity markets”, were able to directly impact market performance by “forcing a mock market close”. According to the report, more than 50 entities and 500 people in the financial services sector participated in the cyber-attack which was executed by the Securities Industry and Financial Markets Association (SIFMA) on July 18, 2013. So called “ethical hackers” were told to give everything they had to try and cripple the U.S. stock market during the 6-hour exercise. “Quantum Dawn 2 demonstrated the industry’s resiliency when faced with serious cyber-attacks that aimed to steal money, crash systems and disrupt equity market trading,” SIFMA CEO Judd Gregg stated. According to Cedric Leighton, a former U.S. intelligence officer, “The more realistic the exercise the better prepared they’ll be if and when attacks from a cyber standpoint occur”.

V. ATTACK AFTERMATH:

5.1: DHS Banking Continuity
In the wake of a major U.S. bank or stock market, a global financial panic in respect to the U.S. dollar will likely ensure. According to a December 10, 2004, CRS Report for Congress entitled “Homeland Security: Banking and Financial: Infrastructure Continuity”, bank terror and financial collapse have been planned for accordingly. According to the report, “H.R. 2043 sought to address bank risks under terrorism” and the Terrorism Risk Insurance Act of 2002 (TRIA) “provides a federal backstop for insurers willing to provide terrorism insurance”, ultimately protecting insurance banks against “catastrophic payouts in case of terrorist attacks”.  In other words, if and when a bank related terror attacks occur resulting in financial panic, private banks will not have to foot the bill for their losses because the U.S. government has assumed all the risk and liability. This convenient set-up essentially guarantees that the U.S. government, not the banks, will go bankrupt in the aftermath of bank related terror attacks.

US-court-cyber-attack

5.2: Banking “Contagion Effect”
In the aftermath of U.S. bank failures (a bi-product of an irreversible U.S. stock market crash), other banks will begin to panic, setting off a chain reaction of banking collapses around the world. The aforementioned CRS Report for Congress found that when one bank goes, the rest will follow:  “Financial institutions face two categories of emergencies that could impair their functioning. The first is directly financial: danger of a sudden drop in the value of financial assets, whether originating domestically or elsewhere in the world, such that a global financial crisis might follow. The second is operational: failure of physical support structures that underlie the financial system. Either could disrupt the nation’s ability to supply goods and services and alter the behavior of individuals in fear of the disruption (or fear of greater disruption). They could reduce the pace of economic activity, or at an extreme, cause an actual contraction of economic activity”. The report went on to state that “Collapse of one prominent entity could evoke a contagion effect, in which sound financial institutions become viewed as weak — today’s equivalents of a bank run, in which panicked customers withdraw funds from many entities, causing others to fail as well

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China pearl harbor

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

WORLD WAR III: CIA Plotting Proxy War Between US & Russia in Syria to Spark World War III—Russian-Based Nuclear Missile Strike on US and/or Russian-Based Attack/Invasion of Alaska, Syria and/or Ukraine Imminent

RED DAWN SCENARIO: CIA Plotting Chinese Pearl Harbor-Like Surprise Attack—Cloaked Chinese Drone Attack, US Drone Cyber-Hijack Attack & Sub-Based Nuclear Strike on US Top Terror Scenarios

NUCLEAR HOLOCAUST: CIA Plotting Iranian Nuclear Terror Attack on America—LA, NYC, DC & NFL Cities Most Likely to Suffer Attack

ISIS ENDGAME:
How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BOOM: CIA Plotting Man-Made Asteroid Strike this October—JADE HELM States, Gulf of Mexico & Pacific Rim of Fire Most Likely to Suffer Attack

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
October 18, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese attack and/or invasion, most likely targeting the countries of Australia, Japan, the Philippines, Taiwan, and/or the United States.

The impending Chinese attack will likely involve one or more of the following: a) a cyber-related attack on the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Australia Hawaii, Japan, Taiwan, the Philippines and/or mainland United States.

That being said, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 14 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

WORLD WAR III: CIA Plotting Proxy War Between US & Russia in Syria to Spark World War III—Russian-Based Nuclear Missile Strike on US and/or Russian-Based Attack/Invasion of Alaska, Syria and/or Ukraine Imminent

RED DAWN SCENARIO: CIA Plotting Chinese Pearl Harbor-Like Surprise Attack—Cloaked Chinese Drone Attack, US Drone Cyber-Hijack Attack & Sub-Based Nuclear Strike on US Top Terror Scenarios

NUCLEAR HOLOCAUST: CIA Plotting Iranian Nuclear Terror Attack on America—LA, NYC, DC & NFL Cities Most Likely to Suffer Attack

ISIS ENDGAME:
How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BOOM: CIA Plotting Man-Made Asteroid Strike this October—JADE HELM States, Gulf of Mexico & Pacific Rim of Fire Most Likely to Suffer Attack

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
October 14, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is plotting a major cyber-attack on Facebook, Google and/or Twitter this October. Since hundreds of millions of people around the world use these sites on a daily basis, the attack will in essence be the first global cyber-terror attack.

Exactly what type of cyber-terror is planned for Facebook, Google and/or Twitter is not known, but a future terror scenario in which one or more of the popular websites is taken offline for a lengthy period of time is the most likely terror scenario. That being said, real-world entities which are related to these sites (e.g., headquarters, offices, satellites, servers, etc.) could also be targeted.

In order to associate China with Facebook just prior to a state-sponsored cyber-related attack on the social media giant, the Washington Times published a report back on September 16, 2015, entitled “Chinese Compiling ‘Facebook’ of U.S. Government Employees”.

Five days later on September 21, 2015, it was reported that the Skype app was down across the globe. Post-state-sponsored cyber-attack, the Skype incident will predictably be chalked up to yet another cyber-attack by Anonymous, China, North Korea or Russia.

In order to foreshadow the notion of cyber-attack on an individual’s personal data such as Facebook, Fox News published a report on September 23, 2015, entitled “Feds Acknowledge More than 5M Fingerprints Stolen in Breach, Far More than Thought”.

In what appears to be a preview of Facebook terror to come, it was reported on September 28, 2015, that Facebook has experienced its second outage in 5 days. Needless to say, a third and prolonged outage is now imminent.

In what appears to be a CIA-spawned publicity stunt designed to draw unprecedented media attention to Facebook just prior to an unprecedented cyber-attack, CNN published a report on September 29, 2015, entitled “Don’t Fall for it: Facebook Hoax Makes the Rounds Again”.

Three days later on October 2, 2015, Russia Today published a report entitled “Domain Hunter Buys Google.com for $12, Owns it for 60 Seconds”, raising the notion of a cyber-arrack and hijack of Google by state-sponsored hackers just prior to its fruition in reality.

In order to draw unprecedented media publicity to Facebook just prior to a false-flag on its website and/or satellites, Fox News published a report on October 9, 2015, entitled “Why Facebook Bought a Satellite”. In the event that said satellite is hacked, China will most likely be blamed.

In order to foreshadow the notion that hackers are now targeting Google just prior to a staged attack, Russia Today published a report on October 13, 2015, entitled “Russia’s Yandex and Microsoft Team Up Against Google”.

Lastly, it is imperative to note that Facebook is a covert intelligence operation which was created by the CIA in order to: a) develop psychological profiles, b) tracking users, and c) monitor communication. In other words, Facebook is a private espionage corporation like STRATFOR which is routinely used by the CIA, FBI, NSA, etc.

facebook-hq-menlo-park

Facebook Headquarters Attack
Although a Facebook cyber-attack is the most likely terror scenario, there is also a possibility that Facebook Headquarters in Menlo Park, California could also suffer a state-sponsored terror attack. A future scenario in which Facebook is bombed, suffers a bio-terror attack, or is openly hacked by “domestic terrorists” who storm the campus is unfortunately a real possibility. This type of attack was foreshadowed back on March 11, 2014, when Facebook’s headquarters were locked down due to an alleged bomb threat. Whether the suspicious 1.5 hour closure provided the necessary cover for the installation of demolition explosives and/or weapons on Facebook’s campus is not known, but said explosives could be detonated via remote control at a future date in order to give the appearance of a coordinated terrorist attack. Interestingly, just 4 days prior to the aforementioned bomb threat, it was revealed that Facebook Headquarters had hired their own $200,000 a year police officer to “help [Facebook] conduct exercises for a bomb threat or for an active shooter incident”. The new police officer will reportedly be paid by a private security firm, making it all the more likely that he will be an accessory in a Facebook terror plot. In the event that Facebook Headquarters is successfully attacked, it will create a situation whereby every time the hundreds of millions of Facebook users log onto Facebook, they will be instantly reminded of the horrific attack (e.g., 9/11 and dialing 911 for an emergency). Therefore, an attack on Facebook is in essence a psychological attack more than anything which is why it is such a lucrative terror target.

Anonymous Twitter

Twitter Cyber-Attack
Unable to execute a direct cyber-related attack on the New York Stock Exchange (NYSE), it now appears that the Obama administration (at the behest of the CIA in Switzerland) may resort to attacking Twitter instead, possibly with a fraudulent report that causes a massive stock market crash. This notion was foreshadowed back on July 14, 2015, when CNBC published a report entitled “Twitter Shares Jump on Fake Takeover Report”. The term “fake takeover” was evidently designed to foreshadow a real-life fake takeover, namely the terrorist hijacking of a major entity such as the New York Stock Exchange, White House or the U.S. Capitol Building. In the aftermath of this bogus report, investors would instantly lose all faith in America, dumping their collective stock and crashing the market. In order to foreshadow that Twitter will be used in an upcoming terror attack, Fox News published a report on July 24, 2015, entitled “Could Twitter Stop the Next Terror Attack?”. Properly translated, the headline should read “Twitter Will Start the Next Terror Attack”. This exact scenario was beta-tested back on April 23, 2015, when the Twitter account of the Associated Press (AP) allegedly suffered a cyber-attack. The state-sponsored hackers then tweeted: “Breaking: Two explosions in the White House and Obama is injured”. The fake tween caused a subsequent panic which ultimately resulted in a 3-minute plunge of the NYSE, wiping out a total of $136.5 billion of its value. Needless to say, a redux attack now appears to be in order, most likely by the state-sponsored hacking group known as Anonymous who is very active on Twitter.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

RED DAWN SCENARIO: CIA Plotting Chinese Pearl Harbor-Like Surprise Attack—Cloaked Chinese Drone Attack, US Drone Cyber-Hijack Attack & Sub-Based Nuclear Strike on US Top Terror Scenarios

WORLD WAR III: CIA Plotting Proxy War Between US & Russia in Syria to Spark World War III—Russian-Based Nuclear Missile Strike on US and/or Russian-Based Attack/Invasion of Alaska, Syria and/or Ukraine Imminent

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BOOM: CIA Plotting Man-Made Asteroid Strike this September—JADE HELM States & Gulf of Mexico Most Likely to Suffer Attack

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
September 27, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is hell bent on assassinating Pope Francis at some point during his trip abroad to the United States which concludes on Sunday, September 27, 2015.

Unable to stage a conventional assassination due to timely terror alerts from Truther.org, it now appears that Pope Francis will be assassinated via plane crash when he attempts to fly home to Rome, Italy from the Philadelphia International Airport at 8:00 PM (EST) on September 27, 2015.

The notion that Pope Francis will be assassinated via plane crash was first identified back on September 22, 2015, when it was reported that Francis will charter an American Airlines plane to New York, Philadelphia, and back home to Rome.

This development is highly suspicious considering that Pope Francis always flies Alitalia Airlines of Italy. In the event that Francis dies on an American Airlines flight, America will forever be blamed and demonized for his death which is exactly why the CIA has ordered Francis to fly American Airlines.

Exactly what type of plane-related assassination is planned for Pope Francis is not known, but a made-for-TV assassination featuring a terrorist attack on his plane via RPGs (rocket-propelled grenade) and/or MANPADs (man-portable air-defense systems) is the most likely terror scenario.

The notion that the Pope’s plane could suffer a surface-to-air attack while flying over Africa or the Mediterranean Sea was foreshadowed in a Fox News report from September 15, 2015, which revealed that ISIS now has Cold War weaponry as well as modern military hardware.

That being said, the Pope’s American Airlines plane could also suffer a so-called cyber-hijack in which the plane suddenly loses power and drops from the sky, crashing into the ground below. The cyber-attack would then be blamed onto Anonymous or a rouge state such as China, Iran North Korea, Russia or Syria.

Back on September 17, 2015, it was reported that American Airlines suffered a so-called computer glitch which resulted in grounded flights at several hubs. Whether Pope Francis’s American Airlines plane was one of the grounded planes is not known, but it’s highly likely.

Said grounding may have provided the necessary cover for: a) the installation of weapons and/or explosives on Francis’ plane, and/or b) the alteration or sabotage of the plane electronics so that the plane is able to suffer a cyber-related hijack at a later date.

Other Pope Francis plane crash scenarios include a mid-flight accident with a drone, helicopter or plane, a rouge missile strike from a ship in the Atlantic or Mediterranean Sea, a terrorist hijack, pilot error or death, mechanical failure, bad weather, and/or force majeure, otherwise known as an act of God.

In order to highlight Pope Francis’ costly means of air travel just prior to a state-sponsored terror attack on his plane, traitorous Infowars published a report on September 25, 2015, entitled “Public Rides Buses So Pope Can Fly In Private Jet”.

In what appears to be a CIA-spawned publicity stunt designed to draw unprecedented media publicity to both Pope Francis and American Airlines just prior to their slated demise, it was reported on September 26, 2015, that Francis stumbled as he walked up the steps to his plane in New York City.

In the event that Pope Francis is assassinated on September 27, 2015, his death will coincidentally coincide with both a Blood Moon as well as the Jewish holiday known as Sukkot which has sparked Doomsday fears across the world.

TOP POPE FRANCIS PLANE CRASH SCENARIOS:

1. Accident
2.
Cyber-Hijack
3. Rouge Missile Strike
4. RPG Attack
5. MANPAD Attack
6. Terrorist Hijack
7. Pilot Error or Death
8. Mechanical Failure
9. Weather (e.g., Lightning Strike)
10.
Force Majeure (Act of God)

Pope Francis

Pope Francis Elected to be Assassinated
When Pope Joseph Aloisius Ratzinger (Pope Benedict XVI) inexplicable resigned back on February 28, 2013, he paved the way for the election of Pope Francis (Jorge Mario Bergoglio) on March 13, 2013. Since then, the CIA-run media has built up Francis as a champion of the people, as well as a rebel against the historically conservative Catholic Church. This was premeditatively done in order to: a) popularize the Catholic Church which has become a relic, and b) make the impending assassination of Pope Francis an international tragedy designed to demonize America, namely her gun owners which will likely be scapegoated for the death of Francis. Despite the fact that Francis is a Jesuit (i.e., member of the Society of Jesus), his coat of arms contains the “ǂ” symbol (i.e., the letter “F) which was derived from the Wheel of Fortuna. The “ǂ” symbol (i.e., the Patriarchal cross) is representative of the “double-cross” (i.e., backstab) which is indicative of Greco-Roman behavior as evidenced by the Rome adage, “By deception, thou shalt do war”. Consequently, Pope Francis will be double-crossed by the CIA at some point in the near future, likely leading to his death.

cyber hijack

American Airlines Cyber-Hijack
In the event that Pope Francis’ American Airlines plane suffers an unprecedented cyber-hijack and subsequent crash, the attack will be scapegoated onto the state-sponsored hacking group known as Anonymous, or rouge states such as China, Iran, North Korea, Russia or Syria. The notion of airliner cyber-hijack was first raised by the Daily Mail back on March 16, 2014, when they published a report entitled “Is Missing Malaysian Jet the World’s First Cyber Hijack?”. The report cited an anti-terror expert who said that a plane’s altitude, speed and direction could be hacked by ‘codes’ and that planes could be landed using remote control. Roughly 8-months later on November 4, 2014, the software for a state-sponsored cyber-hijack of commercial airliners was evidently touted by Russia Today in a report entitled “Could Hackers Cyber-Hijack a Plane? UK Scientists Develop Tech to Fight Malware”. The software was likely built with a backdoor which specifically enables commercial airliners to be cyber-hijacked. In what appears to be pre-cyber-hijack attack propaganda, the Government Accountability Officer reported on April 14, 2015, that newer aircraft are vulnerable to hacking. A day later on April 15, 2015, Russia Today published a report entitled “Hijack Hack: Modern Planes Vulnerable to Remote Midair Takeover” which was designed to further sell the notion that airliners can now be hijacked by hackers. Roughly a week later on April 26, 2015, it was reported that an iPad glitch grounded two dozen American Airlines flights in America. The grounding was likely executed by the CIA in order to rig the planes with an electronic device and/or explosives which can be activated at a later date in order to bring the fleet of planes down simultaneously in the first-ever cyber-hijacking. Less than 2-weeks later on May 9, 2015, it was reported that an A400M Airbus cargo plane crashed near the Seville airport in Spain. According to follow-up report dated May 20, 2015, the Airbus A400M crash was linked to faulty software that had been installed. The Airbus A400M was evidently crashed by the CIA in order to set the precedent for a software-related airliner disaster. Post cyber-hijack attack, the May 2015 crash of the Airbus A400M will likely be touted as the first-ever cyber-hijack. Less than a week later on May 15, 2015, Wired magazine published a report entitled “Feds Say That Banned Researcher Commandeered a Plane”, further selling the notion that hackers could cyber-hijack commercial airliner just prior to it actually transpiring in reality. Three days later on May 18, 2015, Fox News published a report entitled “FBI Affidavit Claims Security Expert Admitted to Briefly Hacking Flight Controls”, confirming, albeit in a de facto manner, that the future cyber-hijack of commercial airliners will be executed by so-called “security experts” at the behest of the Swiss CIA. In order to associate Boeing (and thereby airplanes) with hackers just prior to an unprecedented cyber-attack on airliners, the Washington Post published a report on August 4, 2015, entitled “Hacked E-Mails: Boeing Wants its Drones to Hack Computers from the Sky”. A day later on August 5, 2015, Russia Today published a report entitled “‘Funtenna’ Uses Sound Waves, Radio to Hack Internet of Things”. Needless to say, airports and airliners are considered to be part of the so-called “Internet of Things”, a term used to describe real-world objects which are linked to the internet. The notion of a cyber-related attack on air travel was witnessed two days later on August 7, 2015, when Chinese hackers reportedly attacked the U.S. travel industry. The incident was likely staged or fabricated in order to sell the notion that China will target U.S. airliners in the future. Lastly, three days later on August 10, 2015, Yahoo News published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”, further associating aerial-related machines with hacking just prior to an unprecedented cyber-hijack attack on commercial airliners.

Pope

FLASHBACK: Pope Francis Assassination Foiled
Back on January 14, 2015, Truther.org published a report entitled “Terror/Stampede Alert for Philippines During Pope Francis’ Visit” in respect to the Catholic leader’s visit to the Philippines on January 15-19, 2015. Predictably, three days later on January 17, 2015, a so-called volunteer mysteriously died in an accident after the Pope’s mass in the Philippines. Although only conjecture, it appears that the man privy to first-hand knowledge of the foiled terror plot. Less than 24-hours later on January 18, 2015, the country of Indonesia reportedly executed 6 men for drug-related offenses. These men were likely the slated terrorists who planned to carry out the attack on Pope Francis. This notion is corroborated by the fact that on February 10, 2015, members of the Indonesian-based terror group Jemaah Islamiyah were arrested in a plot to bomb Pope Francis while he was in the Philippines.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

cyber hijack

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

JADE HELM 15: CIA Plotting ISIS Invasion of America, Oak Keeper Massacres, Wave of Domestic/Jihad Terror Attacks, Predator Drone Strikes, Suspension of 2016 US Presidential Election, Martial Law & Obama Dictatorship

BUSTED: Alex Jones Flees America after Being Linked to Obama Plot to Spark a Civil War in Texas During JADE HELM 15

WORLD WAR III: CIA Plotting War III between US & Russia—Staged Russian Invasion of Alaska Imminent

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING: CERN Complex in Switzerland Identified as CIA Headquarters

SHOCK: Death Star Appears Over CERN, Switzerland, Home of the CIA

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
September 3, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears the CIA in Switzerland is preparing to stage unprecedented cyber-attacks on U.S. and/or European airports and airliners this September, namely over the busy Labor Day Weekend, September 3-6, 2016.

The impending cyber-attack, which will be scapegoated onto Anonymous, China or Russia, will be the first-ever cyber-hijack of commercial airliners. Consequently, numerous airliners will suddenly lose power and drop from the sky like flies, most likely onto suburban areas below.

The notion of a cyber-hijack of an airliner was first raised by the Daily Mail back on March 16, 2014, when they published a report entitled “Is Missing Malaysian Jet the World’s First Cyber Hijack?”. The report cited an anti-terror expert who said that a plane’s altitude, speed and direction could be hacked by ‘codes’ and that planes could be landed using remote control.

Roughly 8-months later on November 4, 2014, the software for a state-sponsored cyber-hijack of commercial airliners was evidently touted by Russia Today in a report entitled “Could Hackers Cyber-Hijack a Plane? UK Scientists Develop Tech to Fight Malware”. The software was likely built with a backdoor which specifically enables commercial airliners to be cyber-hijacked.

In what appears to be pre-cyber-hijack attack propaganda, the Government Accountability Officer reported on April 14, 2015, that newer aircraft are vulnerable to hacking. A day later on April 15, 2015, Russia Today published a report entitled “Hijack Hack: Modern Planes Vulnerable to Remote Midair Takeover” which was designed to further sell the notion that airliners can now be hijacked by hackers.

Roughly a week later on April 26, 2015, it was reported that an iPad glitch grounded two dozen American Airlines flights in America. The grounding was likely executed by the CIA in order to rig the planes with an electronic device and/or explosives which can be activated at a later date in order to bring the fleet of planes down simultaneously in the first-ever cyber-hijacking.

Less than 2-weeks later on May 9, 2015, it was reported that an A400M Airbus cargo plane crashed near the Seville airport in Spain. According to follow-up report dated May 20, 2015, the Airbus A400M crash was linked to faulty software that had been installed.

The Airbus A400M was evidently crashed by the CIA in order to set the precedent for a software-related airliner disaster. Post cyber-hijack attack, the May 2015 crash of the Airbus A400M will likely be touted as the first-ever cyber-hijack.

Less than a week later on May 15, 2015, Wired magazine published a report entitled “Feds Say That Banned Researcher Commandeered a Plane”, further selling the notion that hackers could cyber-hijack commercial airliner just prior to it actually transpiring in reality.

Three days later on May 18, 2015, Fox News published a report entitled “FBI Affidavit Claims Security Expert Admitted to Briefly Hacking Flight Controls”, confirming, albeit in a de facto manner, that the future cyber-hijack of commercial airliners will be executed by so-called “security experts” at the behest of the Swiss CIA.

In order to associate Boeing (and thereby airplanes) with hackers just prior to an unprecedented cyber-attack on airliners, the Washington Post published a report on August 4, 2015, entitled “Hacked E-Mails: Boeing Wants its Drones to Hack Computers from the Sky”.

A day later on August 5, 2015, Russia Today published a report entitled “‘Funtenna’ Uses Sound Waves, Radio to Hack Internet of Things”. Needless to say, airports and airliners are considered to be part of the so-called “Internet of Things”, a term used to describe real-world objects which are linked to the internet.

The notion of a cyber-related attack on air travel was witnessed two days later on August 7, 2015, when Chinese hackers reportedly attacked the U.S. travel industry. The incident was likely staged or fabricated in order to sell the notion that China will target U.S. airliners in the future.

Three days later on August 10, 2015, Yahoo News published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”, further associating aerial-related machines with hacking just prior to an unprecedented cyber-hijack attack on commercial airliners.

In what appears to be a cover for the cyber-hijack of commercial airliners, it was reported 5-days later on August 15, 2015, that a so-called computer outage at an FAA center in Washington, D.C. delayed flights, namely in New York City and Washington, D.C.

Whether the timely FAA computer outage provided the necessary cover for the installation of a computer program, virus or other destructive device within the downed aircraft is not known, but it’s highly likely. Said program, virus or device could be utilized at a later date in order to cause the planes in question to lose power and drop from the sky.

Lastly on August 27, 2015, USA Today published a report entitled “Reports: U.S. Drone Kills Islamic State Hacker”, further associating aerial machines with hacking just prior to an unprecedented cyber-hijack attack on multiple commercial airliners.

Obama China

Chinese Cyber-Scapegoat
As evidenced, the CIA has been setting up China as a cyber-scapegoat for quite some time now. In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s travel system such as airliners, airports, trains, train stations, and travel hubs. The notion of a China-based attack on the travel industry was witnessed back on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China will target U.S. airliners in the future. Back on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”. In what appears to be pre-Chinese attack/invasion programming, more than 10 countries will join China’s massive military parade on September 3, 2015, which appears to be a global publicity stunt designed to show off China’s military strength just prior to a staged cyber-attack. In order to provide a timely motive for a Chinese-based cyber-attack on the United States, it was reported on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like cyber-attack by China is likely forthcoming.

Russian President Vladimir Putin

Russian President Vladimir Putin

Russian Cyber-Scapegoat
In the aftermath of unprecedented cyber-related terror attacks on the travel industry, the Swiss CIA will may finger Russia. In order to create the narrative in the media that Russia is actively targeting America with cyber-related attacks, it was reported back on April 8, 2015, that Russia hacked the Obama White House. Roughly 2-weeks later on April 23, 2015, it was revealed that Russians hacked the Pentagon’s network, a fraudulent notion to be sure. Two days later on April 25, 2015, it was reported that Russian hackers read Obama’s unclassified emails. Roughly 3-weeks later on May 14, 2015, it was reported that Russian hackers are now targeting U.S. banks, an apparent preview of things to come. Less than 2-week later on May 27, 2015, it was reported that the IRS now believes that a recent cyberattack on its network originated in Russia. Lastly, less than 2-weeks later on June 9, 2015, TV5 Monde was reportedly attacked ‘by Russia-based hackers’, setting the precedent the impending attack. Needless to say, these reports, taken collectively, suggest that Russia will be scapegoated in the aftermath of an unprecedented cyber-terror attack targeting American and/or European airliners, likely leading to a new Cold War.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Black Dart I

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, consider this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

JADE HELM 15: Swiss CIA Plotting ‘Robin Sage’ Redux, Attacks on Jade Helm Soldiers by ‘Operation Counter Jade Helm’, Domestic & ISIS Terror Attacks, Predator Drone Strikes, Suspension of 2016 US Presidential Election, Martial Law & Obama Dictatorship

WORLD WAR III: How and Why the Swiss CIA Will Trigger Nuclear War Between US-Led NATO & Russia

ISIS ENDGAME: How and Why the CIA in Switzerland Created ISIS as Cover for Nuclear and Biological Terror Attacks

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
July 28, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA in Switzerland) is preparing to execute a wave of drone-related cyber-hijack-attacks during “BLACK DART”, a military exercise currently taking place in California from July 27 until August 10, 2015.

The 2-week cyber-drone exercise, which is openly being funded by the U.S. government, will take place above Naval Air Station Point Mugu at Naval Base Ventura County, just outside Los Angeles, California, The exercise will reportedly test “tactics and technologies to combat hostile drones”. Translation: hostile drone attacks are likely now in play for the City of Angels.

According to reports, BLACK DART will feature “tests” of at least 55 drone-related computer systems which were shipped to Point Mugu at their own expense by an “assortment of military units, government agencies, private contractors and academic institutions”. The variety of audience members provides the CIA a number of patsies and black hat actors to scapegoat at a later date.

Considering that the phrase “private contractors” is code-word for state-sponsored corporations such as Blackwater, Halliburton and KBR, all of which have previously employed current of former Special Forces (i.e., professional terrorists), the drones and computers of said contractors, and those of their respective employees, could suffer an alleged “cyber-attack” during the exercise.

Aside from the 55 drones which will admittedly be operational during BLACK DART, it’s highly likely that drones stationed at numerous U.S. military bases across Southern California (see below) could also suffer a cyber-terror attack, possibly resulting in 9/11-style Kamikaze drone attacks and/or drone-related missile strikes on LA-based infrastructure, landmarks, skyscrapers and military installations.

The notion that terror may be planned for BLACK DART was foreshadowed by the New York Post from July 25, 2015, entitled “Military Exercise Black Dart to Tackle Nightmare Drone Scenario”. The nightmare scenario in question appears to be a state-sponsored cyber-attack and subsequent hijack of multiple drones during the exercise.

Exactly what type of drone-related attacks are planned BLACK DART is not known, but drone-related missile attacks, kamikaze attacks, and/or accidents or crashes that ultimately result in major wildfires or forest fires within the drought-stricken state of California now appear to be in order. Mass evacuations would likely follow.

The aforementioned New York Post report on BLACK DART also stated that there have been “sightings of unidentified small drones flying over nuclear reactors in France”, and that “a drone carrying radioactive sand” landed on the roof of the Japanese Prime Minister. Consequently, drone-related attacks on California’s nuclear reactors are expected.

Disclosed in 2014, BLACK DART is no longer a secret war game. It is, however, only open to a select group of media personal, prompting the U.S. Department of Defense to state that it is “aware of this problem” (i.e., lack of access) and that they are “concerned about it” and now “working on it”. Consequently, a majority of the world’s media will likely be present in Los Angles during this year’s BLACK DART exercise.

According to U.S. Air Force Major Scott Gregg, the director of this 14th edition of BLACK DART, there will be roughly “1,000 people at Black Dart this year”, including but not limited to: “participants, observers and support”. Since no government agency can monitor 1,000 potential hackers simultaneously in real time, state-sponsored cyber-attacks are executed at some point during the event.

Since the U.S. Departments of Energy and the U.S. Department of Homeland Security will reportedly “send observers” (i.e., agents) to BLACK DART, hacks and attacks by state-sponsored “actors” are expected to transpire prior to the end of the exercise on August 9, 2015.

Lastly, the exercise will feature a small fleet of surrogate threat drones that will be airborne for 5-hours a day for a cumulative total of 14-days. During that time, 6 drone will reportedly fly over Naval Air Station Point Mugu while participants “test radars, lasers, missiles, guns and other technologies” that the U.S. military will “use to detect and kill or neutralize drones of all sizes”.

Black Dart II

BLACK DART Actors:

I. 55+ Drones (e.g., 400 hexacopter, Flanker, Scout II, Outlaw G2, etc.)
II. 1,000+ People (Public & Private)
III. Unknown Amount of U.S. Military Drones (e.g., Predators, Reapers, etc.).

[Does not purport to be a complete list of BLACK DART actors]

Cyber-Hijack Propaganda
Prior to a high-profile drone-related terror attack, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, cyber and drone-related terror is now at an all-time high which suggests that a state-sponsored drone-related attack is now imminent.

Drone-Cyber Hijack Attack Narrative:

1. July 6, 2015: Robotics company Cyberdyne introducing ‘service’ robots with artificial intelligence
2. July 22, 2015: US drone crashes in Iraq desert, locals pose for selfies
3. July 25, 2015: Military exercise Black Dart to tackle nightmare drone scenario
4. July 25, 2015: Spy-in-the-sky terror threat to William: Security alert over app that lets anyone track pilot
5. July 26, 2015: San Francisco police shoot man who attempted carjacking near airport
6. July 27, 2015: Plane crashes into yard in California killing pilot
7. July 27, 2015: China eliminates all restrictions on gaming consoles
8. July 27, 2015: Lynch: Thought of cyber-attack on US ‘keeps me … up at night’
9. July 27, 2015: Experts: “Racist” Killer Robots Could Conduct Ethnic Cleansing Campaigns

[Does not purport to be a complete list of drone-related cyber-attack headlines]

I. SKY-NET:

A drone designed and constructed by Concepcion University and the Chilean army is seen during a flight test at Concepcion city

1.1: MQ-1 Predator Drones Based in Southern California
In the event of cyber-related attacks on drones during BLACK DART, MQ-1 Predator drones based in Riverside and Lancaster, California may come under attack. Back in 1996, the U.S. Secretary of Defense selected the U.S. Air Force as the operating service for the RQ-1A Predator system, placing an undisclosed amount of MQ-1 Predator drones under the Air National Guard‘s 163d Reconnaissance Wing at March Air Reserve Base in Riverside, California. Some 16-years later on June 13, 2012, a Public Intelligence report revealed that there are now 64 drone bases on American soil, 12 of which house Predator drones. The notion that MQ-1 Predator drones are flying sorties over California was first reported on September 1, 2012, when it was revealed that Predator drones operated by the 163rd Reconnaissance Wing were flying above the Rim Fire at Yosemite National Park, likely sparking the blaze with multiple Hellfire missile strikes. In a Los Angeles Times report dated December 7, 2009, it was revealed that MQ-1 Predator drones are now being used by the U.S. Border Patrol to track illegal immigrants on the Mexico-California border. Said drone are reportedly based in Antelope Valley in northern Los Angeles County, roughly 35 miles (55 kilometers) from where Walker was assassinated in Valencia, California. Lastly, on January 28, 2014, it was reported that the U.S. Border Patrol grounded its drone fleet after a $12 million drone crashed off the coast of California, further confirming that drones are actively flying over California.

1.2: SKYNET Terminator Drone Program Activated
The SKYNET terminator scenario depicted in the film “Terminator 2” (1991) was a colossal psychological operation (PSYOP) because the real autonomous terminators hell bent on humanity’s destruction do not walk on land as depicted in the movie, but rather fly through the air in the form of autonomous drones. Although SKYNET was billed as the fictional name for the terminator program within the Terminator movie series, it is in fact the actual name of NATO’s satellite program which currently encircles the globe. According to Wikipedia, “SKYNET is a family of military satellites, now operated by Paradigm Secure Communications on behalf of the UK Ministry of Defense, which provide strategic communication services to the three branches of the British Armed Forces and to NATO forces engaged on coalition tasks.” Without the use of SKYNET satellites, which provide GPS-related logistics and communication for autonomous aerial vehicles (UAVs), the SKYNET terminator scenario would not be able to function. In other words, SKYNET is the electronic backbone of the terminator drone program. Although SKYNET was founded in 1969, the 2012 NATO Summit in Chicago marked the first time in history that the full-scale implementation of autonomous aerial terminators was publically disclosed.

skynet_wallpaper

1.3: SKYNET Operating Under Alias Astrium Services
The hi-tech computerized kill system known as SKYNET was originally exposed by Truther.org on May 20, 2012, in a report entitled “Chicago Terror Cover for NATO Implementation of SKYNET Terminator Program”. The report revealed for the first time in history that the SKYNET terminator program was not only real but was officially activated during the 2012 NATO Summit in Chicago. Roughly 5 months later, SKYNET inexplicably changed their name to Astrium Services, despite the fact that they had used the name SKYNET since 1969. The sudden attempt to rebrand the SKYNET satellite system appears to be a direct reaction to fact that the nightmare terminator program was exposed by Truther.org.

II. CHINESE DRONE ATTACK:

2.1: Chinese Cyber-Terror Trending
Prior to an Earth-changing cyber-terror attack that will likely spark World War III between the U.S. and China, it has to be well-established that China is actively hacking the U.S. This notion was confirmed on July 23, 2015, when Russia Today published a report entitled “US Won’t Publicly Blame China for Massive Government Hacks” which essentially confirmed as much. A day later on July 24, 2015, the New York Times published a report entitled “U.S. Fears Data Stolen by Chinese Hacker Could Identify Spies” which further implicated Chinese hackers for attacks just prior to a horrific attack. Lastly, a day later on July 25, 2015, Fox News published a report entitled “FBI: China the Most Predominant Economic Espionage Threat to US”, basically stating that China is the #1 threat to America just prior to a wave of drone-related attacks that spark a nuclear World War III.

drone

2.2: Chinese Cyber-Hijack Possible
Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

2.3: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

2.4: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

China Chinese Hack Cyber II

2.5: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

2.6: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

2.7: Book: “Sting of the Drone”
The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

hackers-cyber-crime-anonymousv1

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, am currently in the process of applying for political asylum in Switzerland (which is coincidentally home to the CIA), the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, consider this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

JADE HELM 15: How & Why the Swiss CIA Created & Funded the War Game for Domestic & ISIS Terror Attacks, Civil War, FEMA Camps, Gun Confiscation, Martial Law, Suspension of the 2016 US Presidential Election & Obama Dictatorship

WORLD WAR III: How and Why the Swiss CIA Will Trigger Nuclear War Between US-Led NATO & Russia

ISIS ENDGAME: How and Why the CIA in Switzerland Created ISIS as Cover for Nuclear and Biological Terror Attacks

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
July 16, 2015
Truther.org

SWITZERLAND, ZurichBased on breaking news and events, it appears that the Obama administration (at the behest of the CIA in Switzerland) is preparing to execute a wave of cyber-related terror attack during JADE HELM 15 which was created as cover for domestic terror attacks.

In the event that cyber-related attacks are executed by the Swiss CIA, the state-sponsored terror group Anonymous will likely be blamed for attacks on airplanes, electrical/internet/phone grids, financial hubs, travel hubs, infrastructure, trains, and media-related entities.

That being said, banking-related entities as well as the phone, power and internet grids which will be used to communicate terror alerts during JADE HELM 15 will likely be targeted at some point during JADE HELM 15 which runs through September 15, 2015.

It is also possible that an Anonymous-related attack on Facebook, Twitter, Instagram or CIA-run propaganda outlets (e.g., BBC, CNN, FOX, NBC, etc.) could result in a fraudulent news story being published which cause a panic, resulting in a massive sell-off which would have global ramifications.

While any one of the aforementioned targets could suffer a direct cyber-attack, it’s also possible that the entire electric/internet grid of America could suffer a cyber-related attack. This would ultimately render all the listed targets powerless, causing them to suffer an attack/malfunction, albeit in a de facto manner.

Interestingly, the BBC published a report back on May 5, 2015, entitled “Destructive Computer Virus Uncovered”. The timely report stated in part that the new computer virus makes the machines it infects unusable. Consequently, any aircraft infected with said virus will simply shut off, dropping from the skies.

In order to foreshadow the notion that the internet and/or power grid will collapse due to a cyber-related attack, a propaganda report was published by Russia Today on May 4, 2015, entitled “Internet Could Collapse by 2023, Researchers Warn”.

Roughly 2-months later on July 3, 2015, USA Today published a report entitled “The Internet Is Officially Too Big”, foreshadowing that an internet collapse is imminent, most likely due to a state-sponsored cyber-attack on America’s power grid by Anonymous.

The notion that hackers have now mastered the internet, especially in respect to hacking, it was reported three days later on July 6, 2015, that a notorious hacking firm was hit with a large-scale hack. Needless to say, if the so-called experts are being hacked, no one is safe.

Two days later on July 8, 2015, a German missile battery reportedly received orders from unknown hackers, a report which suggests that U.S. military installations involved in JADE HELM 15 may come under attack by state-sponsored hackers.

That same day, July 8, 2015, it was also reported that trading at the NYSE resumed after a nearly 4-hour halt. According to reports, the CEO of the NYSE stated that the shutdown was “probably” a cyberattack. Said cyber-attack will likely be scapegoated onto Anonymous at a later date.

Also on July 8, 2015, it was reported that a Twitter tweet by Anonymous “predicting” the NYSE glitch
caused a stir, suggests that the state-sponsored terror group was responsible. Consequently, Anonymous will likely be blamed for structural-related cyber-terror attacks during JADE HELM 15.

That same day, July 8, 2015, United Airlines flights were grounded across the United States, for a second time. According to reports, the grounding appeared to be over an issue with faulty flight plans being uploaded to pilots, suggesting a cyber-related attack of some kind.

A day later on July 9, 2015, the OPM announced that more than 21 million Americans were affected by a second major data breach. Similar to the aforementioned attacks, the cyber-attack was executed in order to set the precedent for far greater domestic-related cyber-attacks during JADE HELM 15.

A day later on July 10, 2015, the International Business Times published a report entitled “How Big is Anonymous? Researcher Attempts to Quantify Hacktivist Network”, drawing unprecedented global media attention to the state-sponsored terror group just prior to a wave of attacks during JADE HELM 15.

In what appears to be pre-Anonymous cyber-terror attack programming, the Hill published a report on July 11, 2015, entitled “New Proposal Would Strike at Web’s Anonymity”. In the aftermath of cyber-related terror attacks, it’s highly likely that draconian legislation in respect to the internet will be passed.

A day later on July 12, 2015, traitorous Infowars published a report entitled “Leaked Documents Show FBI, DEA, & Army Can Control Your Computer”, providing a timely motive for Anonymous-related cyber-attacks during JADE HELM 15.

Lastly, that same day, July 12, 2015, Infowars published a second report entitled “Top Computer Security Expert Warns – David Cameron’s Plan to Ban Encryption Would “Destroy the Internet””, providing a timely secondary motive for cyber-related attacks during JADE HELM 15.

Anonymous Cyber-Hijack of U.S. Economy
Although an unprecedented cyber-terror attack on the U.S. economy could be blamed on China, the Guardians of Peace, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack, funneling the stolen money into allegedly untraceable Bitcoin accounts. Coincidentally, on October 2, 2014, it was revealed that an FBI informant admittedly organized Anonymous attacks on government websites in 30 countries, further confirming that the group known as Anonymous is in fact state-sponsored. The timely report was designed to set the precedent for an Anonymous attack on government-related websites such as the FED, NYSE, SEC, etc. An Anonymous-based cyber-attack will enable the progenitors of terror (i.e., the CIA) to steal billions if not trillions of dollars from the U.S. economy without a trace. Should a sovereign country be deemed responsible for the heist, defrauded investors worldwide would collectively demand compensation from that particular country, something the CIA does not want to deal with. In what appears to be pre-Wall Street cyber-attack logistics, it was revealed back on July 8, 2014, that Wall Street has now hired a former NSA chief to help create a “cyber war council”. Translation: Wall Street and the NSA are teaming up together to execute a Wall Street cyber-hijack which will likely disappear trillions of dollars, bankrupting the U.S. economy. In the wake of the attack, the NSA chief will likely be scapegoated for the attack.

Anonymous Stock Market Attack
In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely an alleged member of Anonymous.

TOP CYBER-TERROR TARGETS:

cyber hijack

1.1: Airplane Cyber-Attack
The notion of a cyber-hijack of an airliner was first raised by the Daily Mail back on March 16, 2014, when they published a report entitled “Is Missing Malaysian Jet the World’s First Cyber Hijack?”. The report cited an anti-terror expert who said that a plane’s altitude, speed and direction could be hacked by ‘codes’ and that planes could be landed using remote control. Roughly 8-months later on November 4, 2014, the software for a state-sponsored cyber-hijack of commercial airliners was evidently touted by Russia Today in a report entitled “Could Hackers Cyber-Hijack a Plane? UK Scientists Develop Tech to Fight Malware”. The software was likely built with a backdoor which specifically enables commercial airliners to be cyber-hijacked. In what appears to be pre-cyber-hijack attack propaganda, the Government Accountability Officer reported on April 14, 2015, that newer aircraft are vulnerable to hacking. A day later on April 15, 2015, Russia Today published a report entitled “Hijack Hack: Modern Planes Vulnerable to Remote Midair Takeover” which was designed to further sell the notion that airliners can now be hijacked by hackers. Roughly a week later on April 26, 2015, it was reported that an iPad glitch grounded two dozen American Airlines flights in America. The grounding was likely executed by the CIA in order to rig the planes with an electronic device and/or explosives which can be activated at a later date in order to bring the fleet of planes down simultaneously in the first-ever cyber-hijacking. Less than 2-weeks later on May 9, 2015, it was reported that an A400M Airbus cargo plane crashed near the Seville airport in Spain. According to follow-up report dated May 20, 2015, the Airbus A400M crash was linked to faulty software that had been installed. The Airbus A400M was evidently crashed by the CIA in order to set the precedent for a software-related airliner disaster. Post cyber-hijack attack, the May 2015 crash of the Airbus A400M will likely be touted as the first-ever cyber-hijack. Less than a week later on May 15, 2015, Wired magazine published a report entitled “Feds Say That Banned Researcher Commandeered a Plane”, further selling the notion that hackers could cyber-hijack commercial airliner just prior to it actually transpiring in reality. Lastly, three days later on May 18, 2015, Fox News published a report entitled “FBI Affidavit Claims Security Expert Admitted to Briefly Hacking Flight Controls”, confirming, albeit in a de facto manner, that the future cyber-hijack of commercial airliners will be executed by so-called “security experts” at the behest of the Swiss CIA.

1.2: Airports Cyber-Attack
Although a commercial airplane-related cyber-hijack is theoretically possible, it’s far more likely that a future cyber-attack will target airports, namely their software. This will create a global travel nightmare as all flights will be grounded until the hack is righted. Considering the software will be compromised, it could take weeks if not months for planes to get back in the air.

nyse1

1.3: Financial System Cyber-Attack
A preview of financial related cyber-terror occurred back on July 10, 2014, when it was reported that Norwegian banks suffered the largest-ever DDoS attack in their history, an act which the state-sponsored terror group known as Anonymous predictably took credit for. Roughly 2-weeks later on July 25, 2014, the European Central Bank was allegedly hacked and personal data stolen. Roughly a month later on August 27, 2014, it was revealed that the FBI is now investigating a cyber-attack on JPMorgan. Roughly 3-weeks later on September 17, 2014, members from Anonymous and an Occupy Wall Street group reportedly abolishes nearly $4 million in student loan debt on September 17, 2014, foreshadowing the notion of Anonymous vanishing millions into thin air. Roughly 3-weeks alter on October 3, 2014, the New York Times published a report entitled “Hackers’ Attack Cracked 10 Financial Firms in Major Assault”, further foreshadowing financial-related cyber-terror. Also on October 3, 2014, it was reported that the JP Morgan data breach affected 76 million households, a laughable notion considering that the population of the U.S. is only 300 million people. A few weeks later on October 20, 2014, U.S. officials warned 500 million financial records may have been hacked. The timely propaganda report was evidently published in order to show that financial-related cyber-terror is imminent just prior to an unprecedented attack on the U.S. financial system.

1.4: “Flash Crash” Cyber-Attack
Unable to stage a direct attack on U.S. stock market in the month of April, it now appears that the CIA in Switzerland will attempt to execute the attack another way—most likely via a staged power failure. This particular notion as foreshadowed on April 17, 2015, when Bloomberg screens went dark worldwide. Four days later on April 21, 2015, it was reported that a futures trader was charged for manipulating the stock market which contributed to the 2010 “Flash Crash”. Given the 5-year delay in his alleged indictment, it can be deduced that the patsy was only charged in order to foreshadow the “Flash Crash” just prior to another one transpiring in reality, most likely post-power failure.

NSAutah

1.5: NSA Data Center Cyber-Attack
Exactly when and where the impeding cyber-attacks will take place is not known, but they may target the NSA Data Center Utah in Bluffdale, Utah. An attack on the Utah Data Center will likely result in the collapse, malfunction and/or explosion of U.S.-related infrastructure on the west coast of America (e.g., the electoral grid, dams, oil, gas, nuclear, water and sewer facilities). The $1.5B data center is located at Camp Williams, Utah, just 25 miles (40 km) south of Salt Lake City.

1.6: Nuclear Reactor Cyber-Attack
In what appears to be pre-nuclear reactor terror programming, it was reported back on April 16, 2015, that hackers have “begun targeting nuclear power plants”. According a senior Israeli cyber security expert, hackers have begun targeting electric and nuclear power plants around the world, as well as other critical infrastructure sites in increasingly audacious attacks. In the event that nuclear reactors are hacked, the state-sponsored terror group Anonymous, China, Iran or North Korea will be scapegoated.

1.7: Power Grid Cyber-Attack

Unable to execute a North Korean EMP attack on the United States, it now appears that the CIA will stage an attack on America’s power grid. As depicted in the August 16, 2013, New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow”, American electricity companies have been drilling for EMP-related blackouts. More recently, on March 24, 2015, USA Today published a report entitled “Bracing for a Big Power Grid Attack: ‘One is Too Many’”, confirming, albeit in a de facto manner, that an attack on the power grid is imminent. Roughly 2-weeks later on April 6, 2015, it was reported that a U.S. court is mulling the release of a “secret government plan” to cut cell phone service, a scenario which would actually transpire in the wake of an EMP-related attack. Lastly, in what appears to be an ominous sign that the electrical grid is about to suffer an unprecedented attack, the Washington Examiner published a report on April 21, 2015, entitled “DOE Warns ‘Modern Life’ Threatened by Terror, Climate Threats to Electric Grid”. The headlines consummated the terms “Terror” and “Electrical Grid” which suggests that a state-sponsored cyber-terror attack on American’s electrical grid is imminent.

1.8: Blackout Terror Trending
Prior to a high-profile EMP/electricity-related terror attack, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced electricity-related terror is now at an all-time high which suggests that a state-sponsored terror EMP or electricity-related event is imminent.

Blackout Timeline (2014-2015):

1. November 2, 2014: Country-wide blackout in Bangladesh after power grid collapses.
2. December 2, 2014: Detroit goes dark after a massive power outage
3. December 15, 2014: Car knocks out power in 2 North Carolina counties
4. March 27, 2015: Major Power Outage in Amsterdam Halts Trains, Hits Flights
5. March 31, 2015: Nationwide blackout throws Turkey into chaos
7. April 7, 2015: Power loss hits Washington, DC: Government left in dark

grid2exfp

1.9: “GridEx II” Power Grid Drill
Considering that back on November 13-15, 2013, a massive power grid terror drill entitled “GridEx II” was executed on the East Coast of America, it’s nakedly apparent that the Swiss CIA is planning to turn the lights off in America for good. According to the August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”

1.10: Train-Related Cyber-Attack
In what appears to be pre-train cyber-attack propaganda, it was reported on April 24, 2015, that a timely rail signal upgrade “could be hacked to cause crashes”. In other words, the software was specifically installed so that a cyber-related attack could be launched by the CIA in Switzerland against commuter trains.

1.11: TV
Cyber-Attack
Back on April 8, 2015, a French TV network was allegedly hit by a “powerful cyberattack” which was scapegoated onto ISIS. A day later on April 9, 2015, the BBC was allegedly hacked by ISIS. According to reports, an “operational error” occurred, sparking fears during the interruption of the broadcast. Although only conjecture, it’s highly likely that both incidents were staged in order to set the precedent for another major TV-related cyber-attack, possibly during a prime-time sporting event.

1.12: Porn Cyber-Hijack

In the event that the live Chinese and ISIS cyber-hijack and nuke attacks are postponed, it’s highly likely that the CIA will attempt to stage a porn-related cyber-hijack of NBC’s television and internet broadcast of Super Bowl XLIX. This type of attack was first identified back on April 14th, 2013, when it was reported that a Belarusian music TV channel was hijacked and pornography was broadcast. According to reports, “BelMuzTV”, which is reportedly seen in public places like shopping malls and restaurants, began airing explicit pornographic images featuring full nudity and sexual intercourse which lasted for approximately 10 to 20 minutes. Consequently, thousands of people throughout the Belarusian capital of Minsk watched the broadcast and began to share their experience on various social networking sites. A rumor then was circulated that a “subversive operation” was executed by the channel’s studio engineer, who entered the control room, loaded the inappropriate content into rotation and then disappeared. Evidently, a redux of the aforementioned porn-related cyber-hijack is now in play for Super Bowl XLIX. Coincidentally, on January 30, 2015, it was reported that porn-based malware is now sweeping across Facebook. In the wake of the impending cyber-hijack, it will predictably be stated that the aforementioned malware infected the NBC studios which is also streaming the game live around the world. Also on January 30, 2015, it was reported that 19-year-old Kendra Sunderland is now facing jail time after allegedly filming a solo porn video in the Oregon State University library. The CIA spawned publicity stunt was designed to bring unprecedented media publicity to porn just prior to a staged porn attack during the Super Bowl. Less than 24-hours later on January 31, 2015, it was reported that the Vatican is now investigating two high-ranking priests in a child-porn case. Since the priests in question will never be prosecuted, it can be deduced that the charges are part of a publicity stunt to raise the profile of porn just prior to an unprecedented cyber-hijack. Lastly, in order to associate porn with sports prior to a cyber-hijack of the Super Bowl telecast, it was reported on January 31, 2015, that hockey fans heard mysterious sexual ecstasy-like moans during a live NHL broadcast of the Nashville Predators vs. St. Louis Blues game.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

cyber hijack

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, am currently in the process of applying for political asylum in Switzerland, which is coincidentally home to the CIA, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more publicity or credibility than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, consider this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may attempt to assassinate me Switzerland.

ISIS ENDGAME: How and Why the CIA in Switzerland Created ISIS as Cover for Nuclear and Biological Terror Attacks

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
June 17, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA in Switzerland is preparing to execute the first-ever cyber-hijack of commercial airliners. A future terror scenario in which one or more American and/or European airliners suddenly lose power and drop from the sky like flies is now an impending reality.

The unprecedented cyber-hijack attack may be executed by the Swiss CIA under to cover of NATO’s ‘Nobel Jump 2’ war game in Poland which is taking place until June 19, 2015. The impending attack will likely be scapegoated on Russia who just warned of a “new military confrontation” in Europe, something an unprovoked cyber-attack on civilian airliners would bring about.

The notion of a cyber-hijack of an airliner was first raised by the Daily Mail back on March 16, 2014, when they published a report entitled “Is Missing Malaysian Jet the World’s First Cyber Hijack?”. The report cited an anti-terror expert who said that a plane’s altitude, speed and direction could be hacked by ‘codes’ and that planes could be landed using remote control.

Roughly 8-months later on November 4, 2014, the software for a state-sponsored cyber-hijack of commercial airliners was evidently touted by Russia Today in a report entitled “Could Hackers Cyber-Hijack a Plane? UK Scientists Develop Tech to Fight Malware”. The software was likely built with a backdoor which specifically enables commercial airliners to be cyber-hijacked.

In what appears to be pre-cyber-hijack attack propaganda, the Government Accountability Officer reported on April 14, 2015, that newer aircraft are vulnerable to hacking. A day later on April 15, 2015, Russia Today published a report entitled “Hijack Hack: Modern Planes Vulnerable to Remote Midair Takeover” which was designed to further sell the notion that airliners can now be hijacked by hackers.

Roughly a week later on April 26, 2015, it was reported that an iPad glitch grounded two dozen American Airlines flights in America. The grounding was likely executed by the CIA in order to rig the planes with an electronic device and/or explosives which can be activated at a later date in order to bring the fleet of planes down simultaneously in the first-ever cyber-hijacking.

Less than 2-weeks later on May 9, 2015, it was reported that an A400M Airbus cargo plane crashed near the Seville airport in Spain. According to follow-up report dated May 20, 2015, the Airbus A400M crash was linked to faulty software that had been installed.

The Airbus A400M was evidently crashed by the CIA in order to set the precedent for a software-related airliner disaster. Post cyber-hijack attack, the May 2015 crash of the Airbus A400M will likely be touted as the first-ever cyber-hijack.

Less than a week later on May 15, 2015, Wired magazine published a report entitled “Feds Say That Banned Researcher Commandeered a Plane”, further selling the notion that hackers could cyber-hijack commercial airliner just prior to it actually transpiring in reality.

Lastly, three days later on May 18, 2015, Fox News published a report entitled “FBI Affidavit Claims Security Expert Admitted to Briefly Hacking Flight Controls”, confirming, albeit in a de facto manner, that the future cyber-hijack of commercial airliners will be executed by so-called “security experts” at the behest of the Swiss CIA.

Russian President Vladimir Putin

Russian President Vladimir Putin

Russian Cyber-Scapegoat
In the aftermath of unprecedented cyber-related terror attacks on Europe and/or the United States, the Swiss CIA will likely finger Russia. In order to create the narrative in the media that Russia is actively targeting America with cyber-related attacks, it was reported back on April 8, 2015, that Russia hacked the Obama White House. Roughly 2-weeks later on April 23, 2015, it was revealed that Russians hacked the Pentagon’s network, a fraudulent notion to be sure. Two days later on April 25, 2015, it was reported that Russian hackers read Obama’s unclassified emails. Roughly 3-weeks later on May 14, 2015, it was reported that Russian hackers are now targeting U.S. banks, an apparent preview of things to come. Less than 2-week later on May 27, 2015, it was reported that the IRS now believes that a recent cyberattack on its network originated in Russia. Lastly, less than 2-weeks later on June 9, 2015, TV5 Monde was reportedly attacked ‘by Russia-based hackers’, setting the precedent the impending attack. Needless to say, these reports, taken collectively, suggest that Russia will be scapegoated in the aftermath of an unprecedented cyber-terror attack targeting American and/or European aircraft, likely leading to a new Cold War.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

cyber hijack

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, am currently in the process of applying for political asylum in Switzerland, which is coincidentally home to the CIA, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more publicity or credibility than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland if it is indeed home to the CIA, consider this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may attempt to assassinate me Switzerland.

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
May 6, 2015
Truther.org

SWITZERLAND, Zurich — Unable to execute a cyber-terror attack during operation “Locked Shields 2015” on April 20-25, 2015, it now appears that the CIA in Switzerland will attempt to execute a wave of cyber and/or real world terror attacks during the 3 NATO military drills taking place in Europe on May 4-15, 2015.

In the event that cyber-related attacks are executed, airplanes, live sporting events on television, electrical/internet/phone grids, financial hubs, travel hubs, infrastructure, trains, and media-related entities are the most likely to suffer an attack.

While any one of the aforementioned targets could suffer a direct cyber-related attack, it’s also possible that the entire electric/internet grid could suffer a cyber-related attack. This would ultimately render the targets powerless, causing them to suffer an attack, albeit in a de facto manner.

Exactly what form said cyber-attacks will take is not known, but an alleged cyber-attack by Russia on American and/or European commercial airliners is the most likely terror scenario. In reality however, the CIA in Switzerland will execute the attack while blaming Russia and/or a former Russian state such as Estonia and/or Lithuania.

Interestingly, the BBC published a report on May 5, 2015, entitled “Destructive Computer Virus Uncovered”. The timely report stated in part that the new computer virus makes the machines it infects unusable. Consequently, any aircraft infected with said virus will simply shut off, dropping from the skies.

In order to sell the notion that cyber-criminals and hackers are out in force just prior to a wave of unprecedented cyber-related attacks, it was reported back on April 14, 2015, that gangs of hackers are causing cyber breaches to spike 23%.

In order to foreshadow the notion that the internet and/or power grid will collapse due to a cyber-related attack, a propaganda report was published by Russia Today on May 4, 2015, entitled “Internet Could Collapse by 2023, Researchers Warn”.

That same day, May 4, 2015, a Chinese man reportedly collapsed after a 14-day web binge. Needless to say, both reports consummated the terms “internet” and “collapse” just prior to a staged internet collapse by the CIA in Switzerland.

Russian Cyber-Scapegoat
In the aftermath of unprecedented cyber-related terror attacks, the CIA will likely finger Russia. In order to create the narrative in the media that Russia is actively targeting America with cyber-related attacks, it was reported on April 8, 2015, that Russia hacked the Obama White House. Roughly 2-weeks later on April 23, 2015, it was revealed that Russians hacked the Pentagon’s network, a fraudulent notion to be sure. Two days later on April 25, 2015, it was reported that Russian hackers read Obama’s unclassified emails. These recent reports, taken collectively, suggest that Russia will be blamed in the wake of unprecedented cyber-related attacks emanating from the 3 NATO military drills on May 4-15, 2015.

I. NATO TERROR DRILLS:

NATO-logo

1.1: DRILL I: Siil-2015 aka “Hedgehog” (Estonia)
According to reports, Estonia is holding a military drill entitled Siil-2015 or “Hedgehog”. The “largest-ever” military drill reportedly involves 13,000 military personnel, as well as volunteer member of the Estonian Defense League. Siil-2015, which is scheduled to last until May 15, 2015, reportedly involves military forces from Belgium, Estonia, Germany, Latvia, Lithuania, NATO, the Netherlands, Poland, the United Kingdom, and the United States

1.2: DRILL II: Zaibo Kirtis aka “Lightning Strike” (Lithuania)
According to reports, the Lithuanian Army is executing its largest ever national drill entitled Zaibo Kirtis or “Lightning Strike”. The drill, which reportedly involves over 3,000 troops, is focused on joint action by the army and civilian authorities against so-called hybrid threats combining both military and non-military methods of fighting. Lightning Strike will also be testing the country’s mobilization system and cyber security works, according to the Defense Ministry’s press release. Considering the name “Lightning Strike”, it’s highly likely that the drill is cover for cyber-related terror attacks on commercial airliners.

1.3: DRILL III: “Dynamic Mongoose” (Norway)
According to reports, Norway, Germany, Sweden and the United States are executing “Dynamic Mongoose”, annual NATO anti-submarine exercises. About 5,000 servicemen from 10 NATO countries are taking part in the drills codenamed Dynamic Mongoose. The NATO exercises will employ sub hunts, surface vessels, aircraft and a variety of radar and sonar technologies. The United States, Germany and Sweden are providing the submarines.

1.4: Terror Drill Members
It is imperative to note that military and/or civilians members from one or more of the following countries may be scapegoated for the impending cyber and/or real world-related terror attacks. In other words, the CIA in Switzerland is holding the plethora of drills so that they have a number or different countries and/or patsies to blame in the aftermath of the impending attacks.

Participating Members:

1. Belgium
2. Estonia
3. Germany
4. Latvia
5. Lithuania
6. NATO
7. Netherlands
8. Norway
9. Poland
10. Sweden
11. United Kingdom
12. United States

[Does not purport to be a complete list of participating countries]

I. TOP CYBER-ATTACK TARGETS:

2.1: Airplanes
In what appears to be pre-aerial cyber-attack propaganda, the Government Accountability Officer reported on April 14, 2015, that newer aircraft are vulnerable to hacking. A day later on April 15, 2015, Russia Today published a report entitled “Hijack Hack: Modern Planes Vulnerable to Remote Midair Takeover” which was designed to sell the notion that planes can be hijacked by hackers. Four days later on April 21, 2015, Fox News published a report entitled “Air Force Training Next Generation to Fight Cyberwarfare”, ultimately consummating the terms “Air Force” and “Cyberwar” just prior to an aerial-related cyber-attack. Five days later on April 26, 2015, it was reported that an iPad glitch grounded two dozen American Airlines flights in America. The grounding was likely executed by the CIA in order to rig the planes with an electronic device and/or explosives which can be activated at a later date in order to bring the fleet of planes down simultaneously. Post attack, hackers from Russia will likely be scapegoated.

2.2: Airports
Although a commercial airplane-related cyber-hijack is theoretically possible, it’s far more likely that a future cyber-attack will target airports, namely their software. This will create a global travel nightmare as all flights will be grounded until the hack is righted. Considering the software will be compromised, it could take weeks if not months for planes to get back in the air.

stock-crash

2.3: Financial System
A preview of financial related cyber-terror occurred back on July 10, 2014, when it was reported that Norwegian banks suffered the largest-ever DDoS attack in their history, an act which the state-sponsored terror group known as Anonymous predictably took credit for. Roughly 2-weeks later on July 25, 2014, the European Central Bank was allegedly hacked and personal data stolen. Roughly a month later on August 27, 2014, it was revealed that the FBI is now investigating a cyber-attack on JPMorgan. Roughly 3-weeks later on September 17, 2014, members from Anonymous and an Occupy Wall Street group reportedly abolishes nearly $4 million in student loan debt on September 17, 2014, foreshadowing the notion of Anonymous vanishing millions into thin air. Roughly 3-weeks alter on October 3, 2014, the New York Times published a report entitled “Hackers’ Attack Cracked 10 Financial Firms in Major Assault”, further foreshadowing financial-related cyber-terror. Also on October 3, 2014, it was reported that the JP Morgan data breach affected 76 million households, a laughable notion considering that the population of the U.S. is only 300 million people. A few weeks later on October 20, 2014, U.S. officials warned 500 million financial records may have been hacked. The timely propaganda report was evidently published in order to show that financial-related cyber-terror is imminent just prior to an unprecedented attack on the U.S. financial system.

“Flash Crash”
Unable to stage a direct attack on U.S. stock market in the month of April, it now appears that the CIA in Switzerland will attempt to execute the attack another way—most likely via a staged power failure. This particular notion as foreshadowed on April 17, 2015, when Bloomberg screens went dark worldwide. Four days later on April 21, 2015, it was reported that a futures trader was charged for manipulating the stock market which contributed to the 2010 “Flash Crash”. Given the 5-year delay in his alleged indictment, it can be deduced that the patsy was only charged in order to foreshadow the “Flash Crash” just prior to another one transpiring in reality, most likely post-power failure.

NSAutah

2.4: NSA Data Center
Exactly when and where the impeding cyber-attacks will take place is not known, but they may target the NSA Data Center Utah in Bluffdale, Utah. An attack on the Utah Data Center will likely result in the collapse, malfunction and/or explosion of U.S.-related infrastructure on the west coast of America (e.g., the electoral grid, dams, oil, gas, nuclear, water and sewer facilities). The $1.5B data center is located at Camp Williams, Utah, just 25 miles (40 km) south of Salt Lake City.

2.5: Nuclear Reactors
In what appears to be pre-nuclear reactor terror programming, it was reported back on April 16, 2015, that hackers have “begun targeting nuclear power plants”. According a senior Israeli cyber security expert, hackers have begun targeting electric and nuclear power plants around the world, as well as other critical infrastructure sites in increasingly audacious attacks. In the event that nuclear reactors are hacked, the state-sponsored terror group Anonymous, China, Iran or North Korea will be scapegoated.

2.6: Power Grid
Unable to execute a North Korean EMP attack on the United States, it now appears that the CIA will stage an attack on America’s power grid. As depicted in the August 16, 2013, New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow”, American electricity companies have been drilling for EMP-related blackouts. More recently, on March 24, 2015, USA Today published a report entitled “Bracing for a Big Power Grid Attack: ‘One is Too Many’”, confirming, albeit in a de facto manner, that an attack on the power grid is imminent. Roughly 2-weeks later on April 6, 2015, it was reported that a U.S. court is mulling the release of a “secret government plan” to cut cell phone service, a scenario which would actually transpire in the wake of an EMP-related attack. Lastly, in what appears to be an ominous sign that the electrical grid is about to suffer an unprecedented attack, the Washington Examiner published a report on April 21, 2015, entitled “DOE Warns ‘Modern Life’ Threatened by Terror, Climate Threats to Electric Grid”. The headlines consummated the terms “Terror” and “Electrical Grid” which suggests that a state-sponsored cyber-terror attack on American’s electrical grid is imminent.

Blackout Terror Trending
Prior to a high-profile EMP/electricity-related terror attack, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced electricity-related terror is now at an all-time high which suggests that a state-sponsored terror EMP or electricity-related event is imminent.

Blackout Timeline (2014-2015):

1. November 2, 2014: Country-wide blackout in Bangladesh after power grid collapses.
2. December 2, 2014: Detroit goes dark after a massive power outage
3. December 15, 2014: Car knocks out power in 2 North Carolina counties
4. March 27, 2015: Major Power Outage in Amsterdam Halts Trains, Hits Flights
5. March 31, 2015: Nationwide blackout throws Turkey into chaos
7. April 7, 2015: Power loss hits Washington, DC: Government left in dark

grid2exfp

“GridEx II” Power Grid Drill
Considering that back on November 13-15, 2013, a massive power grid terror drill entitled “GridEx II” was executed on the East Coast of America, it’s nakedly apparent that the Swiss CIA is planning to turn the lights off in America for good. According to the August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”

2.7: Trains
In what appears to be pre-train cyber-attack propaganda, it was reported on April 24, 2015, that a timely rail signal upgrade “could be hacked to cause crashes”. In other words, the software was specifically installed so that a cyber-related attack could be launched by the CIA in Switzerland against commuter trains.

2.8: TV

Back on April 8, 2015, a French TV network was allegedly hit by a “powerful cyberattack” which was scapegoated onto ISIS. A day later on April 9, 2015, the BBC was allegedly hacked by ISIS. According to reports, an “operational error” occurred, sparking fears during the interruption of the broadcast. Although only conjecture, it’s highly likely that both incidents were staged in order to set the precedent for another major TV-related cyber-attack, possibly during a prime-time sporting event.

Porn Cyber-Hijack

In the event that the live Chinese and ISIS cyber-hijack and nuke attacks are postponed, it’s highly likely that the CIA will attempt to stage a porn-related cyber-hijack of NBC’s television and internet broadcast of Super Bowl XLIX. This type of attack was first identified back on April 14th, 2013, when it was reported that a Belarusian music TV channel was hijacked and pornography was broadcast. According to reports, “BelMuzTV”, which is reportedly seen in public places like shopping malls and restaurants, began airing explicit pornographic images featuring full nudity and sexual intercourse which lasted for approximately 10 to 20 minutes. Consequently, thousands of people throughout the Belarusian capital of Minsk watched the broadcast and began to share their experience on various social networking sites. A rumor then was circulated that a “subversive operation” was executed by the channel’s studio engineer, who entered the control room, loaded the inappropriate content into rotation and then disappeared. Evidently, a redux of the aforementioned porn-related cyber-hijack is now in play for Super Bowl XLIX. Coincidentally, on January 30, 2015, it was reported that porn-based malware is now sweeping across Facebook. In the wake of the impending cyber-hijack, it will predictably be stated that the aforementioned malware infected the NBC studios which is also streaming the game live around the world. Also on January 30, 2015, it was reported that 19-year-old Kendra Sunderland is now facing jail time after allegedly filming a solo porn video in the Oregon State University library. The CIA spawned publicity stunt was designed to bring unprecedented media publicity to porn just prior to a staged porn attack during the Super Bowl. Less than 24-hours later on January 31, 2015, it was reported that the Vatican is now investigating two high-ranking priests in a child-porn case. Since the priests in question will never be prosecuted, it can be deduced that the charges are part of a publicity stunt to raise the profile of porn just prior to an unprecedented cyber-hijack. Lastly, in order to associate porn with sports prior to a cyber-hijack of the Super Bowl telecast, it was reported on January 31, 2015, that hockey fans heard mysterious sexual ecstasy-like moans during a live NHL broadcast of the Nashville Predators vs. St. Louis Blues game.

British-general-election

2.9: UK General Election
The CIA in Switzerland could also stage a wave of cyber-terror attacks just prior to, during, or right after the United Kingdom general election on Thursday, May 7, 2015. Exactly what type of UK election-related terror attacks are planned for May 7, 2015, is not known, but cyber-related attacks by the state-sponsored terror group Anonymous. Future Anonymous-related cyber-attacks could strike at the heart of Britain’s political system, causing a political rift between parties once seen during the Bush vs. Gore fiasco of 2000. The goal of cyber-attacks on targeting the United Kingdom general election is multifaceted for it would: a) cause a massive political distraction for David Cameron; b) demonize the Democratic system as flawed; and c) disparage the global reputation of the United Kingdom. Back on November 20, 2012, Salon published a report entitled “Did Anonymous Stop Rove from Stealing the Election?” According to the report, Anonymous claimed that it foiled Karl Rove’s attempt to steal the election in Florida, Virginia and Ohio by using the GOP’s ORCA system. The incident, which likely never transpired in reality, was evidently created in order to set the precedent for an Anonymous attack on upcoming elections. More recently on November 3, 2014, a report entitled “Anonymous Groups Dominated 2014 General Election” was published. Although the article was written in respect to “anonymous” campaign donors, the headline foreshadowed that “Anonymous” will have a major impact on upcoming general elections.

III. CIA TARGETING EUROPE:

3.1: Europe Vulnerable to Islamic Terror
In order to create plausible deniability for European government officials prior to an unprecedented Islamic terror attack in Europe, a number of reports have been published stating that Europe is vulnerable to Islamic terror. For example, on April 21, 2015, Fox News published a report entitled “Security Gaps Allow ISIS and Al Qaeda Supporters to Travel with Ease in Europe”, inferring that Islamic terror attacks in Europe are imminent. In order to issue a de facto warning that Islamic terror attacks are planned for Europe, it was reported on April 22, 2015, that Pentagon Chief Carter warned that Europe is “not doing enough” on defense, suggesting that an offensive terror attack is imminent. A day later on April 23, 2015, Fox News published a report entitled “EU’s Top Migration Official: ‘Europe is Declaring War on Smugglers’, confirming that a war is planned post smuggler-related terror attack. Lastly, on April 24, 2015, Breitbart published a report entitled “Admiral Warns: Potential for Islamist Raids on European Islands”, confirming once again, albeit in a de facto manner, that ISIS plans to execute terror raids in Europe.

3.2: CIA Exposed & Dangerous
Because the CIA has now been exposed in Switzerland, they are desperately trying to execute horrific terror attacks in Europe so that Switzerland has a timely motive to change their immigration laws, ultimately resulting in the immediate removal of all foreigners, myself included. The draconian change to Swiss immigration law will predictably result in my deportation and subsequent assassination, which is exactly why the Europe and the world in general is now being targeted by the CIA in Switzerland on an almost daily basis. This type of psychological terror operation was previously witnessed during the Lindt Café Hostage Crisis in Sydney, Australia (Lindt is the most famous Swiss chocolatier) Australia, as well as in the aftermath of the 2015 Copenhagen Shootings (the flag of Denmark is essentially the same as that of Switzerland).

Swiss CIA

3.3: Swiss CIA Targeting Europe
Back on January 4, 2015, Truther.org issued a terror warning entitled “Swiss CIA Plotting Wave of Terror Attacks in Europe—Spain #1 Target”. Although Spain was ultimately sparred, a wave of state-sponsored terror attacks ravaged Paris just three days later on January 7, 2015, killing 17 people. Needless to say, the same may transpire in the wake of the terror plot depicted herein, so beware. The impending attack in Europe comes on the heels of a foiled terror plot targeting Turkey (Dec 10), a foiled terror plot targeting Germany (Dec 23), a foiled terror plot targeting Italy (Dec 29), a foiled terror plot targeting Spain (Jan 4), another foiled terror plot targeting Spain (Jan 15), a foiled terror plot targeting the Chanel Tunnel (Jan 19), a foiled terror plot targeting the EU Parliament (Feb 10), a foiled terror plot targeting London (Feb 21), a foiled terror plot targeting French trains (Feb 24), a foiled terror plot targeting Paris’ Charles de Gaulle Airport (March 10), a foiled terror plot targeting BCC Church in Norway (March 14), a foiled terror plot targeting a EUFA match in Germany (March 17), a foiled terror plot targeting Europe’s power grid (March 20), a foiled terror plot targeting El Clasico in Spain (March 22),  a foiled terror plot targeting Buckingham Palace in England (March 25), a foiled terror plot targeting the Eiffel Tower (March 25), a foiled terror plot targeting German schools (March 31), a foiled terror plot targeting German nuclear reactors (April 9), a foiled terror plot targeting the London Underground (April 14), foiled terror plot targeting UEFA Champions League, a foiled terror plot targeting Denmark (April 23), a foiled terror attack targeting German trains (April 26), a foiled terror attack targeting the Pope and Vatican City (April 27), and a foiled terror attack targeting NHS hospitals in the UK (May 3).

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

NATO-logo

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, am currently in the process of applying for political asylum in Switzerland, which is coincidentally home to the CIA, none of the terror plots or so-called “natural disasters” I expose ultimately come to fruition. The Swiss CIA desperately does not want to afford me any more attention or credibility than they have to, lest they turn me into a modern-day prophet. They also do not want to provide another open-and-shut case as to why I deserve political asylum. That being said, there is a wealth of evidence, namely dead Special Forces (e.g., the Terrorgate Scandal), which tend to appear once a respective terror plot is foiled. In order to protect themselves against Truther.org exposing a terror plot which has gone beyond the point of no return (e.g., man-made asteroid attack), the CIA has staged electrical blackouts across Europe (e.g., 2015 Amsterdam Blackout, 2015 Turkey Blackout, etc.) which have set the precedent for a future blackout in Switzerland. Said blackout will only be executed by the CIA once an irreversible terror plot is exposed by Truther.org at the last minute. The blackout will serve as the cover for a direct attack on Truther.org by the CIA in Switzerland which was exposed for the first time in history on March 31, 2015.

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
April 22, 2015
Truther.org

SWITZERLAND, Zurich — From April 20-25, 2015, NATO (at the behest of the CIA in Switzerland) is executing a major “cyber defense” drill in Estonia. According to reports, “Locked Shields 2015” will employ 400 people from 16 countries, providing a plethora of patsies post cyber-attacks.

Considering that state-sponsored drills are generally cover for state-sponsored terror attacks, it’s highly likely that cyber-related terror attacks and hacks will commence sometime on April 20-25, 2015. The impending attacks will predictably be scapegoated onto Anonymous, China, North Korea, Iran or ISIS.

In order to sell the notion that cyber-criminals and hackers are out in force just prior to a wave of unprecedented cyber-related attacks, it was reported on April 14, 2015, that gangs of hackers are causing cyber breaches to spike 23%.

Exactly where the impending cyber-related attacks will transpire is not known, but they will most likely target live sporting events on television, electrical/internet/phone grids, financial hubs, travel hubs, infrastructure, and media-related entities.

Although any one of the aforementioned targets could suffer a direct cyber-related attack, it’s also possible that the entire electric/internet grid could suffer a cyber-related attack. This would render the targets powerless, causing them to suffer an attack, albeit in a de facto manner.

Top Cyber-Related Targets:

I. FINANCIAL (e.g., banks, stock markets, etc.)
II.
INFRASTRUCTURE (e.g., electrical/internet/phone grids, nuclear reactors power plants, etc.)
II.
TRAVEL (e.g., airplanes, airports, ports, train stations, etc.)
IV: TV (e.g., live sporting events, TV stations, news websites, etc.)

[Does NOT purport to be a complete list of prospective cyber-related targets]

I. FINANCIAL CYBER-ATTACK:

1.1: Financial “Flash Crash” Cyber-Attack
Unable to stage a direct attack on U.S. stock market in the month of April, it now appears that the CIA in Switzerland will attempt to execute the attack another way—most likely via a staged power failure. This particular notion as foreshadowed on April 17, 2015, when Bloomberg screens went dark worldwide. Four days later on April 21, 2015, it was reported that a futures trader was charged for manipulating the stock market which contributed to the 2010 “Flash Crash”. Given the 5-year delay in his alleged indictment, it can be deduced that the patsy was only charged in order to foreshadow the “Flash Crash” just prior to another one transpiring in reality, most likely post-power failure.

1.2: Financial Cyber-Attacks Trending
A preview of financial related cyber-terror occurred back on July 10, 2014, when it was reported that Norwegian banks suffered the largest-ever DDoS attack in their history, an act which the state-sponsored terror group known as Anonymous predictably took credit for. Roughly 2-weeks later on July 25, 2014, the European Central Bank was allegedly hacked and personal data stolen. Roughly a month later on August 27, 2014, it was revealed that the FBI is now investigating a cyber-attack on JPMorgan. Roughly 3-weeks later on September 17, 2014, members from Anonymous and an Occupy Wall Street group reportedly abolishes nearly $4 million in student loan debt on September 17, 2014, foreshadowing the notion of Anonymous vanishing millions into thin air. Roughly 3-weeks alter on October 3, 2014, the New York Times published a report entitled “Hackers’ Attack Cracked 10 Financial Firms in Major Assault”, further foreshadowing financial-related cyber-terror. Also on October 3, 2014, it was reported that the JP Morgan data breach affected 76 million households, a laughable notion considering that the population of the U.S. is only 300 million people. A few weeks later on October 20, 2014, U.S. officials warned 500 million financial records may have been hacked. The timely propaganda report was evidently published in order to show that financial-related cyber-terror is imminent just prior to an unprecedented attack on the U.S. financial system.

II. INFRASTRUCTURE CYBER-ATTACK:

NSAutah

2.1: NSA Data Center Attack
Exactly when and where the impeding cyber-attacks will take place is not known, but they may target the NSA Data Center Utah in Bluffdale, Utah. An attack on the Utah Data Center will likely result in the collapse, malfunction and/or explosion of U.S.-related infrastructure on the west coast of America (e.g., the electoral grid, dams, oil, gas, nuclear, water and sewer facilities). The $1.5B data center is located at Camp Williams, Utah, just 25 miles (40 km) south of Salt Lake City.

2.2: Nuclear Reactor Attack
In what appears to be pre-nuclear reactor terror programming, it was reported back on April 16, 2015, that hackers have “begun targeting nuclear power plants”. According a senior Israeli cyber security expert, hackers have begun targeting electric and nuclear power plants around the world, as well as other critical infrastructure sites in increasingly audacious attacks. In the event that nuclear reactors are hacked, the state-sponsored terror group Anonymous, China, Iran or North Korea will be scapegoated.

2.3: Power Grid Attack
Unable to execute a North Korean EMP attack on the United States, it now appears that the CIA will stage an attack on America’s power grid. As depicted in the August 16, 2013, New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow”, American electricity companies have been drilling for EMP-related blackouts. More recently, on March 24, 2015, USA Today published a report entitled “Bracing for a Big Power Grid Attack: ‘One is Too Many’”, confirming, albeit in a de facto manner, that an attack on the power grid is imminent. Roughly 2-weeks later on April 6, 2015, it was reported that a U.S. court is mulling the release of a “secret government plan” to cut cell phone service, a scenario which would actually transpire in the wake of an EMP-related attack. Lastly, in what appears to be an ominous sign that the electrical grid is about to suffer an unprecedented attack, the Washington Examiner published a report on April 21, 2015, entitled “DOE Warns ‘Modern Life’ Threatened by Terror, Climate Threats to Electric Grid”. The headlines consummated the terms “Terror” and “Electrical Grid” which suggests that a state-sponsored cyber-terror attack on American’s electrical grid is imminent.

2.4: Blackout Terror Trending
Prior to a high-profile EMP/electricity-related terror attack, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced electricity-related terror is now at an all-time high which suggests that a state-sponsored terror EMP or electricity-related event is imminent.

Blackout Timeline (2014-2015):

1. November 2, 2014: Country-wide blackout in Bangladesh after power grid collapses.
2. December 2, 2014: Detroit goes dark after a massive power outage
3. December 15, 2014: Car knocks out power in 2 North Carolina counties
4. March 27, 2015: Major Power Outage in Amsterdam Halts Trains, Hits Flights
5. March 31, 2015: Nationwide blackout throws Turkey into chaos
7. April 7, 2015: Power loss hits Washington, DC: Government left in dark

grid2exfp

2.5: “GridEx II” Power Grid Drill
Considering that back on November 13-15, 2013, a massive power grid terror drill entitled “GridEx II” was executed on the East Coast of America, it’s nakedly apparent that the Swiss CIA is planning to turn the lights off in America for good. According to the August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”

III. TRAVEL CYBER-ATTACK:

3.1: Airplane/Airport Cyber-Attack
In what appears to be pre-aerial cyber-attack propaganda, the Government Accountability Officer reported on April 14, 2015, that newer aircraft are vulnerable to hacking. A day later on April 15, 2015, Russia Today published a report entitled “Hijack Hack: Modern Planes Vunerable to Remote Midair Takeover” which further sold the notion that planes can be hijacked by hackers. Four days later on April 21, 2015, Fox News published a report entitled “Air Force Training Next Generation to Fight Cyberwarfare”, consummating the terms “Air Force” and “Cyberwar” just prior to an aerial-related cyber-attack. Although a commercial airplane-related cyber-hijack is theoretically possible, it’s far more likely that a future cyber-attack will target airports, namely their software. This will create a global travel nightmare as all flights will be grounded until the hack is righted. Considering the software will be compromised, it could take weeks if not months for planes to get back in the air.

IV. TV CYBER-ATTACK
:

4.1: TV Cyber-Attack
Back on April 8, 2015, a French TV network was allegedly hit by a “powerful cyberattack” which was scapegoated onto ISIS. A day later on April 9, 2015, the BBC was allegedly hacked by ISIS. According to reports, an “operational error” occurred, sparking fears during the interruption of the broadcast. Although only conjecture, it’s highly likely that both incidents were staged in order to set the precedent for another major TV-related cyber-attack, possibly during a prime-time sporting event.

4.2: Porn Cyber-Hijack

In the event that the live Chinese and ISIS cyber-hijack and nuke attacks are postponed, it’s highly likely that the CIA will attempt to stage a porn-related cyber-hijack of NBC’s television and internet broadcast of Super Bowl XLIX. This type of attack was first identified back on April 14th, 2013, when it was reported that a Belarusian music TV channel was hijacked and pornography was broadcast. According to reports, “BelMuzTV”, which is reportedly seen in public places like shopping malls and restaurants, began airing explicit pornographic images featuring full nudity and sexual intercourse which lasted for approximately 10 to 20 minutes. Consequently, thousands of people throughout the Belarusian capital of Minsk watched the broadcast and began to share their experience on various social networking sites. A rumor then was circulated that a “subversive operation” was executed by the channel’s studio engineer, who entered the control room, loaded the inappropriate content into rotation and then disappeared. Evidently, a redux of the aforementioned porn-related cyber-hijack is now in play for Super Bowl XLIX. Coincidentally, on January 30, 2015, it was reported that porn-based malware is now sweeping across Facebook. In the wake of the impending cyber-hijack, it will predictably be stated that the aforementioned malware infected the NBC studios which is also streaming the game live around the world. Also on January 30, 2015, it was reported that 19-year-old Kendra Sunderland is now facing jail time after allegedly filming a solo porn video in the Oregon State University library. The CIA spawned publicity stunt was designed to bring unprecedented media publicity to porn just prior to a staged porn attack during the Super Bowl. Less than 24-hours later on January 31, 2015, it was reported that the Vatican is now investigating two high-ranking priests in a child-porn case. Since the priests in question will never be prosecuted, it can be deduced that the charges are part of a publicity stunt to raise the profile of porn just prior to an unprecedented cyber-hijack. Lastly, in order to associate porn with sports prior to a cyber-hijack of the Super Bowl telecast, it was reported on January 31, 2015, that hockey fans heard mysterious sexual ecstasy-like moans during a live NHL broadcast of the Nashville Predators vs. St. Louis Blues game.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Chinese Drone Attack

Download & Forward PDF

David Chase Taylor
March 20, 2015
Truther.org

SWITZERLAND, Zurich — As originally depicted in the June 30, 2014, Truther.org report entitled “China Plans to Cyber-Hijack U.S. Drones for Attack on America”, the CIA in Switzerland (which is in command and control of all 206 counties) is plotting a surprise drone attack on the U.S., most likely using U.S. military drones which will be said were hijacked by the Chinese government.

It is imperative to note that once a full-scale drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will likely become the norm. This futuristic drone war scenario essentially allows the CIA to attack whomever and whatever they want—whenever they want.

The unprecedented Chinese surprise attack depicted herein could come in any combination of the following: a) cyber-attack; b) conventional nuclear attack; c) cyber-hijack and nuclear attack; d) EMP attack; and/or e) an aerial attack on the USS Ranger (CV-61) which is currently near San Diego.

The notion of a “ghost drone” (a drone which is no longer under the control of its original and intended operator) was ominously foreshadowed a CCTV report from March 10, 2015, entitled “Chinese Company Introduces Ghost Drone to U.S. Market”.

Roughly a week later on March 18, 2015, the notion that a cataclysmic shift in drone warfare was highlighted by the Wall Street Journal which published a shocking report entitled “The Coming Revolution of Drone Warfare”. According to the timely report, China is “developing lethal drone technologies”.

In order to sell the notion that China is capable of hacking the U.S. government, and thereby their drones, it was reported on March 13, 2015, that China has hacked “every major corporation” in U.S. The timely propaganda report was evidently published in order to program the American public that an unprecedented Chinese cyber-related attack is imminent.

The notion that the CIA is actively trying to trigger World War III between the U.S. and China has been exposed ad nauseam by Truther.org. To date, at least 8 different of Chinese “surprise” attack plots have been identified and exposed, the cyber-hijack of drones being the latest and most repetitive one.

In the wake of these various Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots.

Top Chinese Attack Locations
Although a Pearl Harbor-like surprise attack against the United Stated by China could theoretically transpire in any American city or U.S. military base, the following seven location are the most likely due to their name recognition and close proximity to the Pacific Ocean.

Potential Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Chinese EMP Nuke Drone Attack

Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

I. CHINESE CYBER-ATTACK:

u-s-government-warned-of-9-11-like-cyber-attack-67071d7042

1.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

1.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

1.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

II: CYBER-HIJACK DRONE ATTACK:

2.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

drone

2.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

2.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

2.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

2.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

2.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

III. CHINESE NUCLEAR ATTACK:

3.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

Live TV Nuke

3.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

IV. CHINESE EMP ATTACK:

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

V. CHINESE ATTACK ON USS RANGER:

635568588200921455-Ranger

5.1: Chinese Carrier Attack
In what appears to pre-Chinese aircraft carrier attack propaganda for an attack on the USS Ranger (CV-61) which is currently near San Diego, The Blaze published a report back on December 24, 2014, entitled “If China Attacks, This Is the Ship Taiwan Will Use to Sink Chinese Aircraft Carriers”. The headline consummated the terms “China”, “Attack”, and “Aircraft Carrier”, foreshadowing the attack depicted herein. In the event that the USS Ranger (CV-61) is attacked by China, a nuclear attack will likely follow via a nuclear missile launched by a Chinese submarine. Coincidentally, back on December 9, 2014, the International Business Times published a report entitled “Long-Range Nuclear Missiles Aboard China’s Stealth Submarines Can Reach US, Western Pacific And Beyond”, foreshadowing a West Coast nuclear attack by China. To date, at least 7 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, resulting in the deaths of over 60 Chinese officials who suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots. Based on previous ship-related false-flag terror plots exposed by Truther.org (e.g., the USS Bataan Terror Plot, the USS Mesa Verde Terror Plot, the USS George H. W. Bush Terror Plot, the USS Harry S. Truman Terror Plot, etc.), it’s highly likely that the USS Ranger will suffer a false-flag terror attack that will most likely lead to nuclear war with China.

VI: CHINESE ATTACK ON CALIFORNIA:

6.1: Chinese Attack on California
In order to make China’s drone attack on San Francisco be more explosive in nature, the CIA ordered three former U.S. Navy fleet oilers to be moved to Mare Island, just outside San Francisco Bay. Although the USS Hassayampa, the USS Kawishiwi, and the USS Ponchatoula were allegedly moved to the island for “cleaning”, it’s highly likely that they were actually filled with gasoline and/or explosives. That way, when they are struck with a drone missile, a massive explosion will erupt, creating a made-for-TV moment reminiscent of the December 7, 1941 Japanese attack on Pearl Harbor. California also has two nuclear reactors that may come under Chinese drone attack: The Diablo Canyon Power Plant located in San Luis Obispo County (just 231 miles from San Francisco), and the San Onofre Nuclear Generating Station in San Diego County. In the event that China is able to hijack U.S. drones, one or more of these nuclear reactors may be attacked, causing a Fukushima-like disaster in America. Interestingly, a similar nuclear reactor disaster if featured in the recent Hollywood propaganda film entitled “Godzilla” (2014), which also features an attack on San Francisco by an Asian-based monster.

Kaiju_Attack_SF_Aftermath_01

6.2: Golden Gate Bridge Attack
To make a Chinese attack on the U.S. even more psychologically terrorizing, a well-known landmark such as the Golden Gate Bridge in San Francisco must be destroyed in order to serve as life-long reminder of that horrific day (e.g., Twin Towers on 9/11). Back on February 23, 2012, it was reported that the Golden Gate Bridge will undergo a renovation project that will “take years to complete”. According to reports, the project involves the repainting of the two main suspension cables which are responsible for holding the bridge in place. Whether the lengthy “renovation” project has undermined the structural integrity of the bridge is not known, but the timely construction project may have provided the necessary cover for the installation of demolition explosives in and around the Golden Gate Bridge. Said explosives could be detonated at a later date via remote control in order to give the appearance of a successful Chinese attack on the bridge using drone missiles. In other words, the bridge would be demolished with shaped explosives while the government and media publicly blame China.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss