Archive for the ‘Cyber-Terror’ Category

Black Dart I

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, consider this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

JADE HELM 15: Swiss CIA Plotting ‘Robin Sage’ Redux, Attacks on Jade Helm Soldiers by ‘Operation Counter Jade Helm’, Domestic & ISIS Terror Attacks, Predator Drone Strikes, Suspension of 2016 US Presidential Election, Martial Law & Obama Dictatorship

WORLD WAR III: How and Why the Swiss CIA Will Trigger Nuclear War Between US-Led NATO & Russia

ISIS ENDGAME: How and Why the CIA in Switzerland Created ISIS as Cover for Nuclear and Biological Terror Attacks

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
July 28, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA in Switzerland) is preparing to execute a wave of drone-related cyber-hijack-attacks during “BLACK DART”, a military exercise currently taking place in California from July 27 until August 10, 2015.

The 2-week cyber-drone exercise, which is openly being funded by the U.S. government, will take place above Naval Air Station Point Mugu at Naval Base Ventura County, just outside Los Angeles, California, The exercise will reportedly test “tactics and technologies to combat hostile drones”. Translation: hostile drone attacks are likely now in play for the City of Angels.

According to reports, BLACK DART will feature “tests” of at least 55 drone-related computer systems which were shipped to Point Mugu at their own expense by an “assortment of military units, government agencies, private contractors and academic institutions”. The variety of audience members provides the CIA a number of patsies and black hat actors to scapegoat at a later date.

Considering that the phrase “private contractors” is code-word for state-sponsored corporations such as Blackwater, Halliburton and KBR, all of which have previously employed current of former Special Forces (i.e., professional terrorists), the drones and computers of said contractors, and those of their respective employees, could suffer an alleged “cyber-attack” during the exercise.

Aside from the 55 drones which will admittedly be operational during BLACK DART, it’s highly likely that drones stationed at numerous U.S. military bases across Southern California (see below) could also suffer a cyber-terror attack, possibly resulting in 9/11-style Kamikaze drone attacks and/or drone-related missile strikes on LA-based infrastructure, landmarks, skyscrapers and military installations.

The notion that terror may be planned for BLACK DART was foreshadowed by the New York Post from July 25, 2015, entitled “Military Exercise Black Dart to Tackle Nightmare Drone Scenario”. The nightmare scenario in question appears to be a state-sponsored cyber-attack and subsequent hijack of multiple drones during the exercise.

Exactly what type of drone-related attacks are planned BLACK DART is not known, but drone-related missile attacks, kamikaze attacks, and/or accidents or crashes that ultimately result in major wildfires or forest fires within the drought-stricken state of California now appear to be in order. Mass evacuations would likely follow.

The aforementioned New York Post report on BLACK DART also stated that there have been “sightings of unidentified small drones flying over nuclear reactors in France”, and that “a drone carrying radioactive sand” landed on the roof of the Japanese Prime Minister. Consequently, drone-related attacks on California’s nuclear reactors are expected.

Disclosed in 2014, BLACK DART is no longer a secret war game. It is, however, only open to a select group of media personal, prompting the U.S. Department of Defense to state that it is “aware of this problem” (i.e., lack of access) and that they are “concerned about it” and now “working on it”. Consequently, a majority of the world’s media will likely be present in Los Angles during this year’s BLACK DART exercise.

According to U.S. Air Force Major Scott Gregg, the director of this 14th edition of BLACK DART, there will be roughly “1,000 people at Black Dart this year”, including but not limited to: “participants, observers and support”. Since no government agency can monitor 1,000 potential hackers simultaneously in real time, state-sponsored cyber-attacks are executed at some point during the event.

Since the U.S. Departments of Energy and the U.S. Department of Homeland Security will reportedly “send observers” (i.e., agents) to BLACK DART, hacks and attacks by state-sponsored “actors” are expected to transpire prior to the end of the exercise on August 9, 2015.

Lastly, the exercise will feature a small fleet of surrogate threat drones that will be airborne for 5-hours a day for a cumulative total of 14-days. During that time, 6 drone will reportedly fly over Naval Air Station Point Mugu while participants “test radars, lasers, missiles, guns and other technologies” that the U.S. military will “use to detect and kill or neutralize drones of all sizes”.

Black Dart II

BLACK DART Actors:

I. 55+ Drones (e.g., 400 hexacopter, Flanker, Scout II, Outlaw G2, etc.)
II. 1,000+ People (Public & Private)
III. Unknown Amount of U.S. Military Drones (e.g., Predators, Reapers, etc.).

[Does not purport to be a complete list of BLACK DART actors]

Cyber-Hijack Propaganda
Prior to a high-profile drone-related terror attack, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, cyber and drone-related terror is now at an all-time high which suggests that a state-sponsored drone-related attack is now imminent.

Drone-Cyber Hijack Attack Narrative:

1. July 6, 2015: Robotics company Cyberdyne introducing ‘service’ robots with artificial intelligence
2. July 22, 2015: US drone crashes in Iraq desert, locals pose for selfies
3. July 25, 2015: Military exercise Black Dart to tackle nightmare drone scenario
4. July 25, 2015: Spy-in-the-sky terror threat to William: Security alert over app that lets anyone track pilot
5. July 26, 2015: San Francisco police shoot man who attempted carjacking near airport
6. July 27, 2015: Plane crashes into yard in California killing pilot
7. July 27, 2015: China eliminates all restrictions on gaming consoles
8. July 27, 2015: Lynch: Thought of cyber-attack on US ‘keeps me … up at night’
9. July 27, 2015: Experts: “Racist” Killer Robots Could Conduct Ethnic Cleansing Campaigns

[Does not purport to be a complete list of drone-related cyber-attack headlines]

I. SKY-NET:

A drone designed and constructed by Concepcion University and the Chilean army is seen during a flight test at Concepcion city

1.1: MQ-1 Predator Drones Based in Southern California
In the event of cyber-related attacks on drones during BLACK DART, MQ-1 Predator drones based in Riverside and Lancaster, California may come under attack. Back in 1996, the U.S. Secretary of Defense selected the U.S. Air Force as the operating service for the RQ-1A Predator system, placing an undisclosed amount of MQ-1 Predator drones under the Air National Guard‘s 163d Reconnaissance Wing at March Air Reserve Base in Riverside, California. Some 16-years later on June 13, 2012, a Public Intelligence report revealed that there are now 64 drone bases on American soil, 12 of which house Predator drones. The notion that MQ-1 Predator drones are flying sorties over California was first reported on September 1, 2012, when it was revealed that Predator drones operated by the 163rd Reconnaissance Wing were flying above the Rim Fire at Yosemite National Park, likely sparking the blaze with multiple Hellfire missile strikes. In a Los Angeles Times report dated December 7, 2009, it was revealed that MQ-1 Predator drones are now being used by the U.S. Border Patrol to track illegal immigrants on the Mexico-California border. Said drone are reportedly based in Antelope Valley in northern Los Angeles County, roughly 35 miles (55 kilometers) from where Walker was assassinated in Valencia, California. Lastly, on January 28, 2014, it was reported that the U.S. Border Patrol grounded its drone fleet after a $12 million drone crashed off the coast of California, further confirming that drones are actively flying over California.

1.2: SKYNET Terminator Drone Program Activated
The SKYNET terminator scenario depicted in the film “Terminator 2” (1991) was a colossal psychological operation (PSYOP) because the real autonomous terminators hell bent on humanity’s destruction do not walk on land as depicted in the movie, but rather fly through the air in the form of autonomous drones. Although SKYNET was billed as the fictional name for the terminator program within the Terminator movie series, it is in fact the actual name of NATO’s satellite program which currently encircles the globe. According to Wikipedia, “SKYNET is a family of military satellites, now operated by Paradigm Secure Communications on behalf of the UK Ministry of Defense, which provide strategic communication services to the three branches of the British Armed Forces and to NATO forces engaged on coalition tasks.” Without the use of SKYNET satellites, which provide GPS-related logistics and communication for autonomous aerial vehicles (UAVs), the SKYNET terminator scenario would not be able to function. In other words, SKYNET is the electronic backbone of the terminator drone program. Although SKYNET was founded in 1969, the 2012 NATO Summit in Chicago marked the first time in history that the full-scale implementation of autonomous aerial terminators was publically disclosed.

skynet_wallpaper

1.3: SKYNET Operating Under Alias Astrium Services
The hi-tech computerized kill system known as SKYNET was originally exposed by Truther.org on May 20, 2012, in a report entitled “Chicago Terror Cover for NATO Implementation of SKYNET Terminator Program”. The report revealed for the first time in history that the SKYNET terminator program was not only real but was officially activated during the 2012 NATO Summit in Chicago. Roughly 5 months later, SKYNET inexplicably changed their name to Astrium Services, despite the fact that they had used the name SKYNET since 1969. The sudden attempt to rebrand the SKYNET satellite system appears to be a direct reaction to fact that the nightmare terminator program was exposed by Truther.org.

II. CHINESE DRONE ATTACK:

2.1: Chinese Cyber-Terror Trending
Prior to an Earth-changing cyber-terror attack that will likely spark World War III between the U.S. and China, it has to be well-established that China is actively hacking the U.S. This notion was confirmed on July 23, 2015, when Russia Today published a report entitled “US Won’t Publicly Blame China for Massive Government Hacks” which essentially confirmed as much. A day later on July 24, 2015, the New York Times published a report entitled “U.S. Fears Data Stolen by Chinese Hacker Could Identify Spies” which further implicated Chinese hackers for attacks just prior to a horrific attack. Lastly, a day later on July 25, 2015, Fox News published a report entitled “FBI: China the Most Predominant Economic Espionage Threat to US”, basically stating that China is the #1 threat to America just prior to a wave of drone-related attacks that spark a nuclear World War III.

drone

2.2: Chinese Cyber-Hijack Possible
Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

2.3: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

2.4: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

China Chinese Hack Cyber II

2.5: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

2.6: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

2.7: Book: “Sting of the Drone”
The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

ISS_Truss_structure

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, consider this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

JADE HELM 15: Swiss CIA Plotting ‘Robin Sage’ Redux, Attacks on Jade Helm Soldiers by ‘Operation Counter Jade Helm’, Domestic & ISIS Terror Attacks, Predator Drone Strikes, Suspension of 2016 US Presidential Election, Martial Law & Obama Dictatorship

WORLD WAR III: How and Why the Swiss CIA Will Trigger Nuclear War Between US-Led NATO & Russia

ISIS ENDGAME: How and Why the CIA in Switzerland Created ISIS as Cover for Nuclear and Biological Terror Attacks

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
July 23, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA in Switzerland is preparing to execute a Russian-based attack and/or hijack of the International Space Station (ISS) in order to spark a new Cold War between the United States and Russia.

Said Russian attack and/or hijack will likely come courtesy of the Russian rocket Soyuz which reportedly docked at the International Space Station on July 23, 2015. According to reports, an American, Japanese and Russian cosmonaut will join an American and two other Russian on the ISS.

A future scenario in which the 3 Russian cosmonauts take command and control of the ISS from the United States and her allies is likely now in play. Consequently, a made-for-TV hostage crisis involving the American and Japanese members of the ISS will likely follow.

Considering that Russian members of the Soyuz will “conduct an experiment, remote controlling robots on the [Earth] from the orbit” as part of the joint Russian-German project called “Contour-2”, cyber-related attacks may also be in order.

In order to create a timely reason for another Russian-based supply trip to the ISS, the SpaceX rocket to the ISS disintegrated only 2 minutes after launch on June 28, 2015. Although only conjecture, it’s highly likely that the rocket was sabotaged specifically so that a Russian crew could hijack the ISS

In what appears to be pre-space terror propaganda, DefenseOne published a report back on June 23, 2015, entitled “Pentagon Rushing to Open Space-War Center To Counter China, Russia”. The Space-War Center is likely the Hollywood studio where the ISS hostage crisis will play out.

In order to foreshadow the notion that the Russian government will hijack the ISS, it was reported back on July 2, 2015, that a Russian police officer was arrested for shoplifting in Virginia. Needless to say, the incident was staged or fabricated in order to set the precedent for the impending heist of the ISS.

In order to further foreshadow the notion that Russia will be “grabbing” or “hijacking” the International Space Station, the BBC published a report 2-weeks later on July 16, 2015, entitled “EU Warning Over Russia ‘Land Grab’ in South Ossetia Border Row”.

That same day, July 16, 2015, CNN published a report entitled “MH17 Report Blames Russian Missile for Shooting Down Plane”, raising the notion of an aerial-related attack by Russia just prior to an attack on the International Space Station.

Lastly, in order to show Russian aggression towards to the United States just prior to an attack on the ISS in which American and Japanese astronauts are killed, it was reported on July 22, 2015, that Russian bombers flew within 40 miles of the California coast.

PutinObama2013G20Summit640

Motives for a Russian Attack
In order to create the necessary narrative in the media prior to unprovoked Russian attack on the ISS, a number of timely motives have been created by the Swiss CIA. For example, on May 31, 2015, it was reported that Russian President Putin was shut out from the G7 Meeting for the second year running. Less than 2-weeks later on June 10, 2015, the United States reportedly overtook Russia as the world’s top oil and gas producer. Less than 24-hours later on June 11, 2015, it was reported that a Lithuanian army website hack hoax revealed “NATO plans to annex Russia’s Kaliningrad”. Roughly a week later on June 19, 2015, the EU Parliament voted to prolong economic sanctions against Crimea till June 2016. Needless to say, these reports, taken collectively, have given Russia at least 4 motives for an attack against NATO, one which may be nuclear in nature.

Russian Attacks
In order to set the precedent for an unprecedented attack by Russia, a narrative has been created in the media by the Swiss CIA that Russia is responsible for a wave of cyber-attacks against the United States, setting the precedent for a far greater attack, possibly in space. This particular narrative was first identified back on January 18, 2014, when it was reported that Russia created the ‘BlackPOS Malware’ to hack Target and Neiman Marcus. Roughly 3-months later on April 8, 2015, it was reported that Russia hacked the Obama White House. Roughly 2-weeks later on April 23, 2015, it was revealed that Russians hacked the Pentagon’s network. Two days later on April 25, 2015, it was reported that Russian hackers read Obama’s unclassified emails. Roughly 3-weeks later on May 14, 2015, it was reported that Russian hackers are now targeting U.S. banks. Less than 2-week later on May 27, 2015, it was reported that the IRS now believes that a recent cyberattack on its network originated in Russia. The notion of a Russia-based attack was foreshadowed by Russian President Putin on June 6, 2015, when he stated that “Russia would attack NATO only in mad person’s dream”. Lastly, on June 9, 2015, it was reported that the television station ‘TV5 Monde’ was attack by Russia-based hackers. In the event that Russia launches a strike against ISS, the world’s TV stations will likely be simultaneously hijacked by a cyber-attack so that the world will collectively witness the attack on live on TV.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

hackers-cyber-crime-anonymousv1

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, am currently in the process of applying for political asylum in Switzerland (which is coincidentally home to the CIA), the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, consider this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

JADE HELM 15: How & Why the Swiss CIA Created & Funded the War Game for Domestic & ISIS Terror Attacks, Civil War, FEMA Camps, Gun Confiscation, Martial Law, Suspension of the 2016 US Presidential Election & Obama Dictatorship

WORLD WAR III: How and Why the Swiss CIA Will Trigger Nuclear War Between US-Led NATO & Russia

ISIS ENDGAME: How and Why the CIA in Switzerland Created ISIS as Cover for Nuclear and Biological Terror Attacks

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
July 16, 2015
Truther.org

SWITZERLAND, ZurichBased on breaking news and events, it appears that the Obama administration (at the behest of the CIA in Switzerland) is preparing to execute a wave of cyber-related terror attack during JADE HELM 15 which was created as cover for domestic terror attacks.

In the event that cyber-related attacks are executed by the Swiss CIA, the state-sponsored terror group Anonymous will likely be blamed for attacks on airplanes, electrical/internet/phone grids, financial hubs, travel hubs, infrastructure, trains, and media-related entities.

That being said, banking-related entities as well as the phone, power and internet grids which will be used to communicate terror alerts during JADE HELM 15 will likely be targeted at some point during JADE HELM 15 which runs through September 15, 2015.

It is also possible that an Anonymous-related attack on Facebook, Twitter, Instagram or CIA-run propaganda outlets (e.g., BBC, CNN, FOX, NBC, etc.) could result in a fraudulent news story being published which cause a panic, resulting in a massive sell-off which would have global ramifications.

While any one of the aforementioned targets could suffer a direct cyber-attack, it’s also possible that the entire electric/internet grid of America could suffer a cyber-related attack. This would ultimately render all the listed targets powerless, causing them to suffer an attack/malfunction, albeit in a de facto manner.

Interestingly, the BBC published a report back on May 5, 2015, entitled “Destructive Computer Virus Uncovered”. The timely report stated in part that the new computer virus makes the machines it infects unusable. Consequently, any aircraft infected with said virus will simply shut off, dropping from the skies.

In order to foreshadow the notion that the internet and/or power grid will collapse due to a cyber-related attack, a propaganda report was published by Russia Today on May 4, 2015, entitled “Internet Could Collapse by 2023, Researchers Warn”.

Roughly 2-months later on July 3, 2015, USA Today published a report entitled “The Internet Is Officially Too Big”, foreshadowing that an internet collapse is imminent, most likely due to a state-sponsored cyber-attack on America’s power grid by Anonymous.

The notion that hackers have now mastered the internet, especially in respect to hacking, it was reported three days later on July 6, 2015, that a notorious hacking firm was hit with a large-scale hack. Needless to say, if the so-called experts are being hacked, no one is safe.

Two days later on July 8, 2015, a German missile battery reportedly received orders from unknown hackers, a report which suggests that U.S. military installations involved in JADE HELM 15 may come under attack by state-sponsored hackers.

That same day, July 8, 2015, it was also reported that trading at the NYSE resumed after a nearly 4-hour halt. According to reports, the CEO of the NYSE stated that the shutdown was “probably” a cyberattack. Said cyber-attack will likely be scapegoated onto Anonymous at a later date.

Also on July 8, 2015, it was reported that a Twitter tweet by Anonymous “predicting” the NYSE glitch
caused a stir, suggests that the state-sponsored terror group was responsible. Consequently, Anonymous will likely be blamed for structural-related cyber-terror attacks during JADE HELM 15.

That same day, July 8, 2015, United Airlines flights were grounded across the United States, for a second time. According to reports, the grounding appeared to be over an issue with faulty flight plans being uploaded to pilots, suggesting a cyber-related attack of some kind.

A day later on July 9, 2015, the OPM announced that more than 21 million Americans were affected by a second major data breach. Similar to the aforementioned attacks, the cyber-attack was executed in order to set the precedent for far greater domestic-related cyber-attacks during JADE HELM 15.

A day later on July 10, 2015, the International Business Times published a report entitled “How Big is Anonymous? Researcher Attempts to Quantify Hacktivist Network”, drawing unprecedented global media attention to the state-sponsored terror group just prior to a wave of attacks during JADE HELM 15.

In what appears to be pre-Anonymous cyber-terror attack programming, the Hill published a report on July 11, 2015, entitled “New Proposal Would Strike at Web’s Anonymity”. In the aftermath of cyber-related terror attacks, it’s highly likely that draconian legislation in respect to the internet will be passed.

A day later on July 12, 2015, traitorous Infowars published a report entitled “Leaked Documents Show FBI, DEA, & Army Can Control Your Computer”, providing a timely motive for Anonymous-related cyber-attacks during JADE HELM 15.

Lastly, that same day, July 12, 2015, Infowars published a second report entitled “Top Computer Security Expert Warns – David Cameron’s Plan to Ban Encryption Would “Destroy the Internet””, providing a timely secondary motive for cyber-related attacks during JADE HELM 15.

Anonymous Cyber-Hijack of U.S. Economy
Although an unprecedented cyber-terror attack on the U.S. economy could be blamed on China, the Guardians of Peace, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack, funneling the stolen money into allegedly untraceable Bitcoin accounts. Coincidentally, on October 2, 2014, it was revealed that an FBI informant admittedly organized Anonymous attacks on government websites in 30 countries, further confirming that the group known as Anonymous is in fact state-sponsored. The timely report was designed to set the precedent for an Anonymous attack on government-related websites such as the FED, NYSE, SEC, etc. An Anonymous-based cyber-attack will enable the progenitors of terror (i.e., the CIA) to steal billions if not trillions of dollars from the U.S. economy without a trace. Should a sovereign country be deemed responsible for the heist, defrauded investors worldwide would collectively demand compensation from that particular country, something the CIA does not want to deal with. In what appears to be pre-Wall Street cyber-attack logistics, it was revealed back on July 8, 2014, that Wall Street has now hired a former NSA chief to help create a “cyber war council”. Translation: Wall Street and the NSA are teaming up together to execute a Wall Street cyber-hijack which will likely disappear trillions of dollars, bankrupting the U.S. economy. In the wake of the attack, the NSA chief will likely be scapegoated for the attack.

Anonymous Stock Market Attack
In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely an alleged member of Anonymous.

TOP CYBER-TERROR TARGETS:

cyber hijack

1.1: Airplane Cyber-Attack
The notion of a cyber-hijack of an airliner was first raised by the Daily Mail back on March 16, 2014, when they published a report entitled “Is Missing Malaysian Jet the World’s First Cyber Hijack?”. The report cited an anti-terror expert who said that a plane’s altitude, speed and direction could be hacked by ‘codes’ and that planes could be landed using remote control. Roughly 8-months later on November 4, 2014, the software for a state-sponsored cyber-hijack of commercial airliners was evidently touted by Russia Today in a report entitled “Could Hackers Cyber-Hijack a Plane? UK Scientists Develop Tech to Fight Malware”. The software was likely built with a backdoor which specifically enables commercial airliners to be cyber-hijacked. In what appears to be pre-cyber-hijack attack propaganda, the Government Accountability Officer reported on April 14, 2015, that newer aircraft are vulnerable to hacking. A day later on April 15, 2015, Russia Today published a report entitled “Hijack Hack: Modern Planes Vulnerable to Remote Midair Takeover” which was designed to further sell the notion that airliners can now be hijacked by hackers. Roughly a week later on April 26, 2015, it was reported that an iPad glitch grounded two dozen American Airlines flights in America. The grounding was likely executed by the CIA in order to rig the planes with an electronic device and/or explosives which can be activated at a later date in order to bring the fleet of planes down simultaneously in the first-ever cyber-hijacking. Less than 2-weeks later on May 9, 2015, it was reported that an A400M Airbus cargo plane crashed near the Seville airport in Spain. According to follow-up report dated May 20, 2015, the Airbus A400M crash was linked to faulty software that had been installed. The Airbus A400M was evidently crashed by the CIA in order to set the precedent for a software-related airliner disaster. Post cyber-hijack attack, the May 2015 crash of the Airbus A400M will likely be touted as the first-ever cyber-hijack. Less than a week later on May 15, 2015, Wired magazine published a report entitled “Feds Say That Banned Researcher Commandeered a Plane”, further selling the notion that hackers could cyber-hijack commercial airliner just prior to it actually transpiring in reality. Lastly, three days later on May 18, 2015, Fox News published a report entitled “FBI Affidavit Claims Security Expert Admitted to Briefly Hacking Flight Controls”, confirming, albeit in a de facto manner, that the future cyber-hijack of commercial airliners will be executed by so-called “security experts” at the behest of the Swiss CIA.

1.2: Airports Cyber-Attack
Although a commercial airplane-related cyber-hijack is theoretically possible, it’s far more likely that a future cyber-attack will target airports, namely their software. This will create a global travel nightmare as all flights will be grounded until the hack is righted. Considering the software will be compromised, it could take weeks if not months for planes to get back in the air.

nyse1

1.3: Financial System Cyber-Attack
A preview of financial related cyber-terror occurred back on July 10, 2014, when it was reported that Norwegian banks suffered the largest-ever DDoS attack in their history, an act which the state-sponsored terror group known as Anonymous predictably took credit for. Roughly 2-weeks later on July 25, 2014, the European Central Bank was allegedly hacked and personal data stolen. Roughly a month later on August 27, 2014, it was revealed that the FBI is now investigating a cyber-attack on JPMorgan. Roughly 3-weeks later on September 17, 2014, members from Anonymous and an Occupy Wall Street group reportedly abolishes nearly $4 million in student loan debt on September 17, 2014, foreshadowing the notion of Anonymous vanishing millions into thin air. Roughly 3-weeks alter on October 3, 2014, the New York Times published a report entitled “Hackers’ Attack Cracked 10 Financial Firms in Major Assault”, further foreshadowing financial-related cyber-terror. Also on October 3, 2014, it was reported that the JP Morgan data breach affected 76 million households, a laughable notion considering that the population of the U.S. is only 300 million people. A few weeks later on October 20, 2014, U.S. officials warned 500 million financial records may have been hacked. The timely propaganda report was evidently published in order to show that financial-related cyber-terror is imminent just prior to an unprecedented attack on the U.S. financial system.

1.4: “Flash Crash” Cyber-Attack
Unable to stage a direct attack on U.S. stock market in the month of April, it now appears that the CIA in Switzerland will attempt to execute the attack another way—most likely via a staged power failure. This particular notion as foreshadowed on April 17, 2015, when Bloomberg screens went dark worldwide. Four days later on April 21, 2015, it was reported that a futures trader was charged for manipulating the stock market which contributed to the 2010 “Flash Crash”. Given the 5-year delay in his alleged indictment, it can be deduced that the patsy was only charged in order to foreshadow the “Flash Crash” just prior to another one transpiring in reality, most likely post-power failure.

NSAutah

1.5: NSA Data Center Cyber-Attack
Exactly when and where the impeding cyber-attacks will take place is not known, but they may target the NSA Data Center Utah in Bluffdale, Utah. An attack on the Utah Data Center will likely result in the collapse, malfunction and/or explosion of U.S.-related infrastructure on the west coast of America (e.g., the electoral grid, dams, oil, gas, nuclear, water and sewer facilities). The $1.5B data center is located at Camp Williams, Utah, just 25 miles (40 km) south of Salt Lake City.

1.6: Nuclear Reactor Cyber-Attack
In what appears to be pre-nuclear reactor terror programming, it was reported back on April 16, 2015, that hackers have “begun targeting nuclear power plants”. According a senior Israeli cyber security expert, hackers have begun targeting electric and nuclear power plants around the world, as well as other critical infrastructure sites in increasingly audacious attacks. In the event that nuclear reactors are hacked, the state-sponsored terror group Anonymous, China, Iran or North Korea will be scapegoated.

1.7: Power Grid Cyber-Attack

Unable to execute a North Korean EMP attack on the United States, it now appears that the CIA will stage an attack on America’s power grid. As depicted in the August 16, 2013, New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow”, American electricity companies have been drilling for EMP-related blackouts. More recently, on March 24, 2015, USA Today published a report entitled “Bracing for a Big Power Grid Attack: ‘One is Too Many’”, confirming, albeit in a de facto manner, that an attack on the power grid is imminent. Roughly 2-weeks later on April 6, 2015, it was reported that a U.S. court is mulling the release of a “secret government plan” to cut cell phone service, a scenario which would actually transpire in the wake of an EMP-related attack. Lastly, in what appears to be an ominous sign that the electrical grid is about to suffer an unprecedented attack, the Washington Examiner published a report on April 21, 2015, entitled “DOE Warns ‘Modern Life’ Threatened by Terror, Climate Threats to Electric Grid”. The headlines consummated the terms “Terror” and “Electrical Grid” which suggests that a state-sponsored cyber-terror attack on American’s electrical grid is imminent.

1.8: Blackout Terror Trending
Prior to a high-profile EMP/electricity-related terror attack, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced electricity-related terror is now at an all-time high which suggests that a state-sponsored terror EMP or electricity-related event is imminent.

Blackout Timeline (2014-2015):

1. November 2, 2014: Country-wide blackout in Bangladesh after power grid collapses.
2. December 2, 2014: Detroit goes dark after a massive power outage
3. December 15, 2014: Car knocks out power in 2 North Carolina counties
4. March 27, 2015: Major Power Outage in Amsterdam Halts Trains, Hits Flights
5. March 31, 2015: Nationwide blackout throws Turkey into chaos
7. April 7, 2015: Power loss hits Washington, DC: Government left in dark

grid2exfp

1.9: “GridEx II” Power Grid Drill
Considering that back on November 13-15, 2013, a massive power grid terror drill entitled “GridEx II” was executed on the East Coast of America, it’s nakedly apparent that the Swiss CIA is planning to turn the lights off in America for good. According to the August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”

1.10: Train-Related Cyber-Attack
In what appears to be pre-train cyber-attack propaganda, it was reported on April 24, 2015, that a timely rail signal upgrade “could be hacked to cause crashes”. In other words, the software was specifically installed so that a cyber-related attack could be launched by the CIA in Switzerland against commuter trains.

1.11: TV
Cyber-Attack
Back on April 8, 2015, a French TV network was allegedly hit by a “powerful cyberattack” which was scapegoated onto ISIS. A day later on April 9, 2015, the BBC was allegedly hacked by ISIS. According to reports, an “operational error” occurred, sparking fears during the interruption of the broadcast. Although only conjecture, it’s highly likely that both incidents were staged in order to set the precedent for another major TV-related cyber-attack, possibly during a prime-time sporting event.

1.12: Porn Cyber-Hijack

In the event that the live Chinese and ISIS cyber-hijack and nuke attacks are postponed, it’s highly likely that the CIA will attempt to stage a porn-related cyber-hijack of NBC’s television and internet broadcast of Super Bowl XLIX. This type of attack was first identified back on April 14th, 2013, when it was reported that a Belarusian music TV channel was hijacked and pornography was broadcast. According to reports, “BelMuzTV”, which is reportedly seen in public places like shopping malls and restaurants, began airing explicit pornographic images featuring full nudity and sexual intercourse which lasted for approximately 10 to 20 minutes. Consequently, thousands of people throughout the Belarusian capital of Minsk watched the broadcast and began to share their experience on various social networking sites. A rumor then was circulated that a “subversive operation” was executed by the channel’s studio engineer, who entered the control room, loaded the inappropriate content into rotation and then disappeared. Evidently, a redux of the aforementioned porn-related cyber-hijack is now in play for Super Bowl XLIX. Coincidentally, on January 30, 2015, it was reported that porn-based malware is now sweeping across Facebook. In the wake of the impending cyber-hijack, it will predictably be stated that the aforementioned malware infected the NBC studios which is also streaming the game live around the world. Also on January 30, 2015, it was reported that 19-year-old Kendra Sunderland is now facing jail time after allegedly filming a solo porn video in the Oregon State University library. The CIA spawned publicity stunt was designed to bring unprecedented media publicity to porn just prior to a staged porn attack during the Super Bowl. Less than 24-hours later on January 31, 2015, it was reported that the Vatican is now investigating two high-ranking priests in a child-porn case. Since the priests in question will never be prosecuted, it can be deduced that the charges are part of a publicity stunt to raise the profile of porn just prior to an unprecedented cyber-hijack. Lastly, in order to associate porn with sports prior to a cyber-hijack of the Super Bowl telecast, it was reported on January 31, 2015, that hockey fans heard mysterious sexual ecstasy-like moans during a live NHL broadcast of the Nashville Predators vs. St. Louis Blues game.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China Chinese Sub Nuke Nuclear

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, am currently in the process of applying for political asylum in Switzerland (which is coincidentally home to the CIA), the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, consider this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

WORLD WAR III: How and Why the Swiss CIA Will Trigger Nuclear War Between US-Led NATO & Russia

ISIS ENDGAME: How and Why the CIA in Switzerland Created ISIS as Cover for Nuclear and Biological Terror Attacks

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
July 10, 2015
Truther.org

SWITZERLAND, ZurichBased on breaking news and events, it appears the CIA in Switzerland is preparing to stage a surprise Chinese attack and/or nuclear detonation, most likely targeting the countries of Australia, Japan and/or the United States.

The impending Chinese attack will most likely involve one or more of the following: a) a cyber-attack on the Australia, Japanese or U.S. military; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Hawaii, Japan, and/or mainland United States.

That being said, the most likely Chinese attack scenario is a drone-related attack on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, etc.) followed by a full-scale nuclear attack on Las Vegas and/or Los Angeles.

In what appears to be the war games which will spark a nuclear war between China and the United States, the Australian, Japanese and U.S. military are now executing military drills dubbed “Talisman Saber” which began on July 7, 2015.

According to an official statement on the Talisman Sabre exercises, “Japan will join a major US-Australian military exercise for the first time in a sign of growing security links between the three countries as tensions fester over China’s island building in the South China Sea”.

Nevertheless, Japanese Defense Minister General Nakatani rejected any so-called theories the exercises were targeted at China. Only 40 Japanese officers and soldiers will participate in the war games which will reportedly involve roughly 30,000 U.S. and Australian troops.

Consequently, a Chinese attack on the aforementioned drills and/or the counties of Australia. Japan and/or the U.S. may now be forthcoming as the drills have provided a timely motive for an unprovoked attack by the Chinese government.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 11 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

In what appears to be pre-Chinese cyber-attack programming, it was reported back on July 8, 2015, that a German missile battery received orders from unknown hackers. In the aftermath of a Chinese cyber-attack on the U.S. military, the attack in Germany will likely be dubbed a beta-test by the Chinese.

The notion of a nuclear terror attack in Las Vegas was ominously foreshadowed on July 8, 2015, when it was revealed that the U.S. Air Force dropped a fake nuclear bomb in Nevada. The test was evidently executed in order to provide political cover for the Swiss CIA who is orchestrating the attack from Europe.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

In the event that a Chinese nuclear attack is launched against the United States, it will most likely emanate from a Chinese submarine in the Pacific Ocean. The notion of stealth subs was highlighted by Russia Today on July 6, 2015, in a report entitled “New Acoustic Detection System to Make Russian Navy’s 4th-Gen Stealth Subs Even Quieter”.

A day later on July 7, 2015, Subway suspends its relationship with Jared Fogle after an FBI raid on his home for child porn. Since Fogle will never serve a day in jail, it can be deducted that the incident was staged or fabricated in order to raise the notion of subs just prior to submarine-related attack by China.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

Top Chinese Attack Locations
Although a Pearl Harbor-like surprise attack against the United Stated by China could theoretically transpire in any American city or U.S. military base, the following seven location are the most likely due to their name recognition and close proximity to the Pacific Ocean.

Potential Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9. Japan

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Chinese EMP Nuke Drone Attack

Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

I. CHINESE CYBER-ATTACK:

u-s-government-warned-of-9-11-like-cyber-attack-67071d7042

1.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

1.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

1.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

II: CYBER-HIJACK DRONE ATTACK:

2.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

drone

2.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

2.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

2.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

2.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

2.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

III. CHINESE NUCLEAR ATTACK:

3.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

Live TV Nuke

3.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

IV. CHINESE EMP ATTACK:

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China Chinese Hack Cyber

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, am currently in the process of applying for political asylum in Switzerland (which is coincidentally home to the CIA), the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, consider this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

WORLD WAR III: How and Why the Swiss CIA Will Trigger Nuclear War Between US-Led NATO & Russia

ISIS ENDGAME: How and Why the CIA in Switzerland Created ISIS as Cover for Nuclear and Biological Terror Attacks

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
July 7, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA in Switzerland is preparing to stage a Chinese-based cyber-attack on the New York Stock Exchange (NYSE), the US Security and Exchange Commission (SEC), and/or the Federal Reserve Bank (FED). That being said, stock markets in Africa, Asia, and/or Europe may also suffer a Chinese-based cyber-attack.

The notion that China would attack the United States government was witnessed back on June 5, 2015, when it was reported that the U.S. now believes that China was behind a cybersecurity breach affecting at least 4-million federal employees.

Two days later on June 7, 2015, Fox News published a report entitled “Obama to be Aggressive in Cyberwar, after Purported China Hacking”, providing a timely motive for another revenge-like Chinese- cyber-attack against the U.S. government and/or its financial institutions.

Roughly 2-weeks later on June 20, 2015, the AP published a report entitled “Cybertheft Adds to US-China Tensions Ahead of Upcoming Talks”. The term “Cybertheft” was used specifically used to foreshadow a Chinese-based heist of the U.S. financial system in which trillions of dollars are stolen by the Swiss CIA.

In order to directly associate China with the stock market just prior to an attack, it was reported on July 4, 2015, that China has now moved to stabilize the stock markets and that initial offerings have been halted. Needless to say, in the wake of a Chinese-based cyber-attack on the stock market, all trading will be halted.

In order to provide a timely motive for a Chinese-based cyber-attack on America, 2016 U.S. Presidential candidate Hillary Clinton openly accused China of hacking the United States on July 5, 2015. Clinton’s timely comments put Chinese hacking in the international spotlight just prior to an unprecedented attack.

That same day, July 5, 2015, Yahoo published a report entitled “China Arrests Man for Suicide ‘Rumors’ Amid Stock Market Rout”. The timely report was designed to associate China with the stock market just prior to a cyber-attack that crashed the markets, resulting in numerous suicides as people go bankrupt.

A day later on July 6, 2015, the BBC published a report entitled “Panic, Invincibility and Blame in China’s Stock Market”. The timely report was designed to associate China with the stock market just prior to a cyber-related heist of the stock market that causes panic and is blamed on China.

Lastly, the notion of a major hack was witnessed a day later on July 6, 2015, when a notorious anti-hacking firm was allegedly hit with a large-scale hack. Who was behind the attack is not yet known, but it will most likely be scapegoated onto Chinese hackers.

China Chinese Hack Cyber II

Financial Cyber-Attacks Trending
A preview of financial related cyber-terror recently occurred on July 10, 2014, when it was reported that Norwegian banks suffered the largest-ever DDoS attack in their history, an act which the state-sponsored terror group known as Anonymous predictably took credit for. Because all 206 countries are under the command and control of the CIA, events tend to happen in other countries before transpire in America on a much larger scale. Roughly 2-weeks later on July 25, 2014, the European Central Bank was allegedly hacked and personal data stolen. Roughly a month later on August 27, 2014, it was revealed that the FBI is now investigating a cyber-attack on JPMorgan. Roughly 3-weeks later on September 17, 2014, members from Anonymous and an Occupy Wall Street group reportedly abolishes nearly $4 million in student loan debt on September 17, 2014, foreshadowing the notion of Anonymous vanishing millions into thin air. Roughly 3-weeks alter on October 3, 2014, the New York Times published a report entitled “Hackers’ Attack Cracked 10 Financial Firms in Major Assault”, further foreshadowing financial-related cyber-terror. Also on October 3, 2014, it was reported that the JP Morgan data breach affected 76 million households, a laughable notion considering that the population of the U.S. is only 300 million people. A few weeks later on October 20, 2014, U.S. officials warned 500 million financial records may have been hacked. The timely propaganda report was evidently published in order to show that financial-related cyber-terror is imminent just prior to an unprecedented attack on the U.S. financial system. Two months later on December 18, 2014, the U.S. House cybersecurity chairman warned that Wall Street may be the next cyber target of the state-sponsored Sony hackers. The warning confirms, albeit in a de facto manner, that an Asian-based cyber-terror attack on Wall Street is imminent. The notion that the New York Stock Exchange (NYSE) will suffer a massive state-sponsored cyber-related terror attack was foreshadowed 3-months later on March 13, 2015, when the owner of the NYSE warned of cyber risks to the market. Naturally, said owner will short the market, gaining millions post-attack. Two days later on March 15, 2015, it was reported that authorities are now closing in on the hackers who stole data from JPMorgan Chase. The timely report was designed to show that American financial institutions are vulnerable to hackers. Needless to say, these reports, taken collectively, suggest that bank-related cyber-terror attacks targeting the FED, NYSE, and/or the SEC are imminent.

Financial “Flash Crash” Cyber-Attack
It now appears that the CIA in Switzerland will attempt to execute the attack another way—most likely via a staged power failure. This particular notion as foreshadowed on April 17, 2015, when Bloomberg screens went dark worldwide. Four days later on April 21, 2015, it was reported that a futures trader was charged for manipulating the stock market which contributed to the 2010 “Flash Crash”. Given the 5-year delay in his alleged indictment, it can be deduced that the patsy was only charged in order to foreshadow the “Flash Crash” just prior to another one transpiring in reality, most likely post-power failure.

reign-malware-1000x520

Regin Malware
In what appears to be pre-financial cyber-attack hardware, on November 23, 2014. CNN published a report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure has been hijacked by the Regin malware and therefore any type of cyber-related attack on America’s financial infrastructure is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

Federal Security Breaches
If reports are to be believed, the U.S. federal government is highly susceptible to cyber-attacks, making the likelihood of a major financial cyber-hijack all the more believable. For example, on November 4, 2014, it was reported that a cyber-attack on a federal security contractor wasn’t noticed for months. Therefore, if the FED, NYSE or SEC is hacked in 2014, it won’t be noticed days or even weeks. This in essence allows the CIA to stage a financial-related attack whenever they want without any forewarning. Six days later on November 10, 2014, it was reported that federal firewalls are struggling against the increasing number of cyber-attacks. The timely report was designed to give the U.S. government plausible deniability in the wake of a financial-related terror attacks that bankrupt the U.S. economy. Also on November 10, 2014, the U.S, Postal Service was reportedly hacked, resulting in employee and customer information being compromised. Needless to say, the incident was designed to set the precedent for a far worse cyber-attack on the U.S. federal government, most likely the FED or SEC.

NYSE Cyber-Attack
The latest New York Stock Exchange (NYSE) cyber-terror plot appears to be a redux of two previously foiled terror plots as depicted in the March 20, 2014 Truther.org report entitled “Impending Wall Street Banking Cyber-Heist to Transfer Billions to Bitcoin”, and the April 15, 2014 Truther.org report entitled “Feds Planning High Frequency Trading Cyber-Attack via “Heartbleed” Bug”. In short, hackers will cause a “High Frequency Trading” sell-off (which they will short-sell), the profits of which will be deposited in untraceable Bitcoin accounts. In order to provide a motive for a Bitcoin-related cyber-terror attack, the IRS declared that Bitcoin was not an official currency on March 25, 2014. Roughly 3-months later on June 13, 2014, it was revealed that the FBI will auction off seized Bitcoins worth $18m on June 27, 2014, the impending date of the attack. In order to raise the profile of banks prior to a debilitating cyber-terror attack that will likely bankrupt millions of investors, Vice President Joe Biden stated on June 23, 2014 that “I don’t have a savings account”. Two days later on June 25, 2014, the U.S. Federal Reserve warned that banks face “tougher tests” ahead, an ominous sign that a so-called “test” (i.e., attack) is imminent. Although impossible to prove, it appears that Bitcoin was specifically created to be an untraceable depository for stolen funds from a Wall Street cyber-attack. In other words, the hackers play the role of Robin Hood by stealing from the rich (i.e., Wall Street) and giving to the poor (i.e., Bitcoin)—the only catch being that Robin Hood is invisible.

Banking Cyber-Attack War Games
Back on January 16, 2015, it was revealed that a so-called “cyber-attack war games” will be staged by US and UK at a future and undisclosed date. War games have a history of going “live” which is why they are staged in the first place. The first war game will reportedly involve the Bank of England and commercial banks, targeting the City of London and Wall Street. These war games will be followed by “further exercises to test critical national infrastructure”. In other words, the entire financial system of the West will likely suffer a massive cyber-related terror attack.

Bank Terror Drills
In what appears to be cover drills for the controlled demolition of the U.S. economy, it was reported on October 10, 2014, that the U.S. and the UK will execute a “big bank collapse” simulation. According to reports, officials will “get together in a war room next week to see if they can cope with any possible fall-out when the next big bank topples over”. The banking collapse drill will reportedly involve Federal Reserve Chair Janet Yellen and Bank of England Governor Mark Carney, and be hosted by the U.S. Federal Deposit Insurance Corporation (FDIC). The drill will involve the hypothetical failure of U.S. banks, most likely the Federal Reserve. Needless to say, key term such as “collapse” and “topples over” are designed to foreshadow that a controlled demolition of the U.S. economy is indeed planned. Roughly 2-weeks late on October 26, 2014, it was reported that four in five Eurozone banks pass European Central Bank health test. Interestedly, the very next day, October 27, 2014, it was reported that 25 European Union banks failed a “stress test” exposing a $31billion shortfall. The bi-polar reporting was evidently designed to insinuate that banks are on the verge stressed to the point of collapse.

Major-US-Financial-Institutions-to-Take-Part-in-Quantum-Dawn-2-Cyber-Exercise

“Quantum Dawn II″ Terror Drill

Prior to a major cyber-terror attack on the New York Stock Exchange (NYSE), one would expect there to be some stock-market related terror drills to prepare Wall Street insiders for the attack. Coincidentally, on June 13th, 2013, it was reported that Wall Street executed “Quantum Dawn 2”, a cyber-terror war-game apparently meant to give insiders an opportunity to make financial moves before the market crashes—for good. According to the report, Cyber Strategies oversaw a terror exercise which included Citigroup, Bank of America, the Department of Homeland Security, the Treasury Department, the Federal Reserve, the Securities and Exchange Commission, as well as 40 other firms. The drill, which featured a hacker, possibly from China, operating from a fake trading platform, prompted a response in which the participants facilitated a conference call to “figure out what was going on”. In other words, the drill simulated a real-life scenario in which insider firms received the “heads up” about an impending cyber-attack and subsequently shared this information accordingly so that their bank accounts and those of their clients would not be affected. The same sort of thing occurred just prior to 9/11 when “put options” or bets were taken out on United Airlines and American Airlines, the two airline companies involved in the attacks. According to the “9/11 Commission Report”, “some unusual trading did in fact occur”, however, it claimed that, “each such trade proved to have an innocuous explanation”.

“Quantum Dawn II” Fallout
In the October 23, 2013, Fox Business report entitled “‘White Hat’ Hackers Expose Flaws of U.S. Stock Market”, the details of the “Quantum Dawn 2”  cyber-attack exercise were revealed. According to the report, ethical “white hat” hackers intentionally “looking to expose the cyber vulnerabilities of U.S. equity markets”, were able to directly impact market performance by “forcing a mock market close”. According to the report, more than 50 entities and 500 people in the financial services sector participated in the cyber-attack which was executed by the Securities Industry and Financial Markets Association (SIFMA) on July 18, 2013. So called “ethical hackers” were told to give everything they had to try and cripple the U.S. stock market during the 6-hour exercise. “Quantum Dawn 2 demonstrated the industry’s resiliency when faced with serious cyber-attacks that aimed to steal money, crash systems and disrupt equity market trading,” SIFMA CEO Judd Gregg stated. According to Cedric Leighton, a former U.S. intelligence officer, “The more realistic the exercise the better prepared they’ll be if and when attacks from a cyber standpoint occur”.

DHS Banking Continuity
In the wake of a major U.S. bank or stock market, a global financial panic in respect to the U.S. dollar will likely ensure. According to a December 10, 2004, CRS Report for Congress entitled “Homeland Security: Banking and Financial: Infrastructure Continuity”, bank terror and financial collapse have been planned for accordingly. According to the report, “H.R. 2043 sought to address bank risks under terrorism” and the Terrorism Risk Insurance Act of 2002 (TRIA) “provides a federal backstop for insurers willing to provide terrorism insurance”, ultimately protecting insurance banks against “catastrophic payouts in case of terrorist attacks”.  In other words, if and when a bank related terror attacks occur resulting in financial panic, private banks will not have to foot the bill for their losses because the U.S. government has assumed all the risk and liability. This convenient set-up essentially guarantees that the U.S. government, not the banks, will go bankrupt in the aftermath of bank related terror attacks.

The “Contagion Effect”
In the aftermath of U.S. bank failures (a bi-product of an irreversible U.S. stock market crash), other banks will begin to panic, setting off a chain reaction of banking collapses around the world. The aforementioned CRS Report for Congress found that when one bank goes, the rest will follow:  “Financial institutions face two categories of emergencies that could impair their functioning. The first is directly financial: danger of a sudden drop in the value of financial assets, whether originating domestically or elsewhere in the world, such that a global financial crisis might follow. The second is operational: failure of physical support structures that underlie the financial system. Either could disrupt the nation’s ability to supply goods and services and alter the behavior of individuals in fear of the disruption (or fear of greater disruption). They could reduce the pace of economic activity, or at an extreme, cause an actual contraction of economic activity”. The report went on to state that “Collapse of one prominent entity could evoke a contagion effect, in which sound financial institutions become viewed as weak — today’s equivalents of a bank run, in which panicked customers withdraw funds from many entities, causing others to fail as well”.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Clinton CNN

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, am currently in the process of applying for political asylum in Switzerland (which is coincidentally home to the CIA), the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, consider this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

WORLD WAR III: How and Why the Swiss CIA Will Trigger Nuclear War Between US-Led NATO & Russia

ISIS ENDGAME: How and Why the CIA in Switzerland Created ISIS as Cover for Nuclear and Biological Terror Attacks

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
July 7, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA in Switzerland) is preparing to execute a terror attack on Hillary Clinton when she conducts her first national TV interview with CNN on July 7, 2015.

Exactly what type of attack is planned for the CNN interview is not known, but a cyber-related attack by China is the most likely terror scenario. That being said, a domestic terror attack in which Clinton and a number of CNN employees are held hostage in a made-for-TV terror siege is also a realistic possibility.

The notion of a TV-related cyber-terror attack was recently witnessed back on June 9, 2015, when it was reported that TV5 Monde was attacked “by Russia-based hackers”. The timely cyber-related TV attack has set the precedent for another attack, possibly targeting CNN.

The notion of a CNN-related attack was witnessed back on July 1, 2015, when it reported that ex-CNN anchor Lynne Russell’s husband killed by a robber in a motel shootout. Needless to say, the attack was staged or fabricated in order to set the precedent for a future CNN-related terror attack. .

In order to provide a timely motive for a Chinese-based cyber-attack on Clinton and CNN, it was reported on July 5, 2015, that Clinton openly accused China of hacking the United States. Since Clinton is the former U.S. Secretary of State under Obama, the attack will be construed as an attack on Obama.

In what appears to be a CIA-spawned publicity stunt designed to garner international media publicity to Clinton just prior to an attack, it was also reported on July 5, 2015, that the Clinton campaign roped off reporters at a New Hampshire parade, enraging the press.

The notion of a major hack was witnessed a day later on July 6, 2015, when a notorious anti-hacking firm was allegedly hit with a large-scale hack. Who was behind the attack is not yet known, but it will most likely be scapegoated onto Chinese hackers.

Lastly, back on June 18, 2015, it was reported that a CNN live shot was interrupted by a heckler: who screamed “white people are terrorists”. The incident was likely staged in order associate white terrorists with CNN just prior to a domestic terror attack on the CNN Center in Atlanta.

CNN Center

CNN Center
The notion that the CNN Center is a state-sponsored terror target was first revealed on November 2, 2012, when it was reported that a “caller” had mentioned that chemicals had been placed at the CNN Center in downtown Atlanta. According to reports, the “caller” wanted $15,000 and an airplane. Curiously, the report stated that “It wasn’t clear whether the caller made the demands from CNN or some other entity”. Although CNN was likely in on the hoax, a search of CNN headquarters and the attached Omni Hotel was executed to no avail. Two hours after the initial phone call, Atlanta streets were reopened. Atlanta police Capt. Adam Lee III then told reporters that the dispatchers who took the call described the “caller” as “depressed” and stated that the caller was wanted by the federal government for violating some type of federal law. To date, no recording of the alleged phone call have ever been released to the public which suggests that the event was staged to set the precedent for a CNN Center attack. In the event that CNN suffers a real-life terror scenario, the attack will most likely involve assault weapons, explosives, and/or some biological agent (e.g., acid, anthrax, smallpox, etc.) which will be used to target anchors, employees, law enforcement and the city of Atlanta in general.

Media Terror Trending
Prior to a high-profile media-related terror attack, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced media-related terror is now at an all-time high which suggests that a state-sponsored terror attack on a media-related event is imminent.

2015 Media Terror Timeline
:

1. January 26, 2015: Fox employee shoots himself outside Fox News Channel studios
2. February 4, 2015: Small plane crashes into Texas television station tower
3. February 11, 2015:
KTVU news crew attacked, robbed in Hayward
4. February 11, 2015: Suspect in shooting of San Diego sports anchor surrenders to police
5. February 11, 2015: CBS’ Bob Simon dies in NYC car crash
6. February 13, 2015:
New York Times journalist David Carr dies after collapsing in newsroom
7. February 23, 2015: Baltimore TV station evacuated after smoke seen coming from satellite dish
8. March 8, 2015: Ohio terror suspect speaks on TV about US Capitol bomb plot and threat to Obama
9. March 11, 2015: South Africa TV presenter Vuyo Mvoko mugged on camera
10. March 13, 2015: TV bombing over show about jewelry latest blow to free speech in India
11. March 13, 2015: Tunisia arrests comedian, TV host for ‘offending’ president
12. May 6, 2015: Manhole explodes by New York’s Penn Station; Al Jazeera America evacuated
13. May 8, 2015: Man suspected of killing TV news director, friend dies of self-inflicted gunshot wound
14. May 8, 2015: Al Jazeera Islamabad bureau chief put on terror list by US
15. May 17, 2015: RT crew attacked by Israeli police in Jerusalem
16. May 19, 2015: Turkey TV talent show: Woman contestant shot in head
17. June 9, 2015: TV5 Monde attack ‘by Russia-based hackers’
18. June 11, 2015: American who died fighting Islamic State inspired by TV
19. June 18, 2015: CNN Live Shot Interrupted By Heckler stating ‘White People Are Terrorists’
20. July 2, 2015: TV news crews robbed of cameras during live broadcasts

[Does not purport to be a complete list of media-related terror headlines]

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Russian President Vladimir Putin

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, am currently in the process of applying for political asylum in Switzerland, which is coincidentally home to the CIA, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more publicity or credibility than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, consider this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may attempt to assassinate me Switzerland.

WORLD WAR III: How and Why the Swiss CIA Will Trigger Nuclear War Between US-Led NATO & Russia

ISIS ENDGAME: How and Why the CIA in Switzerland Created ISIS as Cover for Nuclear and Biological Terror Attacks

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
July 1, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA in Switzerland will attempt to stage a July 2015 cyber-related terror attack on the New York Stock Exchange (NYSE), the US Security and Exchange Commission (SEC), the Federal Reserve Bank (FED), and/or the Nikkei 225 in Tokyo, Japan. That being said, other financial institutions around the world may also suffer an attack.

Although the impending cyber-attack/heist could theoretically be scapegoated onto ISIS or nation states such as Iran, North Korea or Syria, the country of China, Russia and/or the state-sponsored hacking group known as Anonymous are the most likely to be scapegoated for the unprecedented attack.

Back on December 18, 2014, the U.S. House cybersecurity chairman warned that Wall Street may be the next cyber target of the state-sponsored Sony hackers. The warning confirms, albeit in a de facto manner, that a full-scale cyber-related attack on Wall Street is imminent.

The notion that the New York Stock Exchange (NYSE) is about to suffer a massive cyber-related attack was further highlighted on March 13, 2015, when the owner of the NYSE warned of cyber risks to the market. Any future cyber-attack on the NYSE will have the seal of approval of its owner who stands to gain from such an attack.

In what appears to be pre-U.S. government cyber-attack programming, it was reported on March 13, 2015, that the entire U.S. State Department was shut down after a cyber-attack. Needless to say, if hackers can breach the State Department, they will have no trouble accessing Wall Street-related entities.

Two days later on March 15, 2015, it was reported that authorities are now closing in on the hackers who stole data from JPMorgan Chase. In the aftermath of a Wall Street-related cyber-heist, the aforementioned hackers will likely be scapegoated for the attack and linked to Anonymous.

Lastly, back on March 20, 2015, it was revealed that the retiring Dallas Federal Reserve Bank president stated that the “[stock] market is hyper overpriced” and warned of a “significant correction”. Said “correction” will likely come in the form of a state-sponsored cyber-terror attack in which trillions will be hijacked.

Russian Cyber-Scapegoat
In the aftermath of unprecedented cyber-related terror attacks on Europe and/or the United States, the Swiss CIA will likely finger Russia. In order to create the narrative in the media that Russia is actively targeting America with cyber-related attacks, it was reported back on April 8, 2015, that Russia hacked the Obama White House. Roughly 2-weeks later on April 23, 2015, it was revealed that Russians hacked the Pentagon’s network, a fraudulent notion to be sure. Two days later on April 25, 2015, it was reported that Russian hackers read Obama’s unclassified emails. Roughly 3-weeks later on May 14, 2015, it was reported that Russian hackers are now targeting U.S. banks, an apparent preview of things to come. Less than 2-week later on May 27, 2015, it was reported that the IRS now believes that a recent cyberattack on its network originated in Russia. Needless to say, these reports, taken collectively, suggest that Russia will be scapegoated in the aftermath of an unprecedented cyber-terror attack targeting the U.S. financial system, leading to a new Cold War.

Financial “Flash Crash” Cyber-Attack
It now appears that the CIA in Switzerland will attempt to execute the attack another way—most likely via a staged power failure. This particular notion as foreshadowed on April 17, 2015, when Bloomberg screens went dark worldwide. Four days later on April 21, 2015, it was reported that a futures trader was charged for manipulating the stock market which contributed to the 2010 “Flash Crash”. Given the 5-year delay in his alleged indictment, it can be deduced that the patsy was only charged in order to foreshadow the “Flash Crash” just prior to another one transpiring in reality, most likely post-power failure.

Nikkei 225 Cyber-Attack
In order to highlight the Nikkei 225, as well as inflate it so an unprecedented cyber-related attack is even more dramatic, it was reported on April 10, 2015, that the Nikkei hits the 20,000 level for first time in 15 years. In the aftermath of a Nikkei 225-related cyber-heist, the aforementioned hackers will likely be linked to China. In order to sell the notion that China is capable of hacking Japan’s stock exchange, it was reported on March 13, 2015, that China has hacked “every major corporation” in U.S. A few weeks later on March 31, 2015, it was reported that evidence now links China to GitHub cyber-attack. In order to provide a timely motive for a Chinese attack on Japan, it was reported on April 10, 2015, that China has rejected Obama’s criticism in its dispute with Japan over islands in the South China Sea. When China will take matters into their own hands and attack Japan is only a matter of time.

Banking Cyber-Attack War Games
Back on January 16, 2015, it was revealed that a so-called “cyber-attack war games” will be staged by US and UK at a future and undisclosed date. War games have a history of going “live” which is why they are staged in the first place. The first war game will reportedly involve the Bank of England and commercial banks, targeting the City of London and Wall Street. These war games will be followed by “further exercises to test critical national infrastructure”. In other words, the entire financial system of the West will likely suffer a massive cyber-related terror attack.

??????????????????????????????????

Anonymous Cyber-Hijack of U.S. Economy
Although an unprecedented cyber-terror attack on the U.S. economy could be blamed on China, the Guardians of Peace, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack, funneling the stolen money into allegedly untraceable Bitcoin accounts. Coincidentally, on October 2, 2014, it was revealed that an FBI informant admittedly organized Anonymous attacks on government websites in 30 countries, further confirming that the group known as Anonymous is in fact state-sponsored. The timely report was designed to set the precedent for an Anonymous attack on government-related websites such as the FED, NYSE, SEC, etc. An Anonymous-based cyber-attack will enable the progenitors of terror (i.e., the CIA) to steal billions if not trillions of dollars from the U.S. economy without a trace. Should a sovereign country be deemed responsible for the heist, defrauded investors worldwide would collectively demand compensation from that particular country, something the CIA does not want to deal with. In what appears to be pre-Wall Street cyber-attack logistics, it was revealed back on July 8, 2014, that Wall Street has now hired a former NSA chief to help create a “cyber war council”. Translation: Wall Street and the NSA are teaming up together to execute a Wall Street cyber-hijack which will likely disappear trillions of dollars, bankrupting the U.S. economy. In the wake of the attack, the NSA chief will likely be scapegoated for the attack.

Anonymous Stock Market Attack
In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely an alleged member of Anonymous.

reign-malware-1000x520

Regin Malware
In what appears to be pre-financial cyber-attack hardware, on November 23, 2014. CNN published a report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure has been hijacked by the Regin malware and therefore any type of cyber-related attack on America’s financial infrastructure is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

Federal Security Breaches
If reports are to be believed, the U.S. federal government is highly susceptible to cyber-attacks, making the likelihood of a major financial cyber-hijack all the more believable. For example, on November 4, 2014, it was reported that a cyber-attack on a federal security contractor wasn’t noticed for months. Therefore, if the FED, NYSE or SEC is hacked in 2014, it won’t be noticed days or even weeks. This in essence allows the CIA to stage a financial-related attack whenever they want without any forewarning. Six days later on November 10, 2014, it was reported that federal firewalls are struggling against the increasing number of cyber-attacks. The timely report was designed to give the U.S. government plausible deniability in the wake of a financial-related terror attacks that bankrupt the U.S. economy. Also on November 10, 2014, the U.S, Postal Service was reportedly hacked, resulting in employee and customer information being compromised. Needless to say, the incident was designed to set the precedent for a far worse cyber-attack on the U.S. federal government, most likely the FED or SEC.

Financial Cyber-Attacks Trending
A preview of financial related cyber-terror recently occurred on July 10, 2014, when it was reported that Norwegian banks suffered the largest-ever DDoS attack in their history, an act which the state-sponsored terror group known as Anonymous predictably took credit for. Because all 206 countries are under the command and control of the CIA, events tend to happen in other countries before transpire in America on a much larger scale. Roughly 2-weeks later on July 25, 2014, the European Central Bank was allegedly hacked and personal data stolen. Roughly a month later on August 27, 2014, it was revealed that the FBI is now investigating a cyber-attack on JPMorgan. Roughly 3-weeks later on September 17, 2014, members from Anonymous and an Occupy Wall Street group reportedly abolishes nearly $4 million in student loan debt on September 17, 2014, foreshadowing the notion of Anonymous vanishing millions into thin air. Roughly 3-weeks alter on October 3, 2014, the New York Times published a report entitled “Hackers’ Attack Cracked 10 Financial Firms in Major Assault”, further foreshadowing financial-related cyber-terror. Also on October 3, 2014, it was reported that the JP Morgan data breach affected 76 million households, a laughable notion considering that the population of the U.S. is only 300 million people. A few weeks later on October 20, 2014, U.S. officials warned 500 million financial records may have been hacked. The timely propaganda report was evidently published in order to show that financial-related cyber-terror is imminent just prior to an unprecedented attack on the U.S. financial system. Taken collectively, these timely reports have set the precedent for future bank-related cyber-terror attacks, most likely targeting the FED, NYSE, or SEC.

nyse1

NYSE Cyber-Attack
The latest New York Stock Exchange (NYSE) cyber-terror plot appears to be a redux of two previously foiled terror plots as depicted in the March 20, 2014 Truther.org report entitled “Impending Wall Street Banking Cyber-Heist to Transfer Billions to Bitcoin”, and the April 15, 2014 Truther.org report entitled “Feds Planning High Frequency Trading Cyber-Attack via “Heartbleed” Bug”. In short, hackers will cause a “High Frequency Trading” sell-off (which they will short-sell), the profits of which will be deposited in untraceable Bitcoin accounts. In order to provide a motive for a Bitcoin-related cyber-terror attack, the IRS declared that Bitcoin was not an official currency on March 25, 2014. Roughly 3-months later on June 13, 2014, it was revealed that the FBI will auction off seized Bitcoins worth $18m on June 27, 2014, the impending date of the attack. In order to raise the profile of banks prior to a debilitating cyber-terror attack that will likely bankrupt millions of investors, Vice President Joe Biden stated on June 23, 2014 that “I don’t have a savings account”. Two days later on June 25, 2014, the U.S. Federal Reserve warned that banks face “tougher tests” ahead, an ominous sign that a so-called “test” (i.e., attack) is imminent. Although impossible to prove, it appears that Bitcoin was specifically created to be an untraceable depository for stolen funds from a Wall Street cyber-attack. In other words, the hackers play the role of Robin Hood by stealing from the rich (i.e., Wall Street) and giving to the poor (i.e., Bitcoin)—the only catch being that Robin Hood is invisible.

Bank Terror Drills
In what appears to be cover drills for the controlled demolition of the U.S. economy, it was reported on October 10, 2014, that the U.S. and the UK will execute a “big bank collapse” simulation. According to reports, officials will “get together in a war room next week to see if they can cope with any possible fall-out when the next big bank topples over”. The banking collapse drill will reportedly involve Federal Reserve Chair Janet Yellen and Bank of England Governor Mark Carney, and be hosted by the U.S. Federal Deposit Insurance Corporation (FDIC). The drill will involve the hypothetical failure of U.S. banks, most likely the Federal Reserve. Needless to say, key term such as “collapse” and “topples over” are designed to foreshadow that a controlled demolition of the U.S. economy is indeed planned. Roughly 2-weeks late on October 26, 2014, it was reported that four in five Eurozone banks pass European Central Bank health test. Interestedly, the very next day, October 27, 2014, it was reported that 25 European Union banks failed a “stress test” exposing a $31billion shortfall. The bi-polar reporting was evidently designed to insinuate that banks are on the verge stressed to the point of collapse.

DHS Banking Continuity
In the wake of a major U.S. bank or stock market, a global financial panic in respect to the U.S. dollar will likely ensure. According to a December 10, 2004, CRS Report for Congress entitled “Homeland Security: Banking and Financial: Infrastructure Continuity”, bank terror and financial collapse have been planned for accordingly. According to the report, “H.R. 2043 sought to address bank risks under terrorism” and the Terrorism Risk Insurance Act of 2002 (TRIA) “provides a federal backstop for insurers willing to provide terrorism insurance”, ultimately protecting insurance banks against “catastrophic payouts in case of terrorist attacks”.  In other words, if and when a bank related terror attacks occur resulting in financial panic, private banks will not have to foot the bill for their losses because the U.S. government has assumed all the risk and liability. This convenient set-up essentially guarantees that the U.S. government, not the banks, will go bankrupt in the aftermath of bank related terror attacks.

The “Contagion Effect”
In the aftermath of U.S. bank failures (a bi-product of an irreversible U.S. stock market crash), other banks will begin to panic, setting off a chain reaction of banking collapses around the world. The aforementioned CRS Report for Congress found that when one bank goes, the rest will follow:  “Financial institutions face two categories of emergencies that could impair their functioning. The first is directly financial: danger of a sudden drop in the value of financial assets, whether originating domestically or elsewhere in the world, such that a global financial crisis might follow. The second is operational: failure of physical support structures that underlie the financial system. Either could disrupt the nation’s ability to supply goods and services and alter the behavior of individuals in fear of the disruption (or fear of greater disruption). They could reduce the pace of economic activity, or at an extreme, cause an actual contraction of economic activity”. The report went on to state that “Collapse of one prominent entity could evoke a contagion effect, in which sound financial institutions become viewed as weak — today’s equivalents of a bank run, in which panicked customers withdraw funds from many entities, causing others to fail as well”.

iJ4hgA_DrCZo

“Quantum Dawn II″ Terror Drill
Prior to a major cyber-terror attack on the New York Stock Exchange (NYSE), one would expect there to be some stock-market related terror drills to prepare Wall Street insiders for the attack. Coincidentally, on June 13th, 2013, it was reported that Wall Street executed “Quantum Dawn 2”, a cyber-terror war-game apparently meant to give insiders an opportunity to make financial moves before the market crashes—for good. According to the report, Cyber Strategies oversaw a terror exercise which included Citigroup, Bank of America, the Department of Homeland Security, the Treasury Department, the Federal Reserve, the Securities and Exchange Commission, as well as 40 other firms. The drill, which featured a hacker, possibly from China, operating from a fake trading platform, prompted a response in which the participants facilitated a conference call to “figure out what was going on”. In other words, the drill simulated a real-life scenario in which insider firms received the “heads up” about an impending cyber-attack and subsequently shared this information accordingly so that their bank accounts and those of their clients would not be affected. The same sort of thing occurred just prior to 9/11 when “put options” or bets were taken out on United Airlines and American Airlines, the two airline companies involved in the attacks. According to the “9/11 Commission Report”, “some unusual trading did in fact occur”, however, it claimed that, “each such trade proved to have an innocuous explanation”.

“Quantum Dawn II” Fallout
In the October 23, 2013, Fox Business report entitled “‘White Hat’ Hackers Expose Flaws of U.S. Stock Market”, the details of the “Quantum Dawn 2”  cyber-attack exercise were revealed. According to the report, ethical “white hat” hackers intentionally “looking to expose the cyber vulnerabilities of U.S. equity markets”, were able to directly impact market performance by “forcing a mock market close”. According to the report, more than 50 entities and 500 people in the financial services sector participated in the cyber-attack which was executed by the Securities Industry and Financial Markets Association (SIFMA) on July 18, 2013. So called “ethical hackers” were told to give everything they had to try and cripple the U.S. stock market during the 6-hour exercise. “Quantum Dawn 2 demonstrated the industry’s resiliency when faced with serious cyber-attacks that aimed to steal money, crash systems and disrupt equity market trading,” SIFMA CEO Judd Gregg stated. According to Cedric Leighton, a former U.S. intelligence officer, “The more realistic the exercise the better prepared they’ll be if and when attacks from a cyber standpoint occur”.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss