Archive for the ‘Cyber-Terror’ Category

o-ANONYMOUS-facebook

Download & Forward PDF

David Chase Taylor
March 23, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA in Switzerland will premeditatively attack and crash U.S. stock markets, dragging the U.S. dollar with it. The attacks will most likely target the New York Stock Exchange (NYSE), the US Security and Exchange Commission (SEC), and/or the Federal Reserve Bank (FED).

Although the impending Wall Street-related cyber-heist could theoretically be scapegoated onto ISIS or rogue nations states such as China, Iran, North Korea or Syria, the state-sponsored hacking group known as Anonymous will predictably be scapegoated for the attack.

Back on December 18, 2014, the U.S. House cybersecurity chairman warned that Wall Street may be the next cyber target of the state-sponsored Sony hackers. The warning confirms, albeit in a de facto manner, that a full-scale cyber-related attack on Wall Street is imminent.

The notion that the New York Stock Exchange (NYSE) is about to suffer a massive cyber-related attack was further highlighted on March 13, 2015, when the owner of the NYSE warned of cyber risks to the market. Any future cyber-attack on the NYSE will have the seal of approval of its owner who stands to gain from such an attack.

In what appears to be pre-U.S. government (e.g., FED, SEC, etc.) cyber-attack programming, it was reported on March 13, 2015, that the entire U.S. State Department was shut down after a cyber-attack. Needless to say, if hackers can breach the State Department, they will have no trouble accessing Wall Street-related entities.

Two days later on March 15, 2015, it was reported that authorities are now closing in on the hackers who stole data from JPMorgan Chase. In the aftermath of a Wall Street-related cyber-heist, the aforementioned hackers will likely be scapegoated for the attack and linked to Anonymous.

Lastly, on March 20, 2015, it was revealed that the retiring Dallas Federal Reserve Bank president stated that the “[stock] market is hyper overpriced” and warned of a “significant correction”. Said “correction” will likely come in the form of a state-sponsored cyber-terror attack in which trillions will be hijacked.

Banking Cyber-Attack War Games
Back on January 16, 2015, it was revealed that a so-called “cyber-attack war games” will be staged by US and UK at a future and undisclosed date. War games have a history of going “live” which is why they are staged in the first place. The first war game will reportedly involve the Bank of England and commercial banks, targeting the City of London and Wall Street. These war games will be followed by “further exercises to test critical national infrastructure”. In other words, the entire financial system of the West will likely suffer a massive cyber-related terror attack.

??????????????????????????????????

Anonymous Cyber-Hijack of U.S. Economy
Although an unprecedented cyber-terror attack on the U.S. economy could be blamed on China, the Guardians of Peace, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack, funneling the stolen money into allegedly untraceable Bitcoin accounts. Coincidentally, on October 2, 2014, it was revealed that an FBI informant admittedly organized Anonymous attacks on government websites in 30 countries, further confirming that the group known as Anonymous is in fact state-sponsored. The timely report was designed to set the precedent for an Anonymous attack on government-related websites such as the FED, NYSE, SEC, etc. An Anonymous-based cyber-attack will enable the progenitors of terror (i.e., the CIA) to steal billions if not trillions of dollars from the U.S. economy without a trace. Should a sovereign country be deemed responsible for the heist, defrauded investors worldwide would collectively demand compensation from that particular country, something the CIA does not want to deal with. In what appears to be pre-Wall Street cyber-attack logistics, it was revealed back on July 8, 2014, that Wall Street has now hired a former NSA chief to help create a “cyber war council”. Translation: Wall Street and the NSA are teaming up together to execute a Wall Street cyber-hijack which will likely disappear trillions of dollars, bankrupting the U.S. economy. In the wake of the attack, the NSA chief will likely be scapegoated for the attack.

Anonymous Stock Market Attack
In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely an alleged member of Anonymous.

reign-malware-1000x520

Regin Malware
In what appears to be pre-financial cyber-attack hardware, on November 23, 2014. CNN published a report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure has been hijacked by the Regin malware and therefore any type of cyber-related attack on America’s financial infrastructure is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

Federal Security Breaches
If reports are to be believed, the U.S. federal government is highly susceptible to cyber-attacks, making the likelihood of a major financial cyber-hijack all the more believable. For example, on November 4, 2014, it was reported that a cyber-attack on a federal security contractor wasn’t noticed for months. Therefore, if the FED, NYSE or SEC is hacked in 2014, it won’t be noticed days or even weeks. This in essence allows the CIA to stage a financial-related attack whenever they want without any forewarning. Six days later on November 10, 2014, it was reported that federal firewalls are struggling against the increasing number of cyber-attacks. The timely report was designed to give the U.S. government plausible deniability in the wake of a financial-related terror attacks that bankrupt the U.S. economy. Also on November 10, 2014, the U.S, Postal Service was reportedly hacked, resulting in employee and customer information being compromised. Needless to say, the incident was designed to set the precedent for a far worse cyber-attack on the U.S. federal government, most likely the FED or SEC.

Financial Cyber-Attacks Trending
A preview of financial related cyber-terror recently occurred on July 10, 2014, when it was reported that Norwegian banks suffered the largest-ever DDoS attack in their history, an act which the state-sponsored terror group known as Anonymous predictably took credit for. Because all 206 countries are under the command and control of the CIA, events tend to happen in other countries before transpire in America on a much larger scale. Roughly 2-weeks later on July 25, 2014, the European Central Bank was allegedly hacked and personal data stolen. Roughly a month later on August 27, 2014, it was revealed that the FBI is now investigating a cyber-attack on JPMorgan. Roughly 3-weeks later on September 17, 2014, members from Anonymous and an Occupy Wall Street group reportedly abolishes nearly $4 million in student loan debt on September 17, 2014, foreshadowing the notion of Anonymous vanishing millions into thin air. Roughly 3-weeks alter on October 3, 2014, the New York Times published a report entitled “Hackers’ Attack Cracked 10 Financial Firms in Major Assault”, further foreshadowing financial-related cyber-terror. Also on October 3, 2014, it was reported that the JP Morgan data breach affected 76 million households, a laughable notion considering that the population of the U.S. is only 300 million people. A few weeks later on October 20, 2014, U.S. officials warned 500 million financial records may have been hacked. The timely propaganda report was evidently published in order to show that financial-related cyber-terror is imminent just prior to an unprecedented attack on the U.S. financial system. Taken collectively, these timely reports have set the precedent for future bank-related cyber-terror attacks, most likely targeting the FED, NYSE, or SEC.

nyse1

NYSE Cyber-Attack
The latest New York Stock Exchange (NYSE) cyber-terror plot appears to be a redux of two previously foiled terror plots as depicted in the March 20, 2014 Truther.org report entitled “Impending Wall Street Banking Cyber-Heist to Transfer Billions to Bitcoin”, and the April 15, 2014 Truther.org report entitled “Feds Planning High Frequency Trading Cyber-Attack via “Heartbleed” Bug”. In short, hackers will cause a “High Frequency Trading” sell-off (which they will short-sell), the profits of which will be deposited in untraceable Bitcoin accounts. In order to provide a motive for a Bitcoin-related cyber-terror attack, the IRS declared that Bitcoin was not an official currency on March 25, 2014. Roughly 3-months later on June 13, 2014, it was revealed that the FBI will auction off seized Bitcoins worth $18m on June 27, 2014, the impending date of the attack. In order to raise the profile of banks prior to a debilitating cyber-terror attack that will likely bankrupt millions of investors, Vice President Joe Biden stated on June 23, 2014 that “I don’t have a savings account”. Two days later on June 25, 2014, the U.S. Federal Reserve warned that banks face “tougher tests” ahead, an ominous sign that a so-called “test” (i.e., attack) is imminent. Although impossible to prove, it appears that Bitcoin was specifically created to be an untraceable depository for stolen funds from a Wall Street cyber-attack. In other words, the hackers play the role of Robin Hood by stealing from the rich (i.e., Wall Street) and giving to the poor (i.e., Bitcoin)—the only catch being that Robin Hood is invisible.

Bank Terror Drills
In what appears to be cover drills for the controlled demolition of the U.S. economy, it was reported on October 10, 2014, that the U.S. and the UK will execute a “big bank collapse” simulation. According to reports, officials will “get together in a war room next week to see if they can cope with any possible fall-out when the next big bank topples over”. The banking collapse drill will reportedly involve Federal Reserve Chair Janet Yellen and Bank of England Governor Mark Carney, and be hosted by the U.S. Federal Deposit Insurance Corporation (FDIC). The drill will involve the hypothetical failure of U.S. banks, most likely the Federal Reserve. Needless to say, key term such as “collapse” and “topples over” are designed to foreshadow that a controlled demolition of the U.S. economy is indeed planned. Roughly 2-weeks late on October 26, 2014, it was reported that four in five Eurozone banks pass European Central Bank health test. Interestedly, the very next day, October 27, 2014, it was reported that 25 European Union banks failed a “stress test” exposing a $31billion shortfall. The bi-polar reporting was evidently designed to insinuate that banks are on the verge stressed to the point of collapse.

DHS Banking Continuity
In the wake of a major U.S. bank or stock market, a global financial panic in respect to the U.S. dollar will likely ensure. According to a December 10, 2004, CRS Report for Congress entitled “Homeland Security: Banking and Financial: Infrastructure Continuity”, bank terror and financial collapse have been planned for accordingly. According to the report, “H.R. 2043 sought to address bank risks under terrorism” and the Terrorism Risk Insurance Act of 2002 (TRIA) “provides a federal backstop for insurers willing to provide terrorism insurance”, ultimately protecting insurance banks against “catastrophic payouts in case of terrorist attacks”.  In other words, if and when a bank related terror attacks occur resulting in financial panic, private banks will not have to foot the bill for their losses because the U.S. government has assumed all the risk and liability. This convenient set-up essentially guarantees that the U.S. government, not the banks, will go bankrupt in the aftermath of bank related terror attacks.

The “Contagion Effect”
In the aftermath of U.S. bank failures (a bi-product of an irreversible U.S. stock market crash), other banks will begin to panic, setting off a chain reaction of banking collapses around the world. The aforementioned CRS Report for Congress found that when one bank goes, the rest will follow:  “Financial institutions face two categories of emergencies that could impair their functioning. The first is directly financial: danger of a sudden drop in the value of financial assets, whether originating domestically or elsewhere in the world, such that a global financial crisis might follow. The second is operational: failure of physical support structures that underlie the financial system. Either could disrupt the nation’s ability to supply goods and services and alter the behavior of individuals in fear of the disruption (or fear of greater disruption). They could reduce the pace of economic activity, or at an extreme, cause an actual contraction of economic activity”. The report went on to state that “Collapse of one prominent entity could evoke a contagion effect, in which sound financial institutions become viewed as weak — today’s equivalents of a bank run, in which panicked customers withdraw funds from many entities, causing others to fail as well”.

iJ4hgA_DrCZo

“Quantum Dawn II″ Terror Drill
Prior to a major cyber-terror attack on the New York Stock Exchange (NYSE), one would expect there to be some stock-market related terror drills to prepare Wall Street insiders for the attack. Coincidentally, on June 13th, 2013, it was reported that Wall Street executed “Quantum Dawn 2”, a cyber-terror war-game apparently meant to give insiders an opportunity to make financial moves before the market crashes—for good. According to the report, Cyber Strategies oversaw a terror exercise which included Citigroup, Bank of America, the Department of Homeland Security, the Treasury Department, the Federal Reserve, the Securities and Exchange Commission, as well as 40 other firms. The drill, which featured a hacker, possibly from China, operating from a fake trading platform, prompted a response in which the participants facilitated a conference call to “figure out what was going on”. In other words, the drill simulated a real-life scenario in which insider firms received the “heads up” about an impending cyber-attack and subsequently shared this information accordingly so that their bank accounts and those of their clients would not be affected. The same sort of thing occurred just prior to 9/11 when “put options” or bets were taken out on United Airlines and American Airlines, the two airline companies involved in the attacks. According to the “9/11 Commission Report”, “some unusual trading did in fact occur”, however, it claimed that, “each such trade proved to have an innocuous explanation”.

“Quantum Dawn II” Fallout
In the October 23, 2013, Fox Business report entitled “‘White Hat’ Hackers Expose Flaws of U.S. Stock Market”, the details of the “Quantum Dawn 2”  cyber-attack exercise were revealed. According to the report, ethical “white hat” hackers intentionally “looking to expose the cyber vulnerabilities of U.S. equity markets”, were able to directly impact market performance by “forcing a mock market close”. According to the report, more than 50 entities and 500 people in the financial services sector participated in the cyber-attack which was executed by the Securities Industry and Financial Markets Association (SIFMA) on July 18, 2013. So called “ethical hackers” were told to give everything they had to try and cripple the U.S. stock market during the 6-hour exercise. “Quantum Dawn 2 demonstrated the industry’s resiliency when faced with serious cyber-attacks that aimed to steal money, crash systems and disrupt equity market trading,” SIFMA CEO Judd Gregg stated. According to Cedric Leighton, a former U.S. intelligence officer, “The more realistic the exercise the better prepared they’ll be if and when attacks from a cyber standpoint occur”.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, as well as The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I Am Assassinated, Framed, Kidnapped, Held Hostage, Suicided or Killed via Terror Attack in Switzerland—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

 

Chinese Drone Attack

Download & Forward PDF

David Chase Taylor
March 20, 2015
Truther.org

SWITZERLAND, Zurich — As originally depicted in the June 30, 2014, Truther.org report entitled “China Plans to Cyber-Hijack U.S. Drones for Attack on America”, the CIA in Switzerland (which is in command and control of all 206 counties) is plotting a surprise drone attack on the U.S., most likely using U.S. military drones which will be said were hijacked by the Chinese government.

It is imperative to note that once a full-scale drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will likely become the norm. This futuristic drone war scenario essentially allows the CIA to attack whomever and whatever they want—whenever they want.

The unprecedented Chinese surprise attack depicted herein could come in any combination of the following: a) cyber-attack; b) conventional nuclear attack; c) cyber-hijack and nuclear attack; d) EMP attack; and/or e) an aerial attack on the USS Ranger (CV-61) which is currently near San Diego.

The notion of a “ghost drone” (a drone which is no longer under the control of its original and intended operator) was ominously foreshadowed a CCTV report from March 10, 2015, entitled “Chinese Company Introduces Ghost Drone to U.S. Market”.

Roughly a week later on March 18, 2015, the notion that a cataclysmic shift in drone warfare was highlighted by the Wall Street Journal which published a shocking report entitled “The Coming Revolution of Drone Warfare”. According to the timely report, China is “developing lethal drone technologies”.

In order to sell the notion that China is capable of hacking the U.S. government, and thereby their drones, it was reported on March 13, 2015, that China has hacked “every major corporation” in U.S. The timely propaganda report was evidently published in order to program the American public that an unprecedented Chinese cyber-related attack is imminent.

The notion that the CIA is actively trying to trigger World War III between the U.S. and China has been exposed ad nauseam by Truther.org. To date, at least 8 different of Chinese “surprise” attack plots have been identified and exposed, the cyber-hijack of drones being the latest and most repetitive one.

In the wake of these various Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots.

Top Chinese Attack Locations
Although a Pearl Harbor-like surprise attack against the United Stated by China could theoretically transpire in any American city or U.S. military base, the following seven location are the most likely due to their name recognition and close proximity to the Pacific Ocean.

Potential Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Chinese EMP Nuke Drone Attack

Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

I. CHINESE CYBER-ATTACK:

u-s-government-warned-of-9-11-like-cyber-attack-67071d7042

1.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

1.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

1.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

II: CYBER-HIJACK DRONE ATTACK:

2.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

drone

2.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

2.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

2.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

2.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

2.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

III. CHINESE NUCLEAR ATTACK:

3.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

Live TV Nuke

3.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

IV. CHINESE EMP ATTACK:

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

V. CHINESE ATTACK ON USS RANGER:

635568588200921455-Ranger

5.1: Chinese Carrier Attack
In what appears to pre-Chinese aircraft carrier attack propaganda for an attack on the USS Ranger (CV-61) which is currently near San Diego, The Blaze published a report back on December 24, 2014, entitled “If China Attacks, This Is the Ship Taiwan Will Use to Sink Chinese Aircraft Carriers”. The headline consummated the terms “China”, “Attack”, and “Aircraft Carrier”, foreshadowing the attack depicted herein. In the event that the USS Ranger (CV-61) is attacked by China, a nuclear attack will likely follow via a nuclear missile launched by a Chinese submarine. Coincidentally, back on December 9, 2014, the International Business Times published a report entitled “Long-Range Nuclear Missiles Aboard China’s Stealth Submarines Can Reach US, Western Pacific And Beyond”, foreshadowing a West Coast nuclear attack by China. To date, at least 7 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, resulting in the deaths of over 60 Chinese officials who suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the foiled war plots. Based on previous ship-related false-flag terror plots exposed by Truther.org (e.g., the USS Bataan Terror Plot, the USS Mesa Verde Terror Plot, the USS George H. W. Bush Terror Plot, the USS Harry S. Truman Terror Plot, etc.), it’s highly likely that the USS Ranger will suffer a false-flag terror attack that will most likely lead to nuclear war with China.

VI: CHINESE ATTACK ON CALIFORNIA:

6.1: Chinese Attack on California
In order to make China’s drone attack on San Francisco be more explosive in nature, the CIA ordered three former U.S. Navy fleet oilers to be moved to Mare Island, just outside San Francisco Bay. Although the USS Hassayampa, the USS Kawishiwi, and the USS Ponchatoula were allegedly moved to the island for “cleaning”, it’s highly likely that they were actually filled with gasoline and/or explosives. That way, when they are struck with a drone missile, a massive explosion will erupt, creating a made-for-TV moment reminiscent of the December 7, 1941 Japanese attack on Pearl Harbor. California also has two nuclear reactors that may come under Chinese drone attack: The Diablo Canyon Power Plant located in San Luis Obispo County (just 231 miles from San Francisco), and the San Onofre Nuclear Generating Station in San Diego County. In the event that China is able to hijack U.S. drones, one or more of these nuclear reactors may be attacked, causing a Fukushima-like disaster in America. Interestingly, a similar nuclear reactor disaster if featured in the recent Hollywood propaganda film entitled “Godzilla” (2014), which also features an attack on San Francisco by an Asian-based monster.

Kaiju_Attack_SF_Aftermath_01

6.2: Golden Gate Bridge Attack
To make a Chinese attack on the U.S. even more psychologically terrorizing, a well-known landmark such as the Golden Gate Bridge in San Francisco must be destroyed in order to serve as life-long reminder of that horrific day (e.g., Twin Towers on 9/11). Back on February 23, 2012, it was reported that the Golden Gate Bridge will undergo a renovation project that will “take years to complete”. According to reports, the project involves the repainting of the two main suspension cables which are responsible for holding the bridge in place. Whether the lengthy “renovation” project has undermined the structural integrity of the bridge is not known, but the timely construction project may have provided the necessary cover for the installation of demolition explosives in and around the Golden Gate Bridge. Said explosives could be detonated at a later date via remote control in order to give the appearance of a successful Chinese attack on the bridge using drone missiles. In other words, the bridge would be demolished with shaped explosives while the government and media publicly blame China.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

 

1407724604048

Download & Forward PDF

David Chase Taylor
March 20, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA in Switzerland will attempt to execute a cyber-related attack during the upcoming Supermoon Eclipse on March 20, 2015, which will render Europe in twilight-like conditions for approximately two hours.

The Supermoon Eclipse is an astronomical alignment where the Moon is sent on a trajectory between the Sun and the Earth, depriving us of light. The rather rare celestial event is expected around 8:40 PM (GMT) on March 20, 2015.

According to reports, British officials have stated that there is around a 50% chance the power will be lost throughout the morning hours. The European Network Transmission System Operators for Electricity has stated that “with the increase of installed photovoltaic energy generation, the risk of an incident could be serious without appropriate countermeasures”.

“Within 30 minutes the solar power production would decrease from 17.5 gigawatts to 6.2GW and then increase again up to 24.6GW. This means that within 30 minutes the system will have to adapt to a load change of -10GW to +15GW,” stated Patrick Graichen, executive director of Agora Energiewende.

Translation: the Swiss CIA is planning to stage a cyber-related attack on the power grid and internet sometime on March 20, 2015. Predictably, the Supermoon will be blamed for the so-called surge in electricity which will allegedly cause breakers, cables, circuits to suddenly fail.

In order to sell the notion that something race and abnormal will transpire on March 20, 2015, the Independent published a report on March 16, 2015, entitled “Solar Eclipse, Supermoon, Spring Equinox: Friday Will see Three Rare Celestial Events”. A fourth and shocking event (the loss of electricity) will be blamed on the previous three.

Less than 24-hours later on March 17, 2015, Yahoo New published a report entitled “Europe Braces for ‘Unprecedented’ Power Issues from Solar Eclipse”, further highlighting the alleged energy-related threat posed by the upcoming Supermoon on March 20, 2015.

According to the report, Europe’s power operators are “bracing for potential disruption from the solar eclipse” which is will “knock out almost all solar-generated electricity in an ‘unprecedented’ test for the network”. Translation: the European power grid will be cut on March 20, 2015.

“The risk of an incident cannot be completely ruled out,” the European Network of Transmission System Operators for Electricity (Entso-e) stated. “For the first time this [Supermoon] is expected to have a relevant impact on the secure operation of the European power system… [and will be] an unprecedented test for Europe’s electricity system“, warned Entso-e.

According to Konstantin Staschus, the secretary general of Entso-e, electrical operators have put in place “unprecedented contingency plans” to compensate for what is expected to be a “very sudden loss of power” from solar sources. The various networks have been coordinating their plans “for more than a year, with the creation of a specific task force” to look into the problem.

The report goes also states that the countries most likely to suffer a “brief plunge into darkness” (i.e., prolonged blackout) are France, Germany, Italy and Spain. Operators in Europe have put in place “a special procedure to avoid some households suffering a power cut”. Translation: power to households will be cut on March 20, 2015.

Lastly, in order to sell the notion that a loss of energy is possible due to a space-based phenomenon, it was reported on March 17, 2015, that a severe solar storm hit Earth on March 17, 2015. The report stated that “severe geomagnetic” (i.e., solar) storm hit the Earth, “sparking concerns about power disruptions”.

The report states that these “storms” are part of space weather when “energy that blasts off from the sun interacts with the Earth’s atmosphere and geomagnetic field”. Consequently, “the electric power grid, and the power to homes and business, can be disrupted by solar storms like this”.

While the CIA has been targeting the internet for some time now, back on December 21, 2014, I, David Chase Taylor, published a new book entitled “Greenland Theory: Apocalypse Now” (2014) which contains shocking revelations, especially in respect to Switzerland which is home to the CIA.

Therefore, the European-based blackout planned during the Supermoon of March 20, 2015, may be executed specifically in order to take down the internet in order to stop the spread of information in respect to both Greenland and Switzerland.

20130605_emp_attack_large

Electronic Grids Vulnerable to Space
In what appears to be state-of-the-art propaganda aimed at convincing humanity that the world’s electronic grids and systems are vulnerable to an array of space-based phenomenon, it was reported on April 25, 2014, that massive solar flares triggers temporary communications-related blackouts on parts of Earth. Roughly 2-months later on June 11, 2014, it was once again reported that solar flares disrupted communications on Earth. Lastly, on November 7, 2014, it was reported that a solar eclipse was threatening Europe’s solar grid, further confirming that electrical grids are the intended target. Based on this small sample of reports, it can be deduced that terrestrial communication grids (e.g., power grids, internet grids, etc.) will suffer a total blackouts due to some form of space-based phenomenon, possibly solar-related.

Killer Electrons
In what appears to be the #1 space-based phenomenon that will be scapegoated in the aftermath of a global blackout, it was reported on November 29, 2014, that scientists have discovered a “killer electron” shield just 200 miles above Earth. According to the report, a team of researchers led by scientists at the University of Colorado Boulder, have discovered a “Star Trek”-style shield located above Earth. According to their research, the shield blocks “killer electrons” from reaching Earth. In other words, Earth is being threatened and this shield protects Earth. Therefore, if and when this mythical shield is destroyed in a solar storm or due to some other unknown form of space-based phenomenon, the “killer electrons” will kill electricity on Earth, hence the name. Needless to say, a cheesy and disingenuous government and media narrative could not be produced.

Global Blackout Hoax
Aside from the plethora of space storm-related propaganda which has been disseminated by the government and media (see list below), CNN published an iReport on September 20, 2012, entitled “NASA Predicts Total Blackout on 23-25 Dec 2012 During Alignment of Universe”. The story was uploaded onto CNN’s iReport in order to further acclimate the public to the notion of a global blackout. Although the report was all allegedly published in 2012, all the social media response to the story came in 2014 which suggests that the story was purposely pre-dated. This confirms, albeit in a de facto manner that the plan to execute a global blackout is pulling out all the stops to pull off this hoax. After CNN’s blackout story went viral on the internet, television and social media, NASA confirmed on October 24, 2014, that no global blackout is predicted in December of 2014. By working in tandem, CNN and NASA were able to quickly and effectively spread the false notion of a global blackout by first claiming that it was true and then quickly stating it was a hoax.

NASA Hoax

6 Days of Darkness Hoax
Aside from the plethora of space storm-related propaganda which has been disseminated by the government and media (see list below), Huzzlers published a report on October 28, 2014, entitled “NASA Confirms Earth Will Experience 6 Days of Total Darkness in December 2014!”. After the hoax went viral on the internet, television and social media, NASA confirmed on October 28, 2014, via a Times of India report entitled “NASA’s ‘Six Days of Total Darkness in December 2014’ is a Hoax” that the story was not true. By working in tandem, state-sponsored web blogs along with NASA were able to quickly and effectively spread the false notion of 6 days of darkness by first claiming that it was true and then quickly stating it was a hoax. The fact that NASA addressed the outlandish claim to being with confirms that they were party to the propaganda.

Space Storm Terror Trending
Prior to a high-profile space-based phenomenon attack, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced space-based phenomenon terror is now at an all-time high which suggests that a state-sponsored space-based phenomenon attack is imminent.

Space Storm Propaganda Headlines:

1. March 31, 2014: Major Solar Flare Erupts from the Sun
2. April 25, 2014: Massive solar flare triggers temporary communications blackout on parts of Earth
3. May 7, 2014: NASA captures huge explosion on the surface of the sun
4. May 13, 2014: Rare meteor shower may turn into a storm next week
5. May 15, 2014: Do Solar Winds Whip Up Lightning Storms On Earth?
6. June 1, 2014: NASA captures close-up details of solar storm for first time
7. June 11, 2014: Solar Flares Disrupt Communications on Earth, Could Send Shockwaves
8. June 24, 2014: Weakening Of Earth’s Magnetic Field Revealed By ESA’s Swarm
9. July 9, 2014: NASA Voyager I struck by solar tsunami, now confirmed in interstellar space
10. July 11, 2014: Scientists ‘Have No Handle On’ Radio Bursts Coming From Deep Space
11. August 1, 2014: Killer solar superstorm could destroy Earth at any moment, scientists warn
12. September 11, 2014: ‘Giant magnetic explosion on sun’ racing to Earth
13. September 11, 2014: Solar storm heading for Earth
14. September 20, 2012: NASA predicts total blackout on 23-25 Dec 2012 during alignment of Universe
15. October 24, 2014: No, NASA Has Not Predicted A Global Blackout in December
16. October 24, 2014: Massive sunspot: 80,000 miles across, active sunspot energy could affect Earth
17. October 26, 2014: Jupiter-Sized Sunspot Largest for 24 Years
18. October 28, 2014: Nasa’s ‘six days of total darkness in December 2014’ is a hoax
19. October 28, 2014: NASA: Earth Will Experience 6 Days of Total Darkness in December 2014!
20. November 7, 2014: Solar eclipse threatens Europe solar grid, temp ‘may drop 6C in 30 minutes’
21. November 9, 2014: Mars hit by once-in-8-million years comet dust shower
22. November 29, 2014: Scientists Discover “Killer Electron” Shield 200 Miles Above Earth
23. December 12, 2014: DHS: 100 Million Americans Could Lose Power in Major Sun Storm
24. March 18, 2015: Severe solar storm hitting Earth

[Does not purport to be a complete list of space storm-related headlines]

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

 

stop_fukushima

Download & Forward PDF

David Chase Taylor
March 19, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA in Switzerland is preparing to execute a cyber-related or real world terror attack on one or more U.S. or European nuclear reactors, possibly using hijacked commercial airplanes or drones.

In the event that nuclear reactor attacks are cyber-related in nature, Anonymous (a state-sponsored terror group), China or North Korea will be scapegoated. In the event that 9/11-style aerial attacks are executed against nuclear reactors,  Al Qaeda, Iran, ISIS or Saudi Arabia will predictably be scapegoated.

In what appears to be pre-9/11-style attack terror programming, it was reported on March 17, 2015, that a United Airlines flight was turned back after unruly passenger yelled “jihad”. The staged incident may have been designed to invoke the attacks of September 11, 2001 just prior to 9/11-style attack on nuclear reactors.

The notion that terrorists want to attack nuclear reactors was recently witnessed back on July 9, 2014, when Hamas attempted to attack the Israeli nuclear reactor in Dimona. Two days later on July 11, 2014, a report entitled “Response to ‘Attack’ on Nuclear Reactor Is Praised” was published in response to U.S. government terror drills on nuclear reactors.

According to the timely report, “Other mock attacks have been conducted at a handful of the nation’s 62 nuclear power plants”. Evidently, the U.S. federal government is perfecting their respective nuclear terror attack scenarios. Exactly when and where the attacks will take place is not known, but practice makes perfect.

Back on August 20, 2014, it was revealed that hackers attacked Nuclear Regulatory Commission 3 times in 3 years, a report designed to show that cyber-terrorists are actively targeting nuclear reactors. Four days later on August 24, 2014, an Israeli spy drone was shot downed near Iran’s Natanz nuclear plant, foreshadowing the notion of aerial attack on nuclear reactors.

Four months later on December 18, 2014, the U.S. House cybersecurity chairman warned that the America’s electric grid may be the next target of the Sony Hackers, confirming, albeit in a de facto manner, that hackers may be scapegoated in a cyber-related attack on nuclear reactors which are obviously connected to the power grid.

Less than 24-hours later on December 19, 2014, Fox News published a report entitled “GAO Report Finds US Unprepared for Catastrophic Nuclear Disaster” which found that the “federal government is not fully prepared to handle a nuclear terrorist attack or other sort of large-scale catastrophe”. Therefore, in the wake of a nuclear reactor attack, the alleged “fallout” will predictably spread nationwide, rendering the United States radioactive.

Roughly 3-months later on March 17, 2015, it was reported that South Korea is blaming North Korea for a nuclear reactor cyberattack, ultimately setting the precedent for a North Korean cyber-attack on nuclear reactors within the United States.

That same day, March 17, 2015, it was also reported that a South African who previously attacked a nuclear power plant is now a hero to his government and fellow citizens. The timely report was evidently published in order to highlight nuclear reactor terror attacks just prior to another transpiring in reality.

Lastly, a day later on March 18, 2015, the BBC published a report entitled “Chernobyl: Containing the World’s Worst Nuclear Accident”. The timely propaganda report was evidently published in order to acclimate the public for another nuclear reactor-related “accident”, possibly the worst in history.

I. TOP NUCLEAR REACTOR TARGETS:

nucleareactor

1.1: French Nuclear Reactor Attack
In what appears to be pre-aerial nuclear reactor terror attack propaganda for France, it was reported back on January 28, 2015, that a UFO buzzed a French nuclear power plant. Roughly 2-weeks later on February 10, 2015, France reportedly tested kamikaze interceptor drones to protect its nuclear reactors. Later that month on February 23, 2015, it was revealed that 16 nuclear reactors in the UK are now vulnerable to terrorist drone attacks, further highlighting the notion that there will be nuclear reactor terror attacks in Europe.

1.2: Vermont Yankee Nuclear Reactor Attack
Back on December 30, 2014, it was revealed that the Vermont Yankee Nuclear Reactor is winding down operations. Although the report stated that the “nuclear plant stopped sending power to the New England electric grid”, the nuclear plant will reportedly prepare for a “30-year period during which time its radiation will cool”. Therefore, although the reactor will technically not be producing energy, it could still be attacked, causing a radiological disaster in the Boston area. Due to its respective title of “Vermont Yankee Nuclear Reactor”, the unprecedented attack would likely be dubbed the “Yankee Nuclear Attack” or “Yankee Nuclear Terror Attack”, associating the good name of America with a nuclear disaster for decades which is exactly why the plant is being targeted. Coincidentally, on December 9, 2014, it was revealed that a state-sponsored terror drill was executed at the Yankee Nuclear Reactor. The drill reportedly involved several suicide bombers who attacked the plant, resulting in a radiological release. According to reports, the U.S. Department of Homeland Security, the Red Cross and 140 volunteers learned how to cope with thousands of people fleeing the area in the wake of a nuclear emergency. Whether the timely nuclear reactor drill provided the necessary cover for the installation of demolition explosives within the Vermont Yankee Nuclear Reactor is not known, but it’s highly likely. Said explosives could be detonated at a future date in order to give the appearance of a coordinated terrorist attack, cyber or real-world.

1.3: Ohio Nuclear Reactor Attack
While a nuclear reactor terror attack could theoretically transpire in any U.S. state, it may take place in Ohio which has 5 nuclear reactors (i.e., Perry Nuclear Generating Station in North Perry, Ohio; Piqua Nuclear Generating Station in Springcreek Township, Ohio; Ohio State University in Columbus, Ohio; National Aeronautics and Space Administration in Sandusky, Ohio; and Davis-Besse Nuclear Power Station in Carroll Township, Ohio). Considering Johnny Manziel was drafted by the Cleveland Browns, NBA star LeBron James recently decided to return to Cleveland, and Ohio State University won the first-ever NCAA College Football Playoff (CFP), hundreds of millions of people around the world are now focused on the state of Ohio, making a future nuclear reactor terror attack in Ohio all the more terrorizing.

II. NUCLEAR REACTOR TERROR:

nuclear-reactor-attack

2.1: Nuclear Reactor Attack Programming
Back on March 29, 1998, a Simpsons episode entitled “Simpson Tide” (S09E19) featured a nuclear reactor power plant meltdown (see photo) which was caused by a problem with the reactor’s core. More recently, “Blackhat” (2015) is a film (see trailer) which will be released on January 16, 2014. The plot features a state-sponsored cyber-terror attack on U.S. nuclear reactors, causing a catastrophic nuclear meltdown. As with most Hollywood programming, it’s just a matter of time before it transpires in reality.

2.2. Nuclear Reactor Terror Trending
Prior to a high-profile nuclear reactor terror attack, the public must be led to believe though fabricated headlines and staged events that yes, it can happen. As evidenced, nuclear reactor terror is at an unprecedented level which suggests that a state-sponsored nuclear reactor attack is imminent.

Nuclear Reactor Terror Timeline:

1. October 30, 2014: Mystery drones breach airspace above French nuclear sites
2. November 21, 2014:
Radioactive leak as fire strikes Scottish nuclear plant
3. November 24, 2014: Pickering nuclear reactor leaks heavy water
4. November 24, 2014: Torness nuclear reactor brought back online
5. November 24, 2014: Salem nuclear reactor on after refueling shutdown
6. November 30, 2014: Fire takes another Belgian nuclear reactor offline
7. December 3, 2014: Nuclear reactor unexpectedly shuts down in Callaway County
8. December 3, 2014: Fire Shuts Belgian Nuclear Reactor
9. December 3, 2014: Ukraine nuclear accident ‘no threat': Minister
10. December 16, 2014: Chemical spill at uranium-processing plant contained
11. December 18, 2014: DIA: North Korea Planned Attacks on US Nuclear Plants
12. December 28, 2014: Ukraine turns off reactor at nuclear plant after ‘accident’
13. December 29, 2014: Fukushima radiation: US West Coast will likely see peak by end of 2015
14. December 30, 2014: Radioactive leak at major Ukrainian nuclear plant
15. January 28, 2015: UFO Buzzed French Nuclear Power Plant Says Director
16. February 10, 2015: France Tests Kamikaze, Netted Interceptor Drones To Protect Nuclear Reactors
17. February 23, 2015: 16 nuclear reactors vulnerable to terrorist drone attacks
18. March 17, 2015: South Korea points finger at North Korea for nuclear operator cyberattack
19. March 16, 2015: Salem nuclear reactor shut down after failure to meet deadline to fix cooling unit
20. March 17, 2015: South African who attacked nuclear plant is hero to his fellow citizens
21. March 18, 2015: Chernobyl: Containing the world’s worst nuclear accident

[Does not purport to be a complete list of nuclear reactor terror headlines]

2.3: Nuclear Reactor Attack
Based on the plethora of recent state-sponsored terror drills involving U.S. nuclear reactors (see below), it appears that U.S. nuclear reactors will be targeted, most likely by cyber and/or Islamic terrorists. Exactly what form these attacks will take is not known, but a 9/11-style kamikaze attack is the most likely. Interestingly, on March 26, 2014, LiveScience found that even a small nuclear war could trigger “catastrophic cooling”. In other words, should a number of U.S. nuclear reactors be attacked, a majority of the U.S. will be covered in a “radioactive” haze courtesy of government drones spraying 10-100x the amount of chemtrails. Consequently, the sun would be blocked out completely, the sky would be labeled as radioactive, and America’s economy and tourism would come to a screeching halt. Needless to say, this terror scenario would be far worse Three Mile Nuclear Disaster (1979), Chernobyl Disaster 1986), and the Fukushima Disaster (2011) combined.

2014 Nuclear Reactor Drills:

1. April 1, 2014: Emergency drill at Peach Bottom nuclear plant next week (Delta, PA)
2. April 10, 2014: Nuclear detection drill near boat ramps to start at 9 a.m. in Boca (Boca Raton, FL)
3. April 11, 2014: Nuclear plant drill in Palo helps prepare for all emergencies (Palo, IA)
4. April 19, 2014: Pilgrim nuclear plant to stage attack drill (Plymouth, MA)
5. April 22, 2014:
Farley Nuclear Plant Drill (Columbia, AL)
6. December 9, 2014: Vermont Yankee evacuation center drill goes well, state says (Vernon, VT)

[Does not purport to be a complete list of headlines or events]

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namast

0001 SAFDCT
customLogo.gif
truther-rss

o-ANONYMOUS-facebook

Download & Forward PDF

David Chase Taylor
March 9, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA in Switzerland will premeditatively attack and crash U.S. stock markets, dragging the U.S. dollar with it. The attacks will most likely target the New York Stock Exchange (NYSE), the US Security and Exchange Commission (SEC), and/or the Federal Reserve Bank (FED).

In an ominous sign that a state-sponsored stock market crash is imminent, The Telegraph published a report on January 2, 2014, entitled “Ten Warning Signs of a Market Crash in 2015”. According to the timely report, “the credit markets that forewarned the 2007 crash are showing signs of strain”. In other words, a massive market crash is imminent.

The latest red flag that state-sponsored financial cyber-terror is imminent was identified on January 16, 2015, when it was revealed that so-called “cyber-attack war games” will be staged by US and UK at a future and undisclosed date. War games have a history of going “live” which is why they are staged in the first place.

The first war game will reportedly involve the Bank of England and commercial banks, targeting the City of London and Wall Street. These war games will be followed by “further exercises to test critical national infrastructure”. In other words, the entire financial system of the West will likely be attacked.

In what appears to be pre-cyber-attack conditioning, it was reported on December 25, 2014, that the PlayStation Network and Xbox Live were offline due to cyber-attacks. Two days later on December 27, 2014, the hackers reportedly leaked 13,000 passwords from Amazon, PlayStation and Xbox. Therefore, the precedent for a far greater cyber-related terror attacks has been set.

Back on December 18, 2014, the U.S. House cybersecurity chairman warned that Wall Street may be the next cyber target of the state-sponsored Sony hackers, confirming, albeit in a de facto manner, that the group Guardians of Peace will be scapegoated for a cyber-related attack on the U.S. stock market and economy.

Also on December 18, 2014, the White House stated that the Sony hack is as national security matter, further confirming that a national security-related attack by the Guardians of Peace is imminent. That same day, the files of more than 40,000 U.S. federal workers were breached, a cyber-attack which will likely be scapegoated onto the Sony hackers.

??????????????????????????????????

Anonymous Cyber-Hijack of U.S. Economy
Although an unprecedented cyber-terror attack on the U.S. economy could be blamed on China, the Guardians of Peace, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack, funneling the stolen money into allegedly untraceable Bitcoin accounts. Coincidentally, on October 2, 2014, it was revealed that an FBI informant admittedly organized Anonymous attacks on government websites in 30 countries, further confirming that the group known as Anonymous is in fact state-sponsored. The timely report was designed to set the precedent for an Anonymous attack on government-related websites such as the FED, NYSE, SEC, etc. An Anonymous-based cyber-attack will enable the progenitors of terror (i.e., the CIA) to steal billions if not trillions of dollars from the U.S. economy without a trace. Should a sovereign country be deemed responsible for the heist, defrauded investors worldwide would collectively demand compensation from that particular country, something the CIA does not want to deal with. In what appears to be pre-Wall Street cyber-attack logistics, it was revealed back on July 8, 2014, that Wall Street has now hired a former NSA chief to help create a “cyber war council”. Translation: Wall Street and the NSA are teaming up together to execute a Wall Street cyber-hijack which will likely disappear trillions of dollars, bankrupting the U.S. economy. In the wake of the attack, the NSA chief will likely be scapegoated for the attack.

Anonymous Stock Market Attack
In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely an alleged member of Anonymous.

reign-malware-1000x520

Regin Malware
In what appears to be pre-financial cyber-attack hardware, on November 23, 2014. CNN published a report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure has been hijacked by the Regin malware and therefore any type of cyber-related attack on America’s financial infrastructure is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

Federal Security Breaches
If reports are to be believed, the U.S. federal government is highly susceptible to cyber-attacks, making the likelihood of a major financial cyber-hijack all the more believable. For example, on November 4, 2014, it was reported that a cyber-attack on a federal security contractor wasn’t noticed for months. Therefore, if the FED, NYSE or SEC is hacked in 2014, it won’t be noticed days or even weeks. This in essence allows the CIA to stage a financial-related attack whenever they want without any forewarning. Six days later on November 10, 2014, it was reported that federal firewalls are struggling against the increasing number of cyber-attacks. The timely report was designed to give the U.S. government plausible deniability in the wake of a financial-related terror attacks that bankrupt the U.S. economy. Also on November 10, 2014, the U.S, Postal Service was reportedly hacked, resulting in employee and customer information being compromised. Needless to say, the incident was designed to set the precedent for a far worse cyber-attack on the U.S. federal government, most likely the FED or SEC.

Financial Cyber-Attacks Trending
A preview of financial related cyber-terror recently occurred on July 10, 2014, when it was reported that Norwegian banks suffered the largest-ever DDoS attack in their history, an act which the state-sponsored terror group known as Anonymous predictably took credit for. Because all 206 countries are under the command and control of the CIA, events tend to happen in other countries before transpire in America on a much larger scale. Roughly 2-weeks later on July 25, 2014, the European Central Bank was allegedly hacked and personal data stolen. Roughly a month later on August 27, 2014, it was revealed that the FBI is now investigating a cyber-attack on JPMorgan. Roughly 3-weeks later on September 17, 2014, members from Anonymous and an Occupy Wall Street group reportedly abolishes nearly $4 million in student loan debt on September 17, 2014, foreshadowing the notion of Anonymous vanishing millions into thin air. Roughly 3-weeks alter on October 3, 2014, the New York Times published a report entitled “Hackers’ Attack Cracked 10 Financial Firms in Major Assault”, further foreshadowing financial-related cyber-terror. Also on October 3, 2014, it was reported that the JP Morgan data breach affected 76 million households, a laughable notion considering that the population of the U.S. is only 300 million people. A few weeks later on October 20, 2014, U.S. officials warned 500 million financial records may have been hacked. The timely propaganda report was evidently published in order to show that financial-related cyber-terror is imminent just prior to an unprecedented attack on the U.S. financial system. Taken collectively, these timely reports have set the precedent for future bank-related cyber-terror attacks, most likely targeting the FED, NYSE, or SEC.

nyse1

NYSE Cyber-Attack
The latest New York Stock Exchange (NYSE) cyber-terror plot appears to be a redux of two previously foiled terror plots as depicted in the March 20, 2014 Truther.org report entitled “Impending Wall Street Banking Cyber-Heist to Transfer Billions to Bitcoin”, and the April 15, 2014 Truther.org report entitled “Feds Planning High Frequency Trading Cyber-Attack via “Heartbleed” Bug”. In short, hackers will cause a “High Frequency Trading” sell-off (which they will short-sell), the profits of which will be deposited in untraceable Bitcoin accounts. In order to provide a motive for a Bitcoin-related cyber-terror attack, the IRS declared that Bitcoin was not an official currency on March 25, 2014. Roughly 3-months later on June 13, 2014, it was revealed that the FBI will auction off seized Bitcoins worth $18m on June 27, 2014, the impending date of the attack. In order to raise the profile of banks prior to a debilitating cyber-terror attack that will likely bankrupt millions of investors, Vice President Joe Biden stated on June 23, 2014 that “I don’t have a savings account”. Two days later on June 25, 2014, the U.S. Federal Reserve warned that banks face “tougher tests” ahead, an ominous sign that a so-called “test” (i.e., attack) is imminent. Although impossible to prove, it appears that Bitcoin was specifically created to be an untraceable depository for stolen funds from a Wall Street cyber-attack. In other words, the hackers play the role of Robin Hood by stealing from the rich (i.e., Wall Street) and giving to the poor (i.e., Bitcoin)—the only catch being that Robin Hood is invisible.

Bank Terror Drills
In what appears to be cover drills for the controlled demolition of the U.S. economy, it was reported on October 10, 2014, that the U.S. and the UK will execute a “big bank collapse” simulation. According to reports, officials will “get together in a war room next week to see if they can cope with any possible fall-out when the next big bank topples over”. The banking collapse drill will reportedly involve Federal Reserve Chair Janet Yellen and Bank of England Governor Mark Carney, and be hosted by the U.S. Federal Deposit Insurance Corporation (FDIC). The drill will involve the hypothetical failure of U.S. banks, most likely the Federal Reserve. Needless to say, key term such as “collapse” and “topples over” are designed to foreshadow that a controlled demolition of the U.S. economy is indeed planned. Roughly 2-weeks late on October 26, 2014, it was reported that four in five Eurozone banks pass European Central Bank health test. Interestedly, the very next day, October 27, 2014, it was reported that 25 European Union banks failed a “stress test” exposing a $31billion shortfall. The bi-polar reporting was evidently designed to insinuate that banks are on the verge stressed to the point of collapse.

DHS Banking Continuity
In the wake of a major U.S. bank or stock market, a global financial panic in respect to the U.S. dollar will likely ensure. According to a December 10, 2004, CRS Report for Congress entitled “Homeland Security: Banking and Financial: Infrastructure Continuity”, bank terror and financial collapse have been planned for accordingly. According to the report, “H.R. 2043 sought to address bank risks under terrorism” and the Terrorism Risk Insurance Act of 2002 (TRIA) “provides a federal backstop for insurers willing to provide terrorism insurance”, ultimately protecting insurance banks against “catastrophic payouts in case of terrorist attacks”.  In other words, if and when a bank related terror attacks occur resulting in financial panic, private banks will not have to foot the bill for their losses because the U.S. government has assumed all the risk and liability. This convenient set-up essentially guarantees that the U.S. government, not the banks, will go bankrupt in the aftermath of bank related terror attacks.

The “Contagion Effect”
In the aftermath of U.S. bank failures (a bi-product of an irreversible U.S. stock market crash), other banks will begin to panic, setting off a chain reaction of banking collapses around the world. The aforementioned CRS Report for Congress found that when one bank goes, the rest will follow:  “Financial institutions face two categories of emergencies that could impair their functioning. The first is directly financial: danger of a sudden drop in the value of financial assets, whether originating domestically or elsewhere in the world, such that a global financial crisis might follow. The second is operational: failure of physical support structures that underlie the financial system. Either could disrupt the nation’s ability to supply goods and services and alter the behavior of individuals in fear of the disruption (or fear of greater disruption). They could reduce the pace of economic activity, or at an extreme, cause an actual contraction of economic activity”. The report went on to state that “Collapse of one prominent entity could evoke a contagion effect, in which sound financial institutions become viewed as weak — today’s equivalents of a bank run, in which panicked customers withdraw funds from many entities, causing others to fail as well”.

iJ4hgA_DrCZo

“Quantum Dawn II″ Terror Drill
Prior to a major cyber-terror attack on the New York Stock Exchange (NYSE), one would expect there to be some stock-market related terror drills to prepare Wall Street insiders for the attack. Coincidentally, on June 13th, 2013, it was reported that Wall Street executed “Quantum Dawn 2”, a cyber-terror war-game apparently meant to give insiders an opportunity to make financial moves before the market crashes—for good. According to the report, Cyber Strategies oversaw a terror exercise which included Citigroup, Bank of America, the Department of Homeland Security, the Treasury Department, the Federal Reserve, the Securities and Exchange Commission, as well as 40 other firms. The drill, which featured a hacker, possibly from China, operating from a fake trading platform, prompted a response in which the participants facilitated a conference call to “figure out what was going on”. In other words, the drill simulated a real-life scenario in which insider firms received the “heads up” about an impending cyber-attack and subsequently shared this information accordingly so that their bank accounts and those of their clients would not be affected. The same sort of thing occurred just prior to 9/11 when “put options” or bets were taken out on United Airlines and American Airlines, the two airline companies involved in the attacks. According to the “9/11 Commission Report”, “some unusual trading did in fact occur”, however, it claimed that, “each such trade proved to have an innocuous explanation”.

“Quantum Dawn II” Fallout
In the October 23, 2013, Fox Business report entitled “‘White Hat’ Hackers Expose Flaws of U.S. Stock Market”, the details of the “Quantum Dawn 2”  cyber-attack exercise were revealed. According to the report, ethical “white hat” hackers intentionally “looking to expose the cyber vulnerabilities of U.S. equity markets”, were able to directly impact market performance by “forcing a mock market close”. According to the report, more than 50 entities and 500 people in the financial services sector participated in the cyber-attack which was executed by the Securities Industry and Financial Markets Association (SIFMA) on July 18, 2013. So called “ethical hackers” were told to give everything they had to try and cripple the U.S. stock market during the 6-hour exercise. “Quantum Dawn 2 demonstrated the industry’s resiliency when faced with serious cyber-attacks that aimed to steal money, crash systems and disrupt equity market trading,” SIFMA CEO Judd Gregg stated. According to Cedric Leighton, a former U.S. intelligence officer, “The more realistic the exercise the better prepared they’ll be if and when attacks from a cyber standpoint occur”.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, as well as The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I Am Assassinated, Framed, Kidnapped, Held Hostage, Suicided or Killed via Terror Attack in Switzerland—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
truther-rss

o-ANONYMOUS-facebook

Download & Forward PDF

David Chase Taylor
February 19, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA in Switzerland will premeditatively attack and crash U.S. stock markets, dragging the U.S. dollar with it. The attacks will most likely target the New York Stock Exchange (NYSE), the US Security and Exchange Commission (SEC), and/or the Federal Reserve Bank (FED).

In an ominous sign that a state-sponsored stock market crash is imminent, The Telegraph published a report on January 2, 2014, entitled “Ten Warning Signs of a Market Crash in 2015”. According to the timely report, “the credit markets that forewarned the 2007 crash are showing signs of strain”. In other words, a massive market crash is imminent.

The latest red flag that state-sponsored financial cyber-terror is imminent was identified on January 16, 2015, when it was revealed that so-called “cyber-attack war games” will be staged by US and UK at a future and undisclosed date. War games have a history of going “live” which is why they are staged in the first place.

The first war game will reportedly involve the Bank of England and commercial banks, targeting the City of London and Wall Street. These war games will be followed by “further exercises to test critical national infrastructure”. In other words, the entire financial system of the West will likely be attacked.

In what appears to be pre-cyber-attack conditioning, it was reported on December 25, 2014, that the PlayStation Network and Xbox Live were offline due to cyber-attacks. Two days later on December 27, 2014, the hackers reportedly leaked 13,000 passwords from Amazon, PlayStation and Xbox. Therefore, the precedent for a far greater cyber-related terror attacks has been set.

Back on December 18, 2014, the U.S. House cybersecurity chairman warned that Wall Street may be the next cyber target of the state-sponsored Sony hackers, confirming, albeit in a de facto manner, that the group Guardians of Peace will be scapegoated for a cyber-related attack on the U.S. stock market and economy.

Also on December 18, 2014, the White House stated that the Sony hack is as national security matter, further confirming that a national security-related attack by the Guardians of Peace is imminent. That same day, the files of more than 40,000 U.S. federal workers were breached, a cyber-attack which will likely be scapegoated onto the Sony hackers.

??????????????????????????????????

Anonymous Cyber-Hijack of U.S. Economy
Although an unprecedented cyber-terror attack on the U.S. economy could be blamed on China, the Guardians of Peace, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack, funneling the stolen money into allegedly untraceable Bitcoin accounts. Coincidentally, on October 2, 2014, it was revealed that an FBI informant admittedly organized Anonymous attacks on government websites in 30 countries, further confirming that the group known as Anonymous is in fact state-sponsored. The timely report was designed to set the precedent for an Anonymous attack on government-related websites such as the FED, NYSE, SEC, etc. An Anonymous-based cyber-attack will enable the progenitors of terror (i.e., the CIA) to steal billions if not trillions of dollars from the U.S. economy without a trace. Should a sovereign country be deemed responsible for the heist, defrauded investors worldwide would collectively demand compensation from that particular country, something the CIA does not want to deal with. In what appears to be pre-Wall Street cyber-attack logistics, it was revealed back on July 8, 2014, that Wall Street has now hired a former NSA chief to help create a “cyber war council”. Translation: Wall Street and the NSA are teaming up together to execute a Wall Street cyber-hijack which will likely disappear trillions of dollars, bankrupting the U.S. economy. In the wake of the attack, the NSA chief will likely be scapegoated for the attack.

Anonymous Stock Market Attack
In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely an alleged member of Anonymous.

reign-malware-1000x520

Regin Malware
In what appears to be pre-financial cyber-attack hardware, on November 23, 2014. CNN published a report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure has been hijacked by the Regin malware and therefore any type of cyber-related attack on America’s financial infrastructure is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

Federal Security Breaches
If reports are to be believed, the U.S. federal government is highly susceptible to cyber-attacks, making the likelihood of a major financial cyber-hijack all the more believable. For example, on November 4, 2014, it was reported that a cyber-attack on a federal security contractor wasn’t noticed for months. Therefore, if the FED, NYSE or SEC is hacked in 2014, it won’t be noticed days or even weeks. This in essence allows the CIA to stage a financial-related attack whenever they want without any forewarning. Six days later on November 10, 2014, it was reported that federal firewalls are struggling against the increasing number of cyber-attacks. The timely report was designed to give the U.S. government plausible deniability in the wake of a financial-related terror attacks that bankrupt the U.S. economy. Also on November 10, 2014, the U.S, Postal Service was reportedly hacked, resulting in employee and customer information being compromised. Needless to say, the incident was designed to set the precedent for a far worse cyber-attack on the U.S. federal government, most likely the FED or SEC.

Financial Cyber-Attacks Trending
A preview of financial related cyber-terror recently occurred on July 10, 2014, when it was reported that Norwegian banks suffered the largest-ever DDoS attack in their history, an act which the state-sponsored terror group known as Anonymous predictably took credit for. Because all 206 countries are under the command and control of the CIA, events tend to happen in other countries before transpire in America on a much larger scale. Roughly 2-weeks later on July 25, 2014, the European Central Bank was allegedly hacked and personal data stolen. Roughly a month later on August 27, 2014, it was revealed that the FBI is now investigating a cyber-attack on JPMorgan. Roughly 3-weeks later on September 17, 2014, members from Anonymous and an Occupy Wall Street group reportedly abolishes nearly $4 million in student loan debt on September 17, 2014, foreshadowing the notion of Anonymous vanishing millions into thin air. Roughly 3-weeks alter on October 3, 2014, the New York Times published a report entitled “Hackers’ Attack Cracked 10 Financial Firms in Major Assault”, further foreshadowing financial-related cyber-terror. Also on October 3, 2014, it was reported that the JP Morgan data breach affected 76 million households, a laughable notion considering that the population of the U.S. is only 300 million people. A few weeks later on October 20, 2014, U.S. officials warned 500 million financial records may have been hacked. The timely propaganda report was evidently published in order to show that financial-related cyber-terror is imminent just prior to an unprecedented attack on the U.S. financial system. Taken collectively, these timely reports have set the precedent for future bank-related cyber-terror attacks, most likely targeting the FED, NYSE, or SEC.

nyse1

NYSE Cyber-Attack
The latest New York Stock Exchange (NYSE) cyber-terror plot appears to be a redux of two previously foiled terror plots as depicted in the March 20, 2014 Truther.org report entitled “Impending Wall Street Banking Cyber-Heist to Transfer Billions to Bitcoin”, and the April 15, 2014 Truther.org report entitled “Feds Planning High Frequency Trading Cyber-Attack via “Heartbleed” Bug”. In short, hackers will cause a “High Frequency Trading” sell-off (which they will short-sell), the profits of which will be deposited in untraceable Bitcoin accounts. In order to provide a motive for a Bitcoin-related cyber-terror attack, the IRS declared that Bitcoin was not an official currency on March 25, 2014. Roughly 3-months later on June 13, 2014, it was revealed that the FBI will auction off seized Bitcoins worth $18m on June 27, 2014, the impending date of the attack. In order to raise the profile of banks prior to a debilitating cyber-terror attack that will likely bankrupt millions of investors, Vice President Joe Biden stated on June 23, 2014 that “I don’t have a savings account”. Two days later on June 25, 2014, the U.S. Federal Reserve warned that banks face “tougher tests” ahead, an ominous sign that a so-called “test” (i.e., attack) is imminent. Although impossible to prove, it appears that Bitcoin was specifically created to be an untraceable depository for stolen funds from a Wall Street cyber-attack. In other words, the hackers play the role of Robin Hood by stealing from the rich (i.e., Wall Street) and giving to the poor (i.e., Bitcoin)—the only catch being that Robin Hood is invisible.

Bank Terror Drills
In what appears to be cover drills for the controlled demolition of the U.S. economy, it was reported on October 10, 2014, that the U.S. and the UK will execute a “big bank collapse” simulation. According to reports, officials will “get together in a war room next week to see if they can cope with any possible fall-out when the next big bank topples over”. The banking collapse drill will reportedly involve Federal Reserve Chair Janet Yellen and Bank of England Governor Mark Carney, and be hosted by the U.S. Federal Deposit Insurance Corporation (FDIC). The drill will involve the hypothetical failure of U.S. banks, most likely the Federal Reserve. Needless to say, key term such as “collapse” and “topples over” are designed to foreshadow that a controlled demolition of the U.S. economy is indeed planned. Roughly 2-weeks late on October 26, 2014, it was reported that four in five Eurozone banks pass European Central Bank health test. Interestedly, the very next day, October 27, 2014, it was reported that 25 European Union banks failed a “stress test” exposing a $31billion shortfall. The bi-polar reporting was evidently designed to insinuate that banks are on the verge stressed to the point of collapse.

DHS Banking Continuity
In the wake of a major U.S. bank or stock market, a global financial panic in respect to the U.S. dollar will likely ensure. According to a December 10, 2004, CRS Report for Congress entitled “Homeland Security: Banking and Financial: Infrastructure Continuity”, bank terror and financial collapse have been planned for accordingly. According to the report, “H.R. 2043 sought to address bank risks under terrorism” and the Terrorism Risk Insurance Act of 2002 (TRIA) “provides a federal backstop for insurers willing to provide terrorism insurance”, ultimately protecting insurance banks against “catastrophic payouts in case of terrorist attacks”.  In other words, if and when a bank related terror attacks occur resulting in financial panic, private banks will not have to foot the bill for their losses because the U.S. government has assumed all the risk and liability. This convenient set-up essentially guarantees that the U.S. government, not the banks, will go bankrupt in the aftermath of bank related terror attacks.

The “Contagion Effect”
In the aftermath of U.S. bank failures (a bi-product of an irreversible U.S. stock market crash), other banks will begin to panic, setting off a chain reaction of banking collapses around the world. The aforementioned CRS Report for Congress found that when one bank goes, the rest will follow:  “Financial institutions face two categories of emergencies that could impair their functioning. The first is directly financial: danger of a sudden drop in the value of financial assets, whether originating domestically or elsewhere in the world, such that a global financial crisis might follow. The second is operational: failure of physical support structures that underlie the financial system. Either could disrupt the nation’s ability to supply goods and services and alter the behavior of individuals in fear of the disruption (or fear of greater disruption). They could reduce the pace of economic activity, or at an extreme, cause an actual contraction of economic activity”. The report went on to state that “Collapse of one prominent entity could evoke a contagion effect, in which sound financial institutions become viewed as weak — today’s equivalents of a bank run, in which panicked customers withdraw funds from many entities, causing others to fail as well”.

iJ4hgA_DrCZo

“Quantum Dawn II″ Terror Drill
Prior to a major cyber-terror attack on the New York Stock Exchange (NYSE), one would expect there to be some stock-market related terror drills to prepare Wall Street insiders for the attack. Coincidentally, on June 13th, 2013, it was reported that Wall Street executed “Quantum Dawn 2”, a cyber-terror war-game apparently meant to give insiders an opportunity to make financial moves before the market crashes—for good. According to the report, Cyber Strategies oversaw a terror exercise which included Citigroup, Bank of America, the Department of Homeland Security, the Treasury Department, the Federal Reserve, the Securities and Exchange Commission, as well as 40 other firms. The drill, which featured a hacker, possibly from China, operating from a fake trading platform, prompted a response in which the participants facilitated a conference call to “figure out what was going on”. In other words, the drill simulated a real-life scenario in which insider firms received the “heads up” about an impending cyber-attack and subsequently shared this information accordingly so that their bank accounts and those of their clients would not be affected. The same sort of thing occurred just prior to 9/11 when “put options” or bets were taken out on United Airlines and American Airlines, the two airline companies involved in the attacks. According to the “9/11 Commission Report”, “some unusual trading did in fact occur”, however, it claimed that, “each such trade proved to have an innocuous explanation”.

“Quantum Dawn II” Fallout
In the October 23, 2013, Fox Business report entitled “‘White Hat’ Hackers Expose Flaws of U.S. Stock Market”, the details of the “Quantum Dawn 2”  cyber-attack exercise were revealed. According to the report, ethical “white hat” hackers intentionally “looking to expose the cyber vulnerabilities of U.S. equity markets”, were able to directly impact market performance by “forcing a mock market close”. According to the report, more than 50 entities and 500 people in the financial services sector participated in the cyber-attack which was executed by the Securities Industry and Financial Markets Association (SIFMA) on July 18, 2013. So called “ethical hackers” were told to give everything they had to try and cripple the U.S. stock market during the 6-hour exercise. “Quantum Dawn 2 demonstrated the industry’s resiliency when faced with serious cyber-attacks that aimed to steal money, crash systems and disrupt equity market trading,” SIFMA CEO Judd Gregg stated. According to Cedric Leighton, a former U.S. intelligence officer, “The more realistic the exercise the better prepared they’ll be if and when attacks from a cyber standpoint occur”.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, as well as The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I Am Assassinated, Framed, Kidnapped, Held Hostage, Suicided or Killed via Terror Attack in Switzerland—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
truther-rss

20101001_integrated

Download & Forward PDF

David Chase Taylor
February 5, 2015
Truther.org

SWITZERLAND, Zurich — At 6:10 PM (EST) on Sunday, February, 8, 2015, the SpaceX Falcon 9 rocket will launch from Cape Canaveral Air Force Station in Cape Canaveral, Florida. The mission is a collaboration between NASA, the U.S. Air Force and National Oceanic and Atmospheric Administration.

According to reports, SpaceX will again try and land the Falcon 9 rocket booster on a platform in the Atlantic Ocean. The first try last month resulted in the rocket hitting the “autonomous spaceport drone ship” with a fiery crash that did not cause extensive damage.

Based on previous rocket launches, it’s highly likely that NASA (at the behest of the CIA in Switzerland) will attack the rocket with some form of a cyber-related terror, causing a massive EMP-like explosion, knocking out electricity on the East Coast of America.

The impeding attack on the SpaceX Falcon 9 rocket is a redux of the Minotaur V launch of September 6, 2013, and the Minotaur Rocket launch of November 1, 2013, both of which were also launched from the East Coast specifically so that a cyber-attack and subsequent EMP explosion could transpire.

FLASHBACK: Antares Rocket Explosion
Back on October 27, 2014, Truther.org published a report entitled “Cyber-Attack and Subsequent EMP Planned for Antares Rocket Launch on OCT 27”. Interestingly, the launch was scrubbed until October 28, 2014, when the Antares rocket inexplicable blew up on the launch pad in Wallops, Virginia. Evidently, the rocket’s payload was purposely detonated in order to set the precedent for a future cyber-related attack on a U.S. rocket. In other words, the rocket was blown up in order to show the public the power of a rocket explosion just prior to a rocket explosion in midflight that will result in an EMP, knocking out electricity in America for good. Once an EMP attack using a rocket has commenced, the October 28 rocket explosion will predictably be labeled a cyber-attack by the U.S. government.

20130605_emp_attack_large

What is an EMP?
A Nuclear EMP is a burst of electromagnetic radiation which usually results from a high energy nuclear explosion that suddenly fluctuates the magnetic field. Theoretically, an EMP could wipe out everything electronic (planes, trains, cars, computers, internet, etc.) in a flash. EMP terror has gained popularity of late and has been featured in movies such as “The Matrix” and television shows such as “24” and the #1 show on NBC entitled “Revolution”, which eerily features a post-EMP America with no electricity. Aside from the Hollywood EMP propaganda, there has been recent EMP terror legislation by the U.S. congress, a number of EMP terror conferences, and EMP terror scholarly whitepapers which have all been preparing local, state and federal officials for an upcoming EMP terror attack on America. Based on the 12 major power outages in 2012 alone, it appears that the U.S. government is programming the public for the permanent loss of electricity. Coincidentally, in September of 2012, Alex Jones of Infowars released a new magazine which indicates that the STRATFOR intelligence operation known as Infowars knows that the internet is about to expire and have planned ahead by launching a new propaganda magazine. In the propaganda film entitled “Red Dawn” (2012), (See: Trailer) a group of American youth out partying after a football game, suddenly find themselves in the middle of a major blackout, likely from an EMP attack.

grid-ex-ii

“GridEx II” Power Grid Drill
Considering that on November 13-15, 2013, a massive power grid terror drill entitled “GridEx II” was executed on the East Coast of America, there is a real possibility that a massive nuclear EMP attack could turn the lights out on America for good. According to the August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: If I Am Assassinated, Kidnapped, Held Hostage, Suicided or Murdered in Switzerland—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCTtruther-rsstruther-rss