Archive for the ‘Guardians of Peace Terror’ Category

CFP

Download & Forward PDF

David Chase Taylor
January 12, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA in Switzerland) will attempt to execute at least 2 nuclear terror attacks on or during the first-ever College Football Playoff (CFP) on Monday, January 12, 2015.

Known as the Super Bowl of NCAA college football, the CFP will feature the Ohio State Buckeyes versus the Oregon Ducks at AT&T Stadium in Arlington, Texas. The game, which will be aired “live” on ESPN, will likely rival the Super Bowl in its amount of viewers, making the game a very lucrative state-sponsored terror target.

The first terror plot is a cyber-hijack of the ESPN broadcast by the Sony Hackers which will predictably be identified as China. Once the football broadcast is hijacked, viewers will be treated to one or more nuclear detonations on the West Coast of America (e.g., Los Angeles, Portland, San Francisco, Seattle, etc.), courtesy of Chinese subs in the Pacific Ocean.

The second terror plot is a redux of the 2011 Super Bowl XLV Nuclear Terror Plot in Dallas, Texas, whereby Islamic terrorists (e.g., Al Qaeda, ISIS, etc.) will allegedly sneak a nuclear bomb into the United States via Mexico, attacking at AT&T Stadium in Arlington, Texas.

Needless to say, either terror plot will result in a nuclear World War III. In the event that the Chinese nuclear attack is executed, a full scale war in the Pacific will likely commence within the hour. In the event that the Islamic nuclear attack is executed, Pakistan, a nuclear nation, will likely be fingered as the supplier of the bomb.

I. CHINESE CYBER-HIACK & NUKE ATTACK:

1.1: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise and earth changing cyber-attack by an Asian country was ominously foreshadowed by the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. In order to bring unprecedented media exposure to cyber-security (or lack thereof), it was revealed on January 11, 2015, that President Obama plans to promote a cybersecurity plan this week. According to the White House the three-day series of events will focus on “protecting American consumers and families, securing the nation’s businesses and infrastructure in cyberspace, and increasing broadband access”. The TV cyber-hijack nuke attack is a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. Interestingly, the notion of a rouge submarine attack was ominously foreshadowed on January 9, 2015, when a suspected Russian submarine was reported lurking off the Scottish coast.

Live TV Nuke

1.2: ESPN Cyber-Hijack

Back on December 31, 2014, the state-sponsored Sony Hackers threatened U.S. news media organizations, namely CNN. Although CNN could theoretically suffer a cyber-hijack of its airwaves, ESPN appears the slated targeted. Coincidentally, 4 days later on January 4, 2015, longtime ESPN sports anchor Stuart Scott died at 49, an apparent Roman-like blood sacrifice to a successful cyber-attack on ESPN. In order to sell the notion of a media-related attack to the public, another state-sponsored terror attack occurred on January 7, 2014, when gunmen attacked a Paris magazine, leaving 12 dead. That same day, January 7, 2015, a Maryland TV station’s Twitter account and website hacked by ISIS supporters, setting the precedent for a TV-related cyber-attack. The notion of a full-scale cyber-war was ominously foreshadowed in the January 9, 2015, CNN report entitled “Anonymous Declares War over Charlie Hebdo Attack”.

fallout

1.3: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

1.4: Golden Gate Bridge Attack

To make a Chinese attack on the U.S. even more psychologically terrorizing, a well-known landmark such as the Golden Gate Bridge in San Francisco must be destroyed in order to serve as life-long reminder of that horrific day (e.g., Twin Towers on 9/11). Back on January 9, 2015, it was reported that the Golden Gate Bridge is taking its first-ever weekend off in order to install a security barrier. Whether the timely closure of the bridge has provided the necessary cover for the installation of demolition explosives is not known, but it’s highly likely. Said explosives could be detonated at a later date in order to give the appearance of a coordinated Chinese attack. In other words, the bridge will be demolished with shaped explosives while the U.S. government publicly blames China.

II. ISLAMIC NUCLEAR ATTACK
:

?????????????????????????????????????????????????????????????????????????????

2.1: Dallas Nuclear Attack
Aside from the fact that Dallas, Texas was home to the Super Bowl XLV Nuclear Terror Plot of February 6, 2011, nuclear-related headlines are now trending which suggests that a nuclear terror attack may be imminent. The particular narrative was most recently identified on December 8, 2014, when it was reported that ISIS claims to have smuggled a “radioactive device” into Europe. A day later on December 9, 2014, it was reported that police in Moldova detained seven people suspected of smuggling radioactive Uranium-238 on a train from Russia, a substance which could allegedly be used to make a “dirty bomb”. Therefore, a future terror scenario in which nuclear material is shipped into America via train in order to construct a dirty bomb or nuclear bomb is now theoretically possible. Whether or not it will happen in Dallas, Texas is not known, but it’s highly likely.

2.2: U.S. Border Security Compromised
In order to sell the notion to the American public that the U.S. border is porous and vulnerable to attack, a number of propaganda reports have been disseminated by the CIA. For example, on December 26, 2014, it was reported that a drug cartel claims that they have kidnapped a U.S. Border Patrol agent. Predictably, this agent and/or his identification will be used by Islamic terrorists to sneak a nuclear bomb into the United States, namely Dallas, Texas. The notion that illegal immigrants will resort to violence and/or terrorism was revealed on December 29, 2014, when the U.S. Border Patrol stated that illegal immigrants are now becoming more “aggressive”. Less than a week later on January 3, 2015, a U.S. Congressional report stated that 700 miles of U.S.-Mexico border are still insecure, making the notion of a security breach by Islamic terrorists seem all the more plausible.

ISIS-Nukes

2.3: ISIS Nuclear Attack
In order to create the necessary media narrative that ISIS is capable of executing a nuclear terror attack, a number of CIA-spawned propaganda reports have been published within the last 6-months. For example, on May 2, 2014, it was reported by Veterans Today that 1.05 tons of stolen Pakistani nuclear material is now headed to the United States, ultimately connecting Pakistan to a future nuclear terror strike on America. The notion of an ISIS nuclear terrorist attack was witnessed on June 23, 2014, when ISIS terrorists reportedly threatened a nuke attack on Israel, a laughable notion to be sure. A few weeks later on July 9, 2014, it was reported that ISIS seized 88 pounds of Uranium in Northern Iraq, ultimately providing them will enough uranium to make a nuclear bomb. This report was corroborated a day later on July 10, 2014, by Russia Today who reported that Sunni insurgents have taken over nuclear materials in northern Iraq. These preliminary reports were ultimately confirmed by Fox News on July 10, 2014, in a report entitled “ISIS Seizes Uranium from Lab; Experts Downplay ‘Dirty Bomb’ Threat”. Roughly 6-weeks later on August 28, 2014, it was reported that a black Dell laptop was found in an ISIS safe house in Syria which contained instructions on how to weaponize the bubonic plague as well as “missives on using WMDs (Weapons of Mass Destruction)”. Needless to say, the ISIS endgame is a biological and/or nuclear terror attack. Anything less would be unsatisfactory to the CIA which is in command and control of ISIS. In order to raise the specter of an ISIS-related nuclear terror attack just prior to it transpiring in reality, Obama reportedly stated that he will send US troops to fight ISIS if they get nukes on November 18, 2014. Needless to say, the publicity stunt was orchestrated by the CIA is order foreshadow an ISIS-related nuclear attack.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, s state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: If I Am Assassinated, Framed, Kidnapped, Held Hostage, Suicided or Killed via Terror Attack in Switzerland—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
truther-rss

Mixed-Signals-From-Guardians-of-Peace-Hackers

Download & Forward PDF

David Chase Taylor
January 2, 2014
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA in Switzerland will execute a massive and unprecedented cyber-related attack on Europe and/or the United States, ultimately scapegoating the state-sponsored “Guardians of Peace” hackers.

The notion that the Guardians of Peace (i.e., the Sony Hackers) are planning a second cyber-related attack was revealed on December 31, 2014, when the state-sponsored Sony hackers threatened an attack on a U.S. news media organization.

Exactly what form a cyber-attack will take is not known, but the internet itself, the U.S. electrical grid, and web-related entities such as Apple, Google, Microsoft, and WordPress may be targeted. Although the attack could theoretically transpire at any time, it will most likely come prior to the end of January 2015.

Back on December 13, 2014, the Sony Hackers promised to deliver a large “Christmas Gift”, inferring that they are planning a surprise cyber-related attack sometime around December 25, 2014. Therefore, a second and far more deadly cyber-related attack is expected any day now.

Interestingly, on December 18, 2014, the U.S. House cybersecurity chairman warned that the electric grid or Wall Street may be the next cyber target of the Sony Hackers, confirming, albeit in a de facto manner, that the Guardians of Peace will be scapegoated in a cyber-related attack on the U.S. power grid.

Also on December 18, 2014, the White House stated that the Sony hack is as national security matter, further confirming that a national security-related attack by Guardians of Peace is imminent. That same day, the files of more than 40,000 U.S. federal workers were breached, a cyber-attack which will eventually be scapegoated onto the Sony hackers.

In order to keep the Sony hackers fresh in the minds of billions, a publicity stunt involving the FBI was executed. Firstly, the FBI accused North Korea of being the Sony hackers. However, once Turther.org issued a timely alert that a North Korean cyber-attack was imminent, the story suddenly changed. Now the FBI has mud on their face, admitting that the attack was an “Inside Job”.

Top CIA Targets:

1. The Internet
2. U.S. Power Grid
3. Web Companies (Apple, Google, Microsoft, WordPress, etc.)

reign-malware-1000x520

Regin Malware
In what could be pre-Sony hackers cyber-attack malware, published a report on November 23, 2014, entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure has been hijacked by the Regin malware and therefore any type of cyber-related attack on America’s financial infrastructure is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

grid2exfp

GridEx II Power Grid Attack Drill
Considering that on November 13-15, 2013, a massive power grid terror drill entitled “GridEx II” was executed on the East Coast of America, there is a real possibility that a massive nuclear EMP attack could turn the lights out on America for good. According to the August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, as well as The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I Am Assassinated, Framed, Kidnapped, Held Hostage, Suicided or Killed via Terror Attack in Switzerland—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
truther-rss

wall-street

Download & Forward PDF

David Chase Taylor
December 22, 2014
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA) will premeditatively attack and crash the U.S. stock markets along with the U.S. dollar by December 24, 2014. The attacks will most likely target the New York Stock Exchange (NYSE), the US Security and Exchange Commission (SEC), and/or the Federal Reserve Bank (FED).

Back on December 13, 2014, the Sony Hackers promised to deliver a large “Christmas Gift”, inferring that North Korea is planning a surprise cyber-related attack around December 25, 2014. Therefore, a second and far more deadly cyber-related attack on America is expected prior to Christmas Day.

Interestingly, on December 18, 2014, the U.S. House cybersecurity chairman warned that Wall Street may be the next cyber target of North Korea, confirming, albeit in a de facto manner, that North Korea may be scapegoated for a cyber-related attack on the U.S. stock market and economy.

Also on December 18, 2014, the White House stated that the Sony hack is as national security matter, further confirming that a national security-related attack by North Korean is imminent. That same day, the files of more than 40,000 U.S. federal workers were breached, a cyber-attack which will likely be scapegoated onto North Korea.

Anonymous Cyber-Hijack of U.S. Economy
Although an unprecedented cyber-terror attack on the U.S. economy could be blamed on China, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack, funneling the stolen money into allegedly untraceable Bitcoin accounts. Coincidentally, on October 2, 2014, it was revealed that an FBI informant admittedly organized Anonymous attacks on government websites in 30 countries, further confirming that the group known as Anonymous is in fact state-sponsored. The timely report was designed to set the precedent for an Anonymous attack on government-related websites such as the FED, NYSE, SEC, etc. An Anonymous-based cyber-attack will enable the progenitors of terror (i.e., the CIA) to steal billions if not trillions of dollars from the U.S. economy without a trace. Should a sovereign country be deemed responsible for the heist, defrauded investors worldwide would collectively demand compensation from that particular country, something the CIA does not want to deal with. In what appears to be pre-Wall Street cyber-attack logistics, it was revealed back on July 8, 2014, that Wall Street has now hired a former NSA chief to help create a “cyber war council”. Translation: Wall Street and the NSA are teaming up together to execute a Wall Street cyber-hijack which will likely disappear trillions of dollars, bankrupting the U.S. economy. In the wake of the attack, the NSA chief will likely be scapegoated for the attack.

Anonymous Stock Market Attack
In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely an alleged member of Anonymous.

reign-malware-1000x520

Regin Malware
In what appears to be pre-financial cyber-attack hardware, on November 23, 2014. CNN published a report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure has been hijacked by the Regin malware and therefore any type of cyber-related attack on America’s financial infrastructure is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

Federal Security Breaches
If reports are to be believed, the U.S. federal government is highly susceptible to cyber-attacks, making the likelihood of a major financial cyber-hijack all the more believable. For example, on November 4, 2014, it was reported that a cyber-attack on a federal security contractor wasn’t noticed for months. Therefore, if the FED, NYSE or SEC is hacked in 2014, it won’t be noticed days or even weeks. This in essence allows the CIA to stage a financial-related attack whenever they want without any forewarning. Six days later on November 10, 2014, it was reported that federal firewalls are struggling against the increasing number of cyber-attacks. The timely report was designed to give the U.S. government plausible deniability in the wake of a financial-related terror attacks that bankrupt the U.S. economy. Also on November 10, 2014, the U.S, Postal Service was reportedly hacked, resulting in employee and customer information being compromised. Needless to say, the incident was designed to set the precedent for a far worse cyber-attack on the U.S. federal government, most likely the FED or SEC.

Financial Cyber-Attacks Trending
A preview of financial related cyber-terror recently occurred on July 10, 2014, when it was reported that Norwegian banks suffered the largest-ever DDoS attack in their history, an act which the state-sponsored terror group known as Anonymous predictably took credit for. Because all 206 countries are under the command and control of the CIA, events tend to happen in other countries before transpire in America on a much larger scale. Roughly 2-weeks later on July 25, 2014, the European Central Bank was allegedly hacked and personal data stolen. Roughly a month later on August 27, 2014, it was revealed that the FBI is now investigating a cyber-attack on JPMorgan. Roughly 3-weeks later on September 17, 2014, members from Anonymous and an Occupy Wall Street group reportedly abolishes nearly $4 million in student loan debt on September 17, 2014, foreshadowing the notion of Anonymous vanishing millions into thin air. Roughly 3-weeks alter on October 3, 2014, the New York Times published a report entitled “Hackers’ Attack Cracked 10 Financial Firms in Major Assault”, further foreshadowing financial-related cyber-terror. Also on October 3, 2014, it was reported that the JP Morgan data breach affected 76 million households, a laughable notion considering that the population of the U.S. is only 300 million people. A few weeks later on October 20, 2014, U.S. officials warned 500 million financial records may have been hacked. The timely propaganda report was evidently published in order to show that financial-related cyber-terror is imminent just prior to an unprecedented attack on the U.S. financial system. Taken collectively, these timely reports have set the precedent for future bank-related cyber-terror attacks, most likely targeting the FED, NYSE, or SEC.

NYSE Cyber-Attack
The latest New York Stock Exchange (NYSE) cyber-terror plot appears to be a redux of two previously foiled terror plots as depicted in the March 20, 2014 Truther.org report entitled “Impending Wall Street Banking Cyber-Heist to Transfer Billions to Bitcoin”, and the April 15, 2014 Truther.org report entitled “Feds Planning High Frequency Trading Cyber-Attack via “Heartbleed” Bug”. In short, hackers will cause a “High Frequency Trading” sell-off (which they will short-sell), the profits of which will be deposited in untraceable Bitcoin accounts. In order to provide a motive for a Bitcoin-related cyber-terror attack, the IRS declared that Bitcoin was not an official currency on March 25, 2014. Roughly 3-months later on June 13, 2014, it was revealed that the FBI will auction off seized Bitcoins worth $18m on June 27, 2014, the impending date of the attack. In order to raise the profile of banks prior to a debilitating cyber-terror attack that will likely bankrupt millions of investors, Vice President Joe Biden stated on June 23, 2014 that “I don’t have a savings account”. Two days later on June 25, 2014, the U.S. Federal Reserve warned that banks face “tougher tests” ahead, an ominous sign that a so-called “test” (i.e., attack) is imminent. Although impossible to prove, it appears that Bitcoin was specifically created to be an untraceable depository for stolen funds from a Wall Street cyber-attack. In other words, the hackers play the role of Robin Hood by stealing from the rich (i.e., Wall Street) and giving to the poor (i.e., Bitcoin)—the only catch being that Robin Hood is invisible.

Bank Terror Drills
In what appears to be cover drills for the controlled demolition of the U.S. economy, it was reported on October 10, 2014, that the U.S. and the UK will execute a “big bank collapse” simulation. According to reports, officials will “get together in a war room next week to see if they can cope with any possible fall-out when the next big bank topples over”. The banking collapse drill will reportedly involve Federal Reserve Chair Janet Yellen and Bank of England Governor Mark Carney, and be hosted by the U.S. Federal Deposit Insurance Corporation (FDIC). The drill will involve the hypothetical failure of U.S. banks, most likely the Federal Reserve. Needless to say, key term such as “collapse” and “topples over” are designed to foreshadow that a controlled demolition of the U.S. economy is indeed planned. Roughly 2-weeks late on October 26, 2014, it was reported that four in five Eurozone banks pass European Central Bank health test. Interestedly, the very next day, October 27, 2014, it was reported that 25 European Union banks failed a “stress test” exposing a $31billion shortfall. The bi-polar reporting was evidently designed to insinuate that banks are on the verge stressed to the point of collapse.

DHS Banking Continuity
In the wake of a major U.S. bank or stock market, a global financial panic in respect to the U.S. dollar will likely ensure. According to a December 10, 2004, CRS Report for Congress entitled “Homeland Security: Banking and Financial: Infrastructure Continuity”, bank terror and financial collapse have been planned for accordingly. According to the report, “H.R. 2043 sought to address bank risks under terrorism” and the Terrorism Risk Insurance Act of 2002 (TRIA) “provides a federal backstop for insurers willing to provide terrorism insurance”, ultimately protecting insurance banks against “catastrophic payouts in case of terrorist attacks”.  In other words, if and when a bank related terror attacks occur resulting in financial panic, private banks will not have to foot the bill for their losses because the U.S. government has assumed all the risk and liability. This convenient set-up essentially guarantees that the U.S. government, not the banks, will go bankrupt in the aftermath of bank related terror attacks.

The “Contagion Effect”
In the aftermath of U.S. bank failures (a bi-product of an irreversible U.S. stock market crash), other banks will begin to panic, setting off a chain reaction of banking collapses around the world. The aforementioned CRS Report for Congress found that when one bank goes, the rest will follow:  “Financial institutions face two categories of emergencies that could impair their functioning. The first is directly financial: danger of a sudden drop in the value of financial assets, whether originating domestically or elsewhere in the world, such that a global financial crisis might follow. The second is operational: failure of physical support structures that underlie the financial system. Either could disrupt the nation’s ability to supply goods and services and alter the behavior of individuals in fear of the disruption (or fear of greater disruption). They could reduce the pace of economic activity, or at an extreme, cause an actual contraction of economic activity”. The report went on to state that “Collapse of one prominent entity could evoke a contagion effect, in which sound financial institutions become viewed as weak — today’s equivalents of a bank run, in which panicked customers withdraw funds from many entities, causing others to fail as well”.

“Quantum Dawn II″ Terror Drill
Prior to a major cyber-terror attack on the New York Stock Exchange (NYSE), one would expect there to be some stock-market related terror drills to prepare Wall Street insiders for the attack. Coincidentally, on June 13th, 2013, it was reported that Wall Street executed “Quantum Dawn 2”, a cyber-terror war-game apparently meant to give insiders an opportunity to make financial moves before the market crashes—for good. According to the report, Cyber Strategies oversaw a terror exercise which included Citigroup, Bank of America, the Department of Homeland Security, the Treasury Department, the Federal Reserve, the Securities and Exchange Commission, as well as 40 other firms. The drill, which featured a hacker, possibly from China, operating from a fake trading platform, prompted a response in which the participants facilitated a conference call to “figure out what was going on”. In other words, the drill simulated a real-life scenario in which insider firms received the “heads up” about an impending cyber-attack and subsequently shared this information accordingly so that their bank accounts and those of their clients would not be affected. The same sort of thing occurred just prior to 9/11 when “put options” or bets were taken out on United Airlines and American Airlines, the two airline companies involved in the attacks. According to the “9/11 Commission Report”, “some unusual trading did in fact occur”, however, it claimed that, “each such trade proved to have an innocuous explanation”.

“Quantum Dawn II” Fallout
In the October 23, 2013, Fox Business report entitled “‘White Hat’ Hackers Expose Flaws of U.S. Stock Market”, the details of the “Quantum Dawn 2”  cyber-attack exercise were revealed. According to the report, ethical “white hat” hackers intentionally “looking to expose the cyber vulnerabilities of U.S. equity markets”, were able to directly impact market performance by “forcing a mock market close”. According to the report, more than 50 entities and 500 people in the financial services sector participated in the cyber-attack which was executed by the Securities Industry and Financial Markets Association (SIFMA) on July 18, 2013. So called “ethical hackers” were told to give everything they had to try and cripple the U.S. stock market during the 6-hour exercise. “Quantum Dawn 2 demonstrated the industry’s resiliency when faced with serious cyber-attacks that aimed to steal money, crash systems and disrupt equity market trading,” SIFMA CEO Judd Gregg stated. According to Cedric Leighton, a former U.S. intelligence officer, “The more realistic the exercise the better prepared they’ll be if and when attacks from a cyber standpoint occur”.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

sonypictureshack-640x1136

Download & Forward PDF

David Chase Taylor
December 20, 2014
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA will execute a massive and unprecedented cyber-related attack on Europe and/or the United States, scapegoating North Korea’s “Guardians of Peace” hackers.

Exactly what form this cyber-attack will take is not known, but the internet itself, the U.S. electrical grid, and web-related entities such as Apple, Google, Microsoft, and WordPress may be targeted. Although the attack could theoretically transpire at any time, it will most likely come in the coming days.

Back on December 13, 2014, the Sony Hackers promised to deliver a large “Christmas Gift”, inferring that North Korea is planning a surprise cyber-related attack around December 25, 2014. Therefore, a second and far more deadly cyber-related attack is expected just prior to, on, or shortly after Christmas Day.

Interestingly, on December 18, 2014, the U.S. House cybersecurity chairman warned that the electric grid or Wall Street may be the next cyber target of North Korea, confirming, albeit in a de facto manner, that North Korea will be scapegoated for a cyber-related attack on the U.S. power grid.

Also on December 18, 2014, the White House stated that the Sony hack is as national security matter, further confirming that a national security-related attack by North Korean is imminent. That same day, the files of more than 40,000 U.S. federal workers were breached, a cyber-attack which will likely be scapegoated onto North Korea.

Top North Korean Targets:

1. The Internet
2. U.S. Power Grid
3. Web Companies (Apple, Google, Microsoft, WordPress, etc.)

reign-malware-1000x520

Regin Malware
In what could be pre-North Korean cyber-attack malware, on November 23, 2014. CNN published a report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure has been hijacked by the Regin malware and therefore any type of cyber-related attack on America’s financial infrastructure is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

Kim Jong-un Under CIA Mind Control
Shortly after the mysterious death of North Korean President Kim Jong-il on August 24, 2012, his son, Kim Jong-un was placed into power. Since then, Jong-un has been routinely portrayed in the media as being mentally unstable, highly insecure, and willing to attack anyone at a moment’s notice. Not surprisingly, Kim Jong-un exhibits all the telltale signs of being brainwashed and under state-sponsored mind-control. Jong-un was reportedly spotted with his “handler” on numerous occasions while attending a “private school” in Switzerland. According to Wikipedia, “mind control” was first developed in Korea during the Korean War and involves a process in which a group or individual “systematically uses unethically manipulative methods to persuade others to conform to the wishes of the manipulator(s), often to the detriment of the person being manipulated”. Needless to say, Un is a patsy of the CIA who holds no real power. Like his father, he will be assassinated once he fulfills his respective mission which evidently consists of an unprovoked attack on the United States while Obama is in office.

grid2exfp

“GridEx II” Power Grid Drill
Considering that on November 13-15, 2013, a massive power grid terror drill entitled “GridEx II” was executed on the East Coast of America, there is a real possibility that a massive nuclear EMP attack could turn the lights out on America for good. According to the August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss