Archive for the ‘Hawaii Terror’ Category

china-nuke

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history and may try and assassinate me Switzerland, especially since I have decifered the code (i.e., the Davinci Code) which is used by Greenland to plot terror attacks in the underworld via the CIA, hence the long list of foiled terror attacks and timely Truther.org terror alerts.

TRUTHER.ORG TERROR ALERT TIMELINE

1. DEC 11, 2013: Comet ISON Declared Dead: Truther.org Alert: 1 Day Prior
2. JAN 13, 2014: Wesley Chapel Theater Shooting: Truther.org Alert: 38 Days Prior
3. MAY 23, 2014: Santa Barbara Massacre: Truther.org Alert: 26 Days Prior
4. OCT 28, 2014: 
Antares Rocket Launch Explosion: Truther.org Alert: 1 Day Prior
5. NOV 20, 2014:
Florida State University Shooting: Truther.org Alert: 2 Days Prior 
6. JUN 19, 2015:
Golden State Warriors Victory Parade Shooting: Truther.org: Same Day
7. OCT 1, 2015: 
Umpqua Community College Shooting: Truther.org Alert: 7 Days Prior
8. NOV 27, 2015: Planned Parenthood Shooting:  Truther.org Alert: 1 Day Prior
9. NOV 13, 2015:
Paris Terror Attacks: Truther.org Alert: 4 Days Prior 
10. DEC 5, 2015:
London Undergroud Jihad Attack: Truther.org Alert: 9 Days Prior 
11. DEC 25, 2015:
The Philippines Terror Attack: Truther.org Alert: 1 Day Prior

[Does not purport to be complete list of timely Truther.org terror alerts]

SHOCK: 10 Reasons Why the Paris Terror Attacks Were Executed by the CIA

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
January 5, 2016
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese surprise attack and/or invasion of America, Japan and/or the Philippines this week which will predictably lead to World War III.

The notion that war will find Obama while on vaction in Hawaii was foreshadowed in a Washington Post report from December 21, 2015, entitled “The War in Afghanistan Follows Obama to His Vacation in Hawaii“.  The report stated that Obama does not support “the idea of endless war”, something which would transpire in the aftermath of a Chinese attack.

In what appears to be pre-World War III programming, it was reported on December 21, 2015, that the Pentagon is now preparing for war with China. The timely propaganda report stated that the DOD is intent on triggering a military conflict with China over disputed islands in the South China Sea, likely at Clark Air Base in the Philippines where the U.S. has stationed numerous Boeing P-8A Poseidon advanced maritime surveillance aircraft.

The impending Chinese attack will likely involve one or more of the following: a) conventional nuclear attack; b) a TV-related cyber-hijack and subsequent nuclear attack; c) an EMP attack; and/or d) the full-scale Chinese invasion of Australia, Hawaii, Japan, the Philippines, Taiwan, and/or mainland U.S.

Consequently, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

That being said, the U.S. Navy began Annual Exercise 16 on November 16, 2015, a naval war game between Japan and the United States which featured the USS Ronald Reagan aircraft carrier. Consequently, a made-for-TV Chinese aerial attack on iconic aircraft carrier is expected.

Annual Exercise 16 was likely executed in order to provide a timely motive for an unprovoked attack by China on Japan which will likely result in the first ever Chinese beachhead and military base in Japan, a country which is currently home to numerous U.S. military bases.

In order to foreshadow the aformentioned attack on the USS Ronald Reagan aircraft carrier, the Washington Free Beacon published a report on December 15, 2015, entitled “Chinese Submarine Practiced Missile Attack on USS Reagan“. The incident  violated China’s 2014 commitment to the multinational Code for Unplanned Encounters at Sea, known as CUES, designed to reduce the risk of a shooting incident between naval vessels.

Four days later on December 19, 2015, USA Today published a report entitled “China Urges U.S. to Stop ‘Provocative Actions’ after B-52 Flights”, an action allegedly taken by the U.S. on December 10, 2015, which is designed to provide a timely motive for a revenge-like attack on America by China.

This notion was confimed the very same day on December 19, 2015, when the Examiner published a report entitled “China Blames U.S. for ‘Serious Military Provocation;’ Will Take Action“. Said action will likley be in the form of a suprise attack on Hawaii, Japan, the Philippines and/or mainland United States.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 20 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

China pearl harbor

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan
12. South China Sea (Disputed Islands)

South China Sea Attack
Based on breaking news and events, it appears that the CIA is plotting a Chinese attack on the U.S Navy which has ships trolling the disputed islands within the South China Sea. This latest Chinese attack narrative was first identified back on October 15, 2015, when the Guardian published a report entitled “Chinese Media: Military Must be Ready to Counter US in South China Sea”, foreshadowing that a confrontation may be imminent. Nine days later on October 24, 2015, Yahoo News published a report entitled “U.S. Patrols to Raise Stakes with Beijing in Disputed South China Sea”, further raising the specter of a naval confrontation with China. Three days later on October 27, 2015, Reuters published a report entitled “Angry China Shadows U.S. Warship Near Man-Made Islands”, foreshadowing a Chinese attack on the USS Lassen destroyer. Lastly, in what appear to be the final warning by China just prior to a surprise revenge-like attack, it was reported on October 27, 2015, that China has officially warned the United States after the USS Lassen passes near the disputed islands. Needless to say, these reports, taken collectively, suggest that a confrontation between the U.S. and China in the South China Sea is imminent.

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China pearl harbor

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
November 8, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese attack and/or invasion, most likely targeting the United States or her military, most likely in San Diego, Hawaii and/or the South China Sea.

The impending Chinese attack will likely involve one or more of the following: a) a cyber-related attack on the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Australia Hawaii, Japan, Taiwan, the Philippines and/or mainland United States.

Consequently, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 17 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan
12. South China Sea (Disputed Islands)

South China Sea Attack
Based on breaking news and events, it appears that the CIA is plotting a Chinese attack on the U.S Navy which has ships trolling the disputed islands within the South China Sea. This latest Chinese attack narrative was first identified back on October 15, 2015, when the Guardian published a report entitled “Chinese Media: Military Must be Ready to Counter US in South China Sea”, foreshadowing that a confrontation may be imminent. Nine days later on October 24, 2015, Yahoo News published a report entitled “U.S. Patrols to Raise Stakes with Beijing in Disputed South China Sea”, further raising the specter of a naval confrontation with China. Three days later on October 27, 2015, Reuters published a report entitled “Angry China Shadows U.S. Warship Near Man-Made Islands”, foreshadowing a Chinese attack on the USS Lassen destroyer. Lastly, in what appear to be the final warning by China just prior to a surprise revenge-like attack, it was reported on October 27, 2015, that China has officially warned the United States after the USS Lassen passes near the disputed islands. Needless to say, these reports, taken collectively, suggest that a confrontation between the U.S. and China in the South China Sea is imminent.

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China pearl harbor

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

WORLD WAR III: CIA Plotting Proxy War Between US & Russia in Syria to Spark World War III—Russian-Based Nuclear Missile Strike on US and/or Russian-Based Attack/Invasion of Alaska, Syria and/or Ukraine Imminent

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BOOM: CIA Plotting Man-Made Asteroid Strike this September—JADE HELM States & Gulf of Mexico Most Likely to Suffer Attack

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
September 26, 2015
Truther.org

SWITZERLAND, Zurich —Based on breaking news and events, it appears CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese attack and/or invasion, most likely targeting the countries of Australia, Japan, the Philippines, Taiwan, and/or the United States.

The impending Chinese attack will likely involve one or more of the following: a) a cyber-related attack on the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Australia Hawaii, Japan, Taiwan, the Philippines and/or mainland United States.

That being said, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 14 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China pearl harbor

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

JADE HELM 15: CIA Plotting ISIS Invasion of America, Oak Keeper Massacres, Wave of Domestic/Jihad Terror Attacks, Predator Drone Strikes, Suspension of 2016 US Presidential Election, Martial Law & Obama Dictatorship

BUSTED: Alex Jones Flees America after Being Linked to Obama Plot to Spark a Civil War in Texas During JADE HELM 15

WORLD WAR III: CIA Plotting War III between US & Russia—Staged Russian Invasion of Alaska Imminent

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING: CERN Complex in Switzerland Identified as CIA Headquarters

SHOCK: Death Star Appears Over CERN, Switzerland, Home of the CIA

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
September 3, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears the CIA in Switzerland is preparing to stage a surprise Chinese attack and/or nuclear detonation, most likely targeting the countries of Australia, Japan, Taiwan, the Philippines and/or the United States.

The impending Chinese attack will most likely involve one or more of the following: a) a cyber-related attack targeting the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Australia Hawaii, Japan, Taiwan, the Philippines and/or mainland United States.

That being said, the most likely Chinese attack scenario is the full-scale Chinese attack/invasion of Hawaii, a drone-related cyber-hijack and attack on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, etc.) followed by a full-scale nuclear attack on Las Vegas and/or Los Angeles.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 13 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

In what appears to be pre-Chinese attack/invasion of Taiwan programming, it was reported on August 6, 2015, that Beijing has warned Taiwan against a return to “evil ways” of independence. Translation: a surprise Chinese attack on Taiwan is likely forthcoming, making the island dependent.

Four days later on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, the Financial Times published a report entitled “Chinese Launch Floating Fortress Project”. The timely report was evidently designed to foreshadow a Chinese naval attack, most likely against Taiwan and/or the United States.

That same day, August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In what may be one of the slated Chinese targets, it was reported on August 14, 2015, that the Philippines will open a military base near the disputed sea with China. According to reports, U.S. forces will be present, providing a motive for a revenge-like attack by China.

In what appears to be the war game for a Chinese attack and subsequent invasion, it was reported on August 16, 2015, that China staged naval drills in the Sea of Japan which trained for beach landing. Consequently, the full scale invasion of Hawaii, Japan or Taiwan by China may be imminent.

In what appears to be pre-Chinese attack/invasion programming, more than 10 countries will join China’s massive military parade on September 3, 2015, which appears to be a global publicity stunt designed to show off China’s military strength just prior to a staged attack.

This notion was confirmed by CNN on August 30, 2015, when they published a report entitled “Military Parade to Lift Curtain on China’s ‘Game-Changing’ Missiles, Fighter Fleet” which foreshadowed that the game is about to change in respect to the China’s military.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

The notion that the aforementioned Chinese military parade will lead to war was foreshadowed by a Russia Today report from August 31, 2015, entitled “Dogs of Western Resentment Bark as Chinese WWII Parade Passes”, further raising the specter of Chinese resentment of the West just prior to a staged attack.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting a future confrontation between the U.S. and China.

Lastly, in what appears to be the state-sponsored war games for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing the largest naval exercise yet. Said drill will likely involve an unprovoked attack/invasion of Australia, Hawaii, Japan, Taiwan, the Philippines or the continental United States.

Top Chinese Attack Locations
Although a Pearl Harbor-like surprise attack against the United Stated by China could theoretically transpire in any American city or U.S. military base, the following seven location are the most likely due to their name recognition and close proximity to the Pacific Ocean.

Potential Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan

Cyber War China

Chinese Cyber Attack  on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Chinese EMP Nuke Drone Attack

Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

I. CHINESE CYBER-ATTACK:

u-s-government-warned-of-9-11-like-cyber-attack-67071d7042

1.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

1.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

1.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

II: CYBER-HIJACK DRONE ATTACK:

2.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

drone

2.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

2.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

2.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

2.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

2.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

III. CHINESE NUCLEAR ATTACK:

3.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

Live TV Nuke

3.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

IV. CHINESE EMP ATTACK:

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

NASA Flying Saucer

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, am currently in the process of applying for political asylum in Switzerland, which is coincidentally home to the CIA, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more publicity or credibility than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, consider this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may attempt to assassinate me Switzerland.

ISIS ENDGAME: How and Why the CIA in Switzerland Created ISIS as Cover for Nuclear and Biological Terror Attacks

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
June 2, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA in Switzerland) will execute a cyber-related terror attack on NASA’s revolutionary ‘flying saucer’ test flight which is slated for Wednesday, June 3, 2015 in Hawaii.

Exactly what type of attack is planned is not known, but it’s highly likely that NASA’s flying saucer rocket launch will suffer some with some form of cyber-related terror attack by China, likely causing a massive EMP-like explosion, knocking out electricity on the West Coast of America.

In order to bring unprecedented media publicity to NASA’s flying saucer just prior to a state-sponsored terror attack, Fox News published a report back on May 29, 2015, entitled “‘Woodstock of UFOs’ Event is Bigger than Ever in Third Year”.

In order to focus the national spotlight onto China and Chinese ships just prior to a cyber-related terror attack on NASA’s rocket and flying saucer from a Chinese ship or sub in the Pacific Ocean, it was reported on June 2, 2015, that hundreds are missing after a passenger ship sunk in China.

An attack on NASA’s flying saucer would be a redux of the Minotaur V launch of September 6, 2013, and the Minotaur Rocket launch of November 1, 2013, both of which were specifically launched so that a cyber-attack and subsequent EMP explosion could occur.

In order to psychologically program the masses for the demise of America’s electrical power grid, the Washington Examiner published a report back on April 21, 2015, entitled “DOE Warns ‘Modern Life’ Threatened by Terror, Climate Threats to Electric Grid”.

In what appears to be a preview of blackouts to come, it was reported on May 18, 2015, that the city of San Francisco suffered a two hour blackout. Needless to say, the blackout was ordered by the CIA in order to set the precedent for an impending state-sponsored blackout.

Lastly, less than 24-hours later on May 19, 2015, the World Bank published an ominous report which found that one in seven people still live without electricity. The timely report was designed to highlight the notion of people living without electricity just prior to a state-sponsored terror attack on the power grid.

antares_explosion.jpg.CROP.original-original

FLASHBACK: Antares Rocket Explosion
Back on October 27, 2014, Truther.org published a report entitled “Cyber-Attack and Subsequent EMP Planned for Antares Rocket Launch on OCT 27”. Interestingly, the launch was scrubbed until October 28, 2014, when the Antares rocket inexplicable blew up on the launch pad in Wallops, Virginia. Evidently, the rocket’s payload was purposely detonated in order to set the precedent for a future cyber-related attack on a U.S. rocket. In other words, the rocket was blown up in order to show the public the power of a rocket explosion just prior to a rocket explosion in midflight that will result in an EMP, knocking out electricity in America for good. Once an EMP attack using a rocket has commenced, the October 28, 2014 rocket explosion will predictably be labeled a foreign cyber-attack by the U.S. government.

20130605_emp_attack_large

What is an EMP?
A Nuclear EMP is a burst of electromagnetic radiation which usually results from a high energy nuclear explosion that suddenly fluctuates the magnetic field. Theoretically, an EMP could wipe out everything electronic (planes, trains, cars, computers, internet, etc.) in a flash. EMP terror has gained popularity of late and has been featured in movies such as “The Matrix” and television shows such as “24” and the #1 show on NBC entitled “Revolution”, which eerily features a post-EMP America with no electricity. Aside from the Hollywood EMP propaganda, there has been recent EMP terror legislation by the U.S. congress, a number of EMP terror conferences, and EMP terror scholarly whitepapers which have all been preparing local, state and federal officials for an upcoming EMP terror attack on America. Based on the 12 major power outages in 2012 alone, it appears that the U.S. government is programming the public for the permanent loss of electricity. Coincidentally, in September of 2012, Alex Jones of Infowars released a new magazine which indicates that the STRATFOR intelligence operation known as Infowars knows that the internet is about to expire and have planned ahead by launching a new propaganda magazine. In the propaganda film entitled “Red Dawn” (2012), (See: Trailer) a group of American youth out partying after a football game, suddenly find themselves in the middle of a major blackout, likely from an EMP attack.

China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

grid2exfp

“GridEx II” Power Grid Drill
Considering that on November 13-15, 2013, a massive power grid terror drill entitled “GridEx II” was executed on the East Coast of America, there is a real possibility that a massive nuclear EMP attack could turn the lights out on America for good. According to the August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.”

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Edit

chinainvadesamerica

Download & Forward PDF

David Chase Taylor
April 14, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA in Switzerland has ordered the Chinese government to execute a surprise attack upon the United States, most likely in Hawaii and/or California.

The impending Chinese attack will likely involve on or more of the following terror scenarios: a) a cyber-attack on U.S. military; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Hawaii or mainland United States.

Exactly which combination of the aforementioned scenarios will be implemented is not known, but it will most likely involve a surprise Chinese attack on Naval Station Pearl Harbor followed by the full-scale Chinese invasion of Hawaii. Once China has the full attention of the world, they will likely execute an unprecedented TV-related cyber-attack which will show the world nuclear bombs detonating in Los Angeles.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads.

As reported ad nausea, the Swiss CIA is actively attempting to trigger World War III between the U.S. and China. To date, at least 9 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of these various Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although impossible to confirm, it appears that these officials in China were executed due to their first-hand knowledge of the aforementioned war plots which were ultimately foiled.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles. 

Top Chinese Attack Locations
Although a Pearl Harbor-like surprise attack against the United Stated by China could theoretically transpire in any American city or U.S. military base, the following seven location are the most likely due to their name recognition and close proximity to the Pacific Ocean.

Potential Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor

U.S. vs. China Trending
Recent reports in respect to China suggest that they are about to strike the United States. For example, back on August 21, 2014, it was reported that a Chinese jet carried out an “aggressive” intercept of a U.S. Navy intelligence jet, a potential act of war. Two days later on August 23, 2014, it was reported that the U.S. sent a second aircraft carrier to Asia amid tensions with China. In the wake of a Chinese attack, the carrier deployment by Obama will likely be cited as the motive for the drone attack. Three days later on August 26, 2014, it was reported that a futuristic Chinese “supersonic” sub could reach America’s shores in less than two hours. The report was evidently designed to show that the Chinese can attack America whenever they want. A day later on August 27, 2014, it was reported that a Chinese fighter jet’s interception of a U.S. Navy sub-hunter aircraft was possibly triggered when the American plane dropped a sonar surveillance system into the South China Sea. The incident was designed to be a U.S. provocation that could theoretically be construed as an act of war. Lastly, on September 9, 2014, it was reported that U.S. National Security Adviser Susan Rice stated that China and the United States should avoid close calls between their respective militaries. The statement by Rice was evidently made in order to show that the U.S. and China are on thin ice and one event could trigger an all-out war between the two nuclear powers.

Chinese EMP Nuke Drone Attack

Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

I. CHINESE CYBER-ATTACK:

u-s-government-warned-of-9-11-like-cyber-attack-67071d7042

1.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

1.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

1.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

II: CYBER-HIJACK DRONE ATTACK:

2.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

drone

2.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

2.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

2.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

2.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

2.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

III. CHINESE NUCLEAR ATTACK:

3.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

Live TV Nuke

3.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

IV. CHINESE EMP ATTACK:

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

5b8enuclear-kim

Download & Forward PDF

David Chase Taylor
March 25, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the CIA in Switzerland is preparing to stage a North Korean nuclear attack upon the United States. Although the impending attack could theoretically target Los Angles, San Diego, San Francisco or Seattle, the islands of Hawaii appears to be the slated target.

In order to draw unprecedented media attention to Hawaii just prior to a North Korean nuclear attack, the New York Post published a report on March 20, 2015, entitled “Did Obama Just Buy a Hawaiian Mansion?”. In the wake the impending attack, it will predictably be stated that Hawaii was nuked because it’s Obama’s home state, allegedly.

The impending nuclear attack by North Korea will likely result in a Nuclear EMP (see below) that will render a majority of the West Coast electricity-less, possibly forever. In other words, Hawaii will be nuked while electricity on the West Coast of America will simple be turned off, most likely for good. This particular terror scenario gives the Swiss CIA a two-for-one if you will.

In order to provide a timely motive for an unprovoked nuclear attack by North Korea, it was reported back on February 3, 2015, that the UN is demanding that the North Korean regime be ‘dismantled’. Roughly 2-weeks later on February 21, 2015, Kim Jong Un personally inspected an artillery drill near the China Sea, a report designed to show that North Korea is flexing their military muscle.

In what appears to be more North Korean military flexing just prior to an unprecedented nuclear attack upon America, it was reported on March 17, 2015, that North Korea fired missiles into the China Sea amid tensions with South Korea, America’s #1 ally in the region.

In the wake of a North Korean nuclear attack upon the United States, it will likely be said that North Korea received information and technology from China and/or Russia. Interestingly, on March 17, 2015, it was reported that North Korean dictator Kim Jong Un was in Moscow for Victory Day, possibly plotting an attack on America.

In what appears to be pre-North Korean nuclear attack programming and propaganda, it was reported on March 17, 2015, that South Korea is now blaming North Korea for a nuclear reactor cyberattack. The alleged attack was designed to set the precedent for a nuclear-related attack by North Korea.

Three days later on March 20, 2015, it was reported that North Korea is now “prepared” to fire a nuclear missile. The timely propaganda report was designed to show that North Korea is now preparing to launch a nuclear attack, most likely using an ICBM missile.

In order to raise the notion of an Intercontinental Ballistic Missile (ICMB) attack within the Pacific Theater, it was reported four days later on March 24, 2015, that the U.S. test-fired an intercontinental missile in California. The timely report was designed to make the notion of a West Coast nuclear attack seem all the more plausible.

Lastly, in what appears to be pre-EMP attack programming, Fox News published a report on March 24, 2015, entitled “Bracing for a Big Power Grid Attack: ‘One is Too Many. In the wake of a North Korean nuclear strike on America, the power grid on the West Coast will predictably fail, possible forever.

I. NORTH KOREA NUCLEAR ATTACK:

1.1: North Korean Nuclear Attack
Prior to executing an alleged North Korean nuclear attack on the United States, the CIA must establish a believable narrative through their governments and media platforms that North Korea has an active nuclear weapons program. For example, on April 4, 2014, North Korea told the world “wait and see” about its latest nuclear test. Roughly a month later on May 10, 2014, North Korea threatened to conduct a “counter-measure” nuclear test. A few months later on July 28, 2014, North Korea threatened a nuclear strike on White House, showing that they are planning to attack while Obama is in office. On September 23, 2014, it was reported that North Korea is developing new missiles capable of carrying tactical nuclear warheads. In order to create the narrative that a North Korean nuclear attack is in fact possible, it was reported on September 15, 2014, that South Korea has now confirmed that North Korea has modified their subs to launch missiles. Nine days later on September 24, 2014, it was reported that North Korea may launch a ballistic missile from one of their submarines. Roughly 2-months later on November 2, 2014, it was reported that North Korea has modernized its Soviet missile-capable submarines, confirming that a submarine-based nuclear strike by North Korea is the working terror narrative. Back on October 24, 2014, a U.S. general stated that North Korea may have nuke missile knowhow. In other words, a nuclear strike on the United States by North Korea is being planned by the CIA and U.S. generals have been instructed to speak about it publically so that the public will already be acclimated to the idea when it happens. Showing the duplicity of the U.S. government, a United Nations report from March 29, 2014, found that U.S. parts are now in North Korean rockets. In the wake of a North Korean EMP attack, parts of the rocket will be blown across the U.S. Therefore, the report was published premeditatively in order to counter any “conspiracy theories” that the rocket was made and launched by the U.S. military. Needless to say, these reports, taken collectively, suggest that an unprecedented nuclear attack by North Korea is imminent.

130411184420-tsr-lawrence-north-korea-missiles-nuclear-capable-00002010-story-top

1.2: Nuclear Tests by North Korea
As evidenced, North Korea has continued their nuclear tests regardless of the sanctions imposed by the United Nations. With each passing nuclear test, the respective yield of the test jumps considerably higher. Therefore, the 4th nuclear test (or the 1st nuclear attack) by North Korea should yield somewhere in the neighborhood of 25-40 kilotons of TNT, an amount on par with Pakistan’s nuclear program. According to physicists who testified before a U.S. Congressional hearing on October 7, 1999, nuclear weapons with yields of 10 kilotons or less can produce a large EMP capable of destroying the electrical grid.

North Korean Nuclear Test Timeline:

1. October 9, 2006: 1st Nuclear Test: Device: Fission: Type: Underground: Yield: 0.5 kilotons of TNT
2. May 25, 2009: 2nd Nuclear Test: Device: Fission: Type: Underground: Yield: 2.35 kilotons of TNT
3. February 12, 2013: 3rd Nuclear Test: Device: Fission: Type: Underground: Yield: 6-9 kilotons of TNT

1.3: North Korea’s Missile Program Active
In order to show the world that North Korea’s missile program is active prior to an earth-changing nuclear EMP attack on the United States, it was reported on November 26, 2013, that Iran and North Korea are secretly developing long-range rocket boosters for nuclear ICBM missiles. Most recently, on October 2, 2014, it was reported that North Korea has completed an upgrade to its space center in order to house larger rockets. The report states that a fresh launch by North Korea is expected within the year. As evidenced below, North Korea’s missile program is hype-active which suggests that a missile attack is imminent.

2014 North Korea Missile Timeline:

1. March 26, 2014: N. Korea fires 2 missiles as its rivals meet
2. April 1, 2014: North Korea sending message to U.S. with missile barrage
3. June 29, 2014: North Korea fires two missiles, raising tensions
4. July 9, 2014: North Korea fires missiles into the sea
5. July 26, 2014: North Korea fires short-range missile into sea
6. August 14, 2014: Pope Francis calls for peace on Korean Peninsula as North fires projectiles

[Does not purport to be a complete list of North Korean missile launches]

II. NORTH KOREAN NUCLEAR EMP ATTACK:

nk-emp

2.1: North Korean EMP Attack
Prior to executing an alleged North Korean nuclear EMP attack on the United States, the CIA must establish a believable narrative through their governments and media platforms that North Korea has an active EMP weapons program. For example, on June 16, 2011, it was reported that North Korea tested a “super-EMP” nuclear weapon. Roughly 18-months later December 19, 2012, the Washington Times reported that a North Korean EMP attack could destroy United States and that Obama must take immediate action to avoid this scenario (which he obviously has not). Roughly a year later on November 5, 2013, it was revealed that North Korea is indeed developing “electromagnetic pulse weapons”. Less than a year later on April 9, 2014, a DHS study found that North Korea is indeed capable of launching an EMP attack on the United States. Roughly a month later on May 8, 2014, a hearing on Capitol Hill found that America’s electric grid is vulnerable to an EMP attack. In order to provide plausible deniability for the U.S. government after an EMP attack, it was reported on August 19, 2014, that the U.S. is defenseless against a North Korean EMP attack. Needless to say, these reports, taken collectively, suggest that an unprecedented nuclear EMP attack by North Korea is imminent.

2.2: Blackouts Trending
In order to psychologically program the America and the world for the eventual loss of electricity, it was reported on November 2, 2014, that a country-wide blackout occurred in Bangladesh after the power grid inexplicably collapsed. Exactly one month later on December 2, 2014, it was reported that the entire city of Detroit, Michigan went dark after a massive power outage. Roughly 2-weeks later on December 15, 2014, a car crashed into a power pole, knocking power out in 2 North Carolina counties. Considering that a single car crash should only cause a localized blackout, it can be deduced that the power outage was part of the programming for a future in which there is no electricity in America. Coincidentally, American electricity companies (at the behest of the CIA) have been drilling this exact scenario as depicted in the August 16, 2013, New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow”.

20130605_emp_attack_large

2.3: What is an EMP?
An Nuclear EMP is a burst of electromagnetic radiation which usually results from a high energy nuclear explosion that suddenly fluctuates the magnetic field. Theoretically, an EMP could wipe out everything electronic (planes, trains, cars, computers, internet, etc.) in a flash. EMP terror has gained popularity of late and has been featured in movies such as “The Matrix” and television shows such as “24” and the #1 show on NBC entitled “Revolution”, which eerily features a post-EMP America with no electricity. Aside from the Hollywood EMP propaganda, there has been recent EMP terror legislation by the U.S. congress, a number of EMP terror conferences, and EMP terror scholarly whitepapers which have all been preparing local, state and federal officials for an upcoming EMP terror attack on America. Based on the 12 major power outages in 2012 alone, it appears that the U.S. government is programming the public for the permanent loss of electricity. Coincidentally, in September of 2012, Alex Jones of Infowars released a new magazine which indicates that the STRATFOR intelligence operation known as Infowars knows that the internet is about to expire and have planned ahead by launching a new propaganda magazine. In the propaganda film entitled “Red Dawn” (2012), (See: Trailer) a group of American youth out partying after a football game, suddenly find themselves in the middle of a major blackout, likely from an EMP attack.

2.4: “GridEx II” Power Grid Drill

Considering that on November 13-15, 2013, a massive power grid terror drill entitled “GridEx II” was executed on the East Coast of America, there is a real possibility that a massive nuclear EMP attack could turn the lights out on America for good. According to the August 16, 2013, a New York Times report entitled “As Worries Over The Power Grid Rise, A Drill Will Simulate A Knockout Blow” was published which stated that “the electric grid, as government and private experts describe it, is the glass jaw of American industry. If an adversary lands a knockout blow, they fear, it could black out vast areas of the continent for weeks; interrupt supplies of water, gasoline, diesel fuel and fresh food; shut down communications; and create disruptions of a scale that was only hinted at by Hurricane Sandy and the attacks of Sept. 11”. According to the report, “Thousands of utility workers, business executives, National Guard officers, F.B.I. antiterrorism experts and officials from government agencies in the United States, Canada and Mexico are preparing for an emergency drill in November that will simulate physical attacks and cyber-attacks that could take down large sections of the power grid. They will practice for a crisis unlike anything the real grid has ever seen, and more than 150 companies and organizations have signed up to participate.

Kim Jon-un visits submarine

Kim Jong-Un Under Swiss CIA Mind Control
Shortly after the mysterious death of North Korean President Kim Jong-il on August 24, 2012, his son, Kim Jong-un was placed into power. Since then, Jong-un has been routinely portrayed in the media as being mentally unstable, highly insecure, and willing to attack anyone at a moment’s notice. Not surprisingly, Kim Jong-un exhibits all the telltale signs of being brainwashed and under state-sponsored mind-control. Jong-un was reportedly spotted with his “handler” on numerous occasions while attending a “private school” in Switzerland. According to Wikipedia, “mind control” was first developed in Korea during the Korean War and involves a process in which a group or individual “systematically uses unethically manipulative methods to persuade others to conform to the wishes of the manipulator(s), often to the detriment of the person being manipulated”. Needless to say, Un is a patsy of the CIA who holds no real power. Like his father, he will be assassinated once he fulfills his respective mission which evidently consists of an unprovoked attack on the United States while Obama is in office.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored whistle-blower website. Taylor lives in Zurich, Switzerland where he is currently in the process of applying for political asylum since the release of The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor recently authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: In the Event of My Death Prior to July 19, 2015—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

 

obama

Download & Forward PDF

David Chase Taylor
December 28, 2014
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA) will attempt to execute an assassination/terror attack on President Obama while on Christmas vacation in Hawaii.

In order to bring unprecedented media publicity to “racists” who hate Obama just prior to an attack, it was reported on December 27, 2014, that North Korean puppet King Jong Un called Obama a monkey. The racist slur was no doubt concocted by the CIA in order to set the precedent for race-related terror against Obama’s person.

A day prior to on December 26, 2014, it was reported that untrained and unpaid volunteers are now driving vehicles in Obama’s presidential motorcade. The timely propaganda report was published in order to foreshadow the notion that people in Obama’s motorcade are unprofessional and could be compromised, making the likelihood of an attack seem all the more plausible.

That same day, December 26, 2014, it was also reported that a California woman boasted of driving in President Obama’s motorcade despite lack of formal training. The fact that the woman is from California suggests that the alleged attackers will travel from California to Hawaii in order to attack Obama.

Two days prior on December 24, 2014, it was reported that the White House press lost track of Obama’s motorcade in Hawaii. The timely report was designed to foreshadow a future attack on Obama’s motorcade in Hawaii which will likely be hijacked by state-sponsored terrorists.

Back on December 7, 2014, it was reported that Obama was whisked away to a hospital by his motorcade and given a CAT scan. The report was evidently designed to consummate the terms “Obama” “motorcade” and “hospital” just prior to a motorcade-related terror attack in which Obama is injured.

An elaborate assassination “event” will do the same for Barack Obamas as it did for one Adolf Hitler. Back on July 20, 1944, Hitler was targeted in an unsuccessful bombing, resulting in 5,000 executions and 7,000 arrests. In the wake of an Obama assassination “event”, the attack will be used as an excuse to round up “disloyal” Americans in the U.S. government, bringing about the naked dictatorship of Obama.

Considering Obama’s poll numbers are at an all-time low, an assassination event would boost his popularity as well as the Democrats who suffered historic losses in November’s election. An attack could also be used to institute some form of martial law, possibly to find the alleged assassin, making every American gun owner a suspect.

The notion that Obama is vulnerable to an attack was recently witnessed on October 3, 2014, when it was revealed the Secret Service allowed a fake congressman to sneak backstage at Obama event in Washington, D.C. Needless to say, the event was staged in order to set the precedent for a similar event that will likely culminate with an attack on Obama’s person.

Obama Targeted
Prior to an attack on Obama, the public must be convinced through fabricated events that this is indeed possible. Consequently, a number of events regarding Obama have occurred in the last few weeks which have set the stage for an assassination “event”. For example, on October 15, 2014, an official from Missouri called for military coup against Obama. The timely and shocking statement was evidently made in order to foreshadow a military-related attack on Obama, possibly via a sniper. In what appears to be pre-Obama assassination terror conditioning, it was reported on October 23, 2014, that a man was stopped after scaling White House fence. Whether the man was planning to attack Obama is not known, but the event was likely staged in order to show that Obama is under threat. Three days later on October 26, 2014, it was reported that the man who drove his car into a Ten Commandments monument made statements about President Obama, included threats to kill him. The incident was likely staged as well in order to show that white American males want to kill Obama. Four days later on October 30, 2014, USA Today published a report entitled “Love Triangle Led to Obama Visit Threat, Feds Say”. The timely report was in respect to a Yonkers man who was plotting to kill President Obama during his August 2014 visit to Westchester County, New York. The incident was evidently rehashed in order to show that Obama is being targeted. In order to set the precedent for an attack on Obama’s person while in Las Vegas, it was reported on November 21, 2014, that Secret Service agents arrested a woman with a gun outside the White House Thursday night, November 20, 2014, shortly after President Obama delivered an address to the nation on immigration.

sddefault

Secret Service in Chaos
In what appears to be pre-Obama assassination programming, The Telegraph published a report on September 29, 2014, entitled “Is Barack Obama’s Life Safe in the Secret Service’s Hands?“. The ominous report was evidently designed to foreshadow that an attack on Obama’s person is imminent. With the resignation of Chief Julia Pierson, the director of the Secret Service, on October 1, 2014, the Secret Service has never looked more vulnerable to an attack. Pierson’s resignation came in the wake of several security breaches that were designed to set the precedent for an attack on the Obama White House. In what appears to be pre-Obama assassination terror programming, the Huffington Post published a report on October 1, 2014, entitled “Politico Piece Says Obama’s Assassination Might Be Only Thing That Could Improve Secret Service”. Two days later on October 3, 2014, it was reported that the Secret Service allowed a fake congressman to sneak backstage at Obama event in Washington, D.C., ultimately setting the precedent for a similar event in California. Roughly a week later on October 9, 2014, a former agent stated that the Secret Service is now in collapse. Needless to say, the aforementioned reports have made the U.S. Secret Service look weak, making the likelihood of an attack on President Obama all the more likely.

Obama Under Threat
Since 2007, there have been over 100 Obama assassination threats and plots in which individuals were either questioned, arrested, detained or convicted for making death threats against Obama. It appears that most if not all of these Obama-related assassination events were staged in order to give the impression that Obama is in tremendous danger, especially due to his race. Whether people like Obama or not, the staged or real assassination of Obama must be stopped at all costs. An assassination “event” of Obama would ultimately divide America between black and white, Democrat and Republican, and would inevitably cause riots, looting, violence, bloodshed and chaos across America.

FLASHBACK: White House Dinner Assassination Plot
Back on May 2, 2014, Truther.org issued a terror warning in respect to the 2014 White House Correspondences’ Association (WHCA) which took place on May 3, 2014. Interestingly, three days later on May 6, 2014, a car allegedly trailing President Obama daughters’ motorcade prompted a White House lockdown. What exactly a suspicious car had to do with the White House is not known, but evidently the subsequent lockdown provided the necessary cover needed so that weapons and/or explosives could be removed from the White House premises without drawing any suspicion.

FLASHBACK: MSNBC Assassination Plot
Back on December 4, 2013, Truther.org published a report entitled, “Live TV Obama Assassination “Event” Planned for December 5, 2013 on MSNBC?” in respect to a possible “live” Obama terror event planned for American University (AU). Two weeks later on December 16, 2013, it was reported that American University went into lockdown after an alleged gunman was reported on campus. Predictably, the gunman turned out to be an off-duty police officer but that fact wasn’t reported until the entire AU campus was locked down for 2 full hours. The gunman at American University was evidently staged in order to create a major diversion on campus so that intelligence agencies (i.e., the ATF, FBI, CIA, etc.) could dispose of any incriminating evidence (i.e., weapons and/or explosives) planted on campus in preparation for the planned attacks. In order to remove said incriminating evidence without drawing any suspicion from students and staff, a mini-false-flag was executed in order to provide the necessary cover needed to clean-up the now foiled false-flag. In other words, since the terror plots were exposed, a second operation had to be executed under the cover of an emergency in order to tie up loose ends.

FLASHBACK: Smithsonian Assassination Plot
Back on November 20, 2013, Truther.org published a report entitled, “Obama Assassination “Event” May Be Planned for JFK Legacy Dinner at the Smithsonian’s National Museum of American History”. Coincidentally, three days later on November 23, 2013, it was confirmed that an unidentified man fell to his death from the fourth floor railing at the Smithsonian National Museum of the American Indian in Washington, D.C. Whether or not this man was involved in an Obama assassination “event” is not known, but his death is highly suspicious and has all the earmarks of a foiled state-sponsored terror attack.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zurich, Switzerland where he is in the process of applying for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, as well as The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, the 10 reasons why the Rosetta Comet landing was a hoax, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I Am Assassinated, Framed, Kidnapped, Held Hostage, Suicided or Killed via Terror Attack in Switzerland—An Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
truther-rss

Earthquake15

Download & Forward PDF

David Chase Taylor
November 11, 2014
Truther.org

SWITZERLAND, Basel — Based on breaking news and events, it appears that the CIA is about to execute a major man-made earthquake attack that will likely result in a devastating tsunami, killing potentially tens of thousands. The unsanitary conditions found in the aftermath of the so-called “natural disaster” could also spark the biological pandemic planned for 2014.

Although the impending man-made earthquake/tsunami attack could theoretically transpire anywhere in the world, it will most likely occur within the Pacific Ring of Fire, possibly Australia, Japan or even Hawaii, President Obama’s home state.

Since Obama will be abroad in China, Burma and Australia from November 11-16, 2014, he will be in the perfect position to grandstand on the world stage in the wake of a man-made earthquake attack in the Pacific Ring of Fire. Therefore, the premeditative attack appears to be a calculated decision designed to politically resurrect Obama after his party was trounced in the U.S. midterm election on November 4, 2014.

The notion of a man-made earthquake was recently highlighted by Yahoo News on August 18, 2014, in a report ominously titled “Less Shake from Artificial Quakes, Fed Study Says”. Since man-made earthquakes have now been confirmed on multiple occasions (see list below), it’s just a matter of time before another one is used to spawn a so-called “natural disaster”.

In order to program the masses for earthquake-related terror, it was reported on November 8, 2014, that a swarm of “hundreds” of earthquakes occurred underground in Nevada. Whether the earthquakes transpired in reality is not known, but it’s highly unlikely.

Two days later on November 10, 2014, it was reported that fracking has now been linked to earthquakes in Alberta, Canada. The release of the timely “study” is highly suspect considering that fracking is political cover for man-made earthquakes which are caused when large amounts of explosives are inserted underground and detonated via remote control at a later date.

Also on November 10, 2014, it was reported that an appeals court in Italy overturned the manslaughter convictions of 6 earthquake scientists. The Italian scientists were previously convicted for not predicting a deadly earthquake, a ludicrous notion if earthquakes are truly a natural phenomenon.

Hawaii Earthquake/Tsunami Attack
In what appears to be pre-Hawaii earthquake/tsunami terror logistics, it was reported on November 10, 2014, that O’ahu residents in Hawaii were invited to a series of free public workshops on Oahu to view the new “Extreme Tsunami Evacuation Zone” maps. According to the report, the maps represent “an unlikely worst-case scenario and do not replace the current, standard tsunami evacuation maps. Rather, they add a second evacuation zone for a worst case, extreme, once in a thousand years tsunami event. Newly released scientific and geological information suggests that sometime in the past 500 years, a massive 9.0 earthquake in the eastern Aleutian Trench may have generated a tsunami that far exceeded the inundations known to have occurred during tsunami events throughout recorded history in Hawaii. An event of this magnitude, referred to as an Extreme Tsunami, may occur once every thousand years.” Needless to say, Hawaii is being prepped for a massive earthquake/tsunami attack.

Japan Earthquake/Tsunami Attack
In what appears to be pre-Japan earthquake/tsunami terror logistics, it was reported on November 5, 2014, that the Japanese coastal town of Hirokawa in Wakayama Prefecture executed a tsunami evacuation drill. Less than 24-hours later on November 6, 2014, it was reported that Self-Defense Forces of Japan executed a disaster drill in the Tohoku region of Japan under the scenario of a major earthquake and tsunami. Whether these drills are just coincidence or planning for an impending man-made earthquake/tsunami attack is not known, but Japan is ready for a “natural disaster” nonetheless.

Tsunami_Wave

I. MAN-MADE TSUNAMIS:

1.1: Tsunami Bombs
Just prior to Hurricane Sandy making landfall, it was reported on October 26, 2012, that the U.S. Navy had sent 24 naval vessels, including the aircraft carrier USS Harry S. Truman, out to sea. Whether or not the U.S. Navy ships were in fact participating in a coordinated effort to rig military grade explosives off the eastern seaboard is not known, but a few months late on January 1, 2013, it was reported that so-called “Tsunami Bombs” were tested off the coast of New Zealand. According to reports, the tests, which were carried out in the waters around New Caledonia and Auckland, showed that “Tsunami Bombs” were a feasible WMD in that a series of 10 large offshore blasts could potentially create a 33-foot tsunami wave capable of inundating a small city. The top secret operation, code-named “Project Seal”, tested out the doomsday device as a possible rival to the nuclear bomb. Although 3,700 bombs were exploded during the tests, experts concluded that single explosions were not powerful enough and that a successful tsunami bomb would require about 2 million kilograms of explosive arrayed in a line about five miles from shore. When all the facts concerning Hurricane Sandy are taken into consideration (i.e., Sandy’s unprecedented landfall pattern, “Tsunami Bomb” technology, and the 24 U.S. Navy ships off the New York and New Jersey coast), it does appear that Hurricane Sandy was in fact a man-made hurricane. Coincidentally, on June 27, 2013, it was reported that a mysterious mine was found by a swimmer just off the coast of Bay Head, New Jersey, roughly 50 miles south of New York City. According to the report, the mine, which was detonated by the U.S. Navy, sent water 100 feet into the air.

1.2: Hurricane Sandy Flashback
Although Hurricane Sandy was only a Category 1 hurricane, it had a storm surge equivalent to a tsunami which flooded parts of the East coast shoulder high and swamped the streets, subways and tunnels of New York City. Just prior to Sandy making landfall, it was reported on October 26, 2012, that the U.S. Navy had sent 24 naval vessels, including the aircraft carrier USS Harry S. Truman, out to sea from Norfolk Naval Station in Virginia to avoid being damaged in port. If Sandy was indeed a “Superstorm”, why would the Navy risk sending 24 ships out into harm’s way? Is it possible that the 24 Navy ships were in fact participating in a coordinated effort to detonate modern day “Tsunami Bombs” off the East coast of America in order to create the man-made Hurricane Sandy? Although further research must be conducted, it does appear that the deadly “hurricane” which killed over 100 people and cost an estimated $20 billion in economic damage was in fact a man-made event.

1.3: Tsunami Bombs Dropped on New Zealand?
In yet another example of how the government spawns “natural disasters”, New Zealanders ran screaming from buildings in Wellington on July 21, 2013, when as a magnitude 6.5 earthquake blew out windows and caused part of the city’s port to slide into the sea. According to the report, the earthquake struck at 5:09 p.m. local time and was centered offshore, 57 kilometers (35 miles) south-southwest of the capital city, at a depth of 14 kilometers, according to the U.S. Geological Survey. Coincidentally, on July 21, 2013, the same exact day as the earthquake, it was reported that the U.S. Navy had dropped 4 bombs totaling 4,000 pounds into the sea just off the New Zealand coast. Although the exact location of the incident was changed, which is standard operating procedure for intelligence agencies, the fact that a major earthquake occurred on the same day as 2 tons of aquatic bunker busting-like bombs were reportedly dropped is quite a coincidence, furthering the notion that so called “natural disasters” are anything but natural. As of August 16, 2013, the Australian and U.S. Navy are now in the process of “retrieving” the bombs. What exactly is really going on deep beneath the sea off the Australian coast is unknown, but it the navy wanted to insert some tsunami bombs, the bomb retrieval is the perfect cover.

beast-quake

II. MAN-MADE EARTHQUAKES:

2.1: Governments can “Set off Earthquakes”
Back in April of 1997, U.S. Secretary of Defense William S. Cohen stated that governments “are engaging in an eco-type of terrorism whereby they can alter the climate, set off earthquakes, volcanoes remotely through the use of electromagnetic waves”. Although Cohen would like us to take him at his word, it is far more likely that his statement was part of a military psychological operation (PSYOP) in order to draw attention away from the tried and true method of creating earthquakes—large amounts of underground or underwater explosives.

2.2: Admitted “Man-Made” Earthquakes
If in fact underground or underwater explosives are the root cause of earthquakes, oil and gas drilling operations conducted by multinational corporations would provide the optimal cover needed for these covert operations. Under the term “fracking”, the National Research Council admitted as much on June 15, 2012, when it was reported that certain oil and gas operations can result in earthquakes. The report was quick to point out that the risk of earthquakes from hydraulic fracturing is generally low and that “fracking” was only found to have caused very small quakes of 2.3 and 1.5 magnitude.

2.3: “Man-Made” Quake #1 (Baton Rouge, Louisiana)
Back on October 8, 1988, the Earthquake Game took place in front of a crowd of 79,431 at Tiger’s Stadium. According to reports, the game between Auburn and LSU registered an earthquake according to a seismograph located in LSU’s Howe-Russell Geoscience Complex around 1,000 feet (305 m) from the stadium. The seismograph reading was allegedly discovered the morning after the game by LSU seismologist Don Stevenson who submitted the reading to the Louisiana Geological Survey to have it preserved.  Needless to say, if thousands of screaming fans can produce an earthquake, imagine what thousands of tons of C-4 or dynamite could do.

2.4: “Man-Made” Quake #2 (Seattle, Washington)
Back on January 8, 2011, the “Beast Quake” occurred at CenturyLink Field in Seattle, Washington when Seattle Seahawks player Marshawn Lynch scored a winning 67-yard touchdown over the New Orleans Saints in the 2011 NFL Playoffs. This was the first time that the fans of Seattle Seahawks allegedly generated an earthquake during an NFL game. Needless to say, if thousands of screaming fans can produce an earthquake, imagine what thousands of tons of C-4 or dynamite could do.

2.5: “Man-Made” Quake #3 (Punggye-ri, North Korea)
Back on February 12, 2013, it was reported that South Korea had detected “an artificial earthquake” as a result of North Korea’s nuclear program. According to the report, “The United States Geological Survey confirmed an earthquake in North Korea’s northeast of between 4.9- and 5.1-magnitude, at a depth of about one kilometer.” The report further stated that, “The Japanese Meteorological Agency reports that the tremor’s epicenter was located in Kilju County, at exactly the same place and depth as the quake caused by North Korea’s last known underground nuclear test in 2009. North Korea’s first nuclear test in 2006 was also carried out at the Punggye-ri test site.” Whether or not nuclear weapons exist is debatable, but this test in North Korea shows that earthquakes can result from the use of explosives.

2.6: “Man-Made” Quake #4 (Prague, Oklahoma)
Back on March 26, 2013, it was reported that a team of scientists had determined that the 5.6 magnitude earthquake in Prague, Oklahoma, on November 6, 2011, was man-made as a result of “oil drilling waste [that] was injected deep underground”. These oil and gas drilling operations could easily enable the strategic placement of large amounts of explosive far beneath the earth’s surface which can then be detonated at a later date via remote control. Based on these recent revelations, it appears that “fracking” is the political cover for man-made “black ops” earthquake operations.

2.7: “Man-Made” Quake #5 (Seattle, Washington)
Back on December 2, 2013, it was reported that Seattle Seahawk fans created an earthquake during a regular season game versus the New Orleans Saints. This was the second time that the fans of the Seattle Seahawks allegedly generated an earthquake during an NFL game. Needless to say, if thousands of screaming fans can produce an earthquake, imagine what thousands of tons of C-4 or dynamite could do.

2.8: “Man-Made” Quake #6 (Seattle, Washington)
Back on January 13, 2014, it was reported that Seattle Seahawk fans created an earthquake during a playoff game versus the New Orleans Saints. This was the third time that the fans of the Seattle Seahawks allegedly generated an earthquake during an NFL game. Needless to say, if thousands of screaming fans can produce an earthquake, imagine what thousands of tons of C-4 or dynamite could do.

2.9: “Man-Made” Quake #7 (Korea Peninsula)
Back on February 12, 2013, it was reported by the United States Geological Survey (USGS) that a 5.0-magnitude earthquake was detected 132km (80 miles) from the Korean peninsula early on April 1, 2014. The quake reportedly took place at a depth of nearly 16km (10 miles) in the sea west of the Korean peninsula, just days after North Korea threatened to carry out a “new form” of nuclear test. Although not explicitly stated, it can be deduced that the alleged nuclear test caused the earthquake.

2.10: Fake Earthquake Alarm (Japan)
In yet another sign that most major earthquakes are indeed man-made, on August 8, 2013, it was reported that Japan’s Meteorological Agency was investigating itself for a fake earthquake warning after it issued an alert for a 7.8 magnitude earthquake which only resulted in a minor 2.3 magnitude earthquake. According to the report, an all-out alarm sounded, including cellphones and TV warnings, just before 5 PM Japanese time, warning that Japan should prepare herself for a massive quake. However, the major quake never came, only a small 2.3 magnitude earthquake. How any government agency, earthquake or otherwise, is able to know beforehand when an earthquake will strike and how big it will be without somehow being responsible for initiating it defies logic. In the aftermath of the false alarm, news reports stated that the earthquake agency blamed electronic noise for triggering the false alarm.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Basel, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

READ: If I am Assassinated or Framed in SwitzerlandAn Open Letter by Journalist David Chase Taylor

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT

truther-rss

690x380-RIMPAC-2014

Download & Forward PDF

David Chase Taylor
July 22, 2014
Truther.org

SWITZERLAND, Basel — Unable to execute the World War III plot featuring the Chinese cyber-hijack of U.S. drones, it now appears that the CIA is plotting a Chinese attack on U.S. ships and/or Pearl Harbor during the 2014 RIMPAC Navel Exercise which is currently taking place off the coast of Hawaii until August 1, 2014.

It is during these elaborate war games consisting of 47 surface ships, 6 submarines, 200 aircraft, and 25,000 troops from 22 countries that the Chinese Navy are expected to execute a made-for-TV attack on the U.S., resulting in catastrophic casualties that will no doubt draw America into a war with China.

In what appears to be pre-U.S. vs. China war propaganda, “The Week” magazine published a report on July 7, 2014, entitled “China Thinks it can Defeat America in Battle”, inferring that the Chinese may attack the United States. Four days later on July 11, 2014, a Chinese man accused of hacking U.S. computers, further confirming that China is actively targeting the West.

In what appears to be post-Chinese attack preparation, it was reported on July 12, 2014, that U.S. Defense Secretary Chuck Hagel and Japanese Defense Minister Itsunori Onodera met at the Pentagon where they discussed rescue scenarios for U.S. ships under attack, a scenario which may present itself during the RIMPAC Naval Exercise.

In order to bring unprecedented media attention to the RIMPAC Navel Exercise just prior to a Chinese surprise attack, it was revealed on July 15, 2014, that a Canadian ship was sent home from Hawaii for misconduct. Although the incident reportedly occurred in San Diego prior to the start of RIMPAC, it wasn’t made public until 6 weeks later which suggests that it was only released now to draw attention to the drill prior to an attack.

Four days later on July 19, 2014, it was revealed that the USS Ronald Reagan had departed for the RIMPAC Naval Exercise. Although any U.S. ship could suffer a Chinese attack, the USS Ronald Reagan is the most likely due to its name and its role in pop culture video games such as Command & Conquer: Generals Zero Hour (2003) and “Prototype” (2009), as well as the blockbuster movie “Battleship (2012).

In what appears to be pre-Chinese surprise attack positioning, it was reported on July 21, 2014, that a Chinese spy ship has been surveying the RIMPAC drills off Hawaii. The report was evidently designed to infer that the Chinese are spying on America, making a surprise attack on a U.S. ship all the more believable.

The notion that the CIA (which is in command and control of all 206 nations) is actively attempting to trigger World War III between the U.S. and China has been exposed ad nauseam by Truther.org. To date, at least 6 different of Chinese “surprise” attack plots have been identified, the surprise attack at RIMPAC being the latest.

Coincidentally, in the wake of these Chinese surprise attack plots being exposed, roughly 60 Chinese government officials suddenly died due to unnatural causes. Although impossible to confirm, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned war plots which were foiled by Truther.org.

In what may be the war game for an upcoming Chinese attack on the U.S., the country of China reportedly held war games in the East China Sea on May 20-26, 2014. According to reports, Chinese and Russian naval vessels executed joint missions involving hijacked ships as well as joint air and joint sea assaults. In other words, it appears that China is perfecting her naval attack capabilities.

Air Force Lt. Gen. Lori J. Robinson
Similar to how Vice Admiral Jan E. Tighe (a woman) was appointed head of the U.S. Fleet Cyber Command just prior to the aforementioned Chinese cyber-hijack of U.S. drones, the Pentagon announced on July 17, 2014, that Air Force Lt. Gen. Lori J. Robinson has been nominated for promotion to four-star general and as commander of Pacific Air Forces, the Air Force component of U.S. Pacific Command. In short, the position is responsible for security in the Asia-Pacific region. In the wake of a successful Chinese attack against the U.S. Navy, Lt. Gen. Lori J. Robinson (a woman) will be publically scapegoated for the Pearl Harbor-like attack. The U.S. government and its media arms (e.g., CNN, FOX, MSNBC, etc.) will predictably state that Robinson was over her head and not qualified for the position, making the issue about a woman serving in the military rather than about the fact that the Chinese attack was a false-flag executed by the CIA.

Asian “Surprise” Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Basel, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a false-flag terror plot is exposed (e.g., 2011 Super Bowl Nuclear Terror Plot), it is immediately canceled or postponed (e.g., 2014 Super Bowl Nuclear Terror Plot). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

truther-rss

Chinese Drone Attack

Download & Forward PDF

David Chase Taylor
June 30, 2014
Truther.org

SWITZERLAND, Zurich — Sometime prior to on July 4, 2014, America’s 238th birthday, the CIA will likely attempt to trigger World War III between the U.S. and China with a wave of “surprise” attacks, starting from East to West. In the aftermath of the unprovoked attacks, a full-scale war between the U.S. and China will commence, possibly ending in all-out nuclear war.

The opening salvo by China will likely feature an aerial attack on Clark Air Base in the Philippines, a strategic U.S. military base in the Asia-Pacific Theater. Shortly thereafter, China will launch an attack on Pearl Harbor in Hawaii where the Chinese Navy is currently executing joint war games with the U.S. Navy. The third phase will feature the unprecedented Chinese cyber-hijack of multiple armed U.S. drones over California skies. Once the U.S. drones are under the command and control of China, the fourth and final phase will commence with deadly drone strikes across California, namely within the city of San Francisco.

In order to provide a timely motive for a surprise attack on America, China demanded that the U.S. stop spying after the latest Snowden leak. Since the U.S. openly refused to comply, China has no choice but to take matters into their own hands. Roughly two weeks later on take April 8, 2014, China warned that it could not be contained. The provocative statement was made during U.S. Secretary of Defense Chuck Hagel’s visit to China. Interestingly, on June 5, 2014, it was reported that China’s navy and air force are rapidly expanding their size and reach, a report which infers that China now has the ability to strike within the continental United States.

Chinese Attack Phases:

Phase I: Attack on the Philippines (Clark Air Base)
Phase II: Attack on Hawaii (Pearl Harbor)
Phase III: Cyber Hijack of U.S. Drones
Phase IV: Attack on California (San Francisco)

In order to bring unprecedented media attention to the act of cyber-hijacking prior to the cyber-hijacking of U.S. drones by China, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first cyber hijack. Shortly thereafter on May 5, 2014, the television series entitled “24: Live Another Day” (2014) debuted, featuring the cyber-hijacking of 6 U.S. drones over Europe. Said drones were subsequently used to attack London, killing hundreds of innocent people.

It is imperative to note that once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

In what appears to be Chinese “surprise” attack propaganda, Nike released a television commercial entitled “Ball Handles” on June 15, 2014, featuring an overweight Chinese basketball player wearing a t-shirt with the California state flag. In the commercial, the Chinese player brags about how good he is before repeatedly punching the other players in the groin in order to score. The state-of-the-art propaganda was evidently designed to foreshadow the notion that California is about to get sucker punched in the balls by China via the cyber-hijacking of U.S. drones.

The notion that the CIA is actively trying to trigger World War III between the U.S. and China has been exposed ad nauseam by Truther.org. To date, at least 5 different of Chinese “surprise” attack plots have been identified and exposed, the cyber-hijack of drones being the latest. In the wake of these Chinese attack plots being exposed, roughly 60 Chinese officials suddenly died due to unnatural causes. Although impossible to confirm, it appears that these Chinese officials were executed due to their first-hand knowledge of the foiled war plots.

HT_sting_of_the_Drone_mar_140507_16x9_608

“Sting of the Drone”
The notion that the U.S. and China are on a irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

I: ATTACK ON THE PHILLIPINES:

1.1 Chinese Attack on the Philippines
In order to provide a timely motive for a Chinese attack on the Philippines, namely Clark Air Base, President Barack Obama signed a 10-year agreement with the Philippines on April 28, 2014, which gives the U.S military access to Philippine military bases. “The Enhanced Defense Cooperation Agreement” essentially allows for U.S. forces to operate out of “Agreed Locations,” which are defined as: “facilities and areas that are provided by the Government of the Philippines through the Armed Forces of the Philippines (AFP) and that United States forces, United States contractors, and others as mutually agreed”. The Agreement hands over all operational controls of these “Agreed Locations” to the United States, and allows U.S. forces to preposition and store defense materiel, equipment, and supplies. In other words, the Philippines are about to become the main U.S. military base in Asia once a full-scale war with China commences. Roughly 3-weeks later on May 20, 2014, Philippine President Aquino stated that China is in violation of informal sea code, providing yet another timely motive for a Chinese attack on the Philippines. In order to raise the notion of an impending attack on the Philippines, it was reported on June 26, 2014, that the U.S. plans to downsize its “anti-terror” group in the Philippines. Three days later on June 29, 2014, the Philippines were officially put on alert for a terror attack, one that should come courtesy of China any day now. Since the U.S. and the Philippines are strategic allies, an attack on the Philippines is considered an attack on the U.S. Consequently, the U.S. can be drawn into a war in a matter of days.

II: ATTACK ON HAWAII:

2.1 Chinese Navy in Hawaii
In what appears to be the drill for an upcoming Chinese attack on the U.S., China reportedly held war games in the East China Sea on May 20-26, 2014. According to reports, Chinese and Russian naval vessels executed joint missions involving hijacked ships as well as joint air and joint sea assaults. In other words, the Chinese were perfecting both hijacks and attacks. Exactly 1 month later on June 26, 2014, China began participating in the world’s largest naval drills entitled “Rim of the Pacific Exercise” (RIMPAC), a biannual U.S.-led naval exercise off the coast of Hawaii. RIMPAC, which is scheduled to take place from June 26, 2014 until August 1, 2014, reportedly involves 47 surface ships, 6 submarines, over 200 aircraft, and 25,000 troops from 22 countries. It is during these elaborate war games that the Chinese are expected to attack U.S. ships and/or Pearl Harbor, resulting in catastrophic casualties in and around Hawaii, Obama’s alleged birth state.

drone

III: DRONE CYBER-HIJHACK:

3.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

3.2 China Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

3.3 Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

IV: DRONE ATTACK ON CALIFORNIA:

4.1 Chinese Attack on California
In order to make China’s drone attack on San Francisco be more explosive in nature, the CIA ordered three former U.S. Navy fleet oilersto be moved to Mare Island, just outside San Francisco Bay. Although the USS Hassayampa, the USS Kawishiwi, and the USS Ponchatoula were allegedly moved to the island for “cleaning”, it’s highly likely that they were actually filled with gasoline and/or explosives. That way, when they are struck with a drone missile, a massive explosion will erupt, creating a made-for-TV moment reminiscent of the December 7, 1941 Japanese attack on Pearl Harbor. California also has two nuclear reactors that may come under Chinese drone attack: The Diablo Canyon Power Plant located in San Luis Obispo County (just 231 miles from San Francisco), and the San Onofre Nuclear Generating Station in San Diego County. In the event that China is able to hijack U.S. drones, one or more of these nuclear reactors may be attacked, causing a Fukushima-like disaster in America. Interestingly, a similar nuclear reactor disaster if featured in the recent Hollywood propaganda film entitled “Godzilla” (2014), which also features an attack on San Francisco by an Asian-based monster.

Kaiju_Attack_SF_Aftermath_01

4.2 Golden Gate Bridge Attack
To make a Chinese attack on the U.S. even more psychologically terrorizing, a well-known landmark such as the Golden Gate Bridge in San Francisco must be destroyed in order to serve as life-long reminder of that horrific day (e.g., Twin Towers on 9/11). Back on February 23, 2012, it was reported that the Golden Gate Bridge will undergo a renovation project that will “take years to complete”. According to reports, the project involves the repainting of the two main suspension cables which are responsible for holding the bridge in place. Whether the lengthy “renovation” project has undermined the structural integrity of the bridge is not known, but the timely construction project may have provided the necessary cover for the installation of demolition explosives in and around the Golden Gate Bridge. Said explosives could be detonated at a later date via remote control in order to give the appearance of a successful Chinese attack on the bridge using drone missiles. In other words, the bridge would be demolished with shaped explosives while the government and media publicly blame China.

4.3 Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

4.4 Asian “Surprise” Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to July 4, 2014.

V. AFTERMATH:

??????????????????

5.1 Vice Admiral Jan E. Tighe
In what appears to be pre-Chinese cyber-attack personal logistics by the U.S. Navy, it was revealed on April 3, 2014, that Vice Admiral Jan E. Tighe has been appointed head of the U.S. Fleet Cyber Command and the U.S. 10th Fleet, making her “the first female commander of a numbered fleet in U.S. Navy history”. The U.S. Fleet Cyber Command is an operating force of the United States Navy responsible for the Navy’s cyber warfare programs, while the United States Tenth Fleet executes the full spectrum of cyber, electronic warfare, information operations and signal intelligence capabilities across the cyber, electromagnetic and space domains. In the wake of a successful Chinese cyber-attack against the U.S. Navy, Vice Admiral Tighe, a woman, will be publically scapegoated for the unprecedented attack. The U.S. government and the media will predictably state that Tighe was over her head and not qualified for the position, making the issue about a woman serving in the military rather than the fact that the entire Chinese attack was a false-flag courtesy of the CIA.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2014. To date, David Chase Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the man-made asteroid attack planned for 2014, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a false-flag terror plot is exposed (e.g., 2011 Super Bowl Nuclear Terror Plot), it is immediately canceled or postponed (e.g., 2014 Super Bowl Nuclear Terror Plot). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the usual suspects of terror. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

truther-rss

tsunami

Download & Forward PDF

David Chase Taylor
February 10, 2014
Truther.org

SWITZERLAND, Zurich — As the island nation of Japan gets ready to mark the 3-year anniversary of the March 11, 2011 Tōhoku earthquake and tsunami which allegedly spawned the Fukushima nuclear disaster, it appears that yet another man-made earthquake and tsunami terror plot is in play for the state of California and/or the islands of Hawaii—President Obama’s home state.

Naturally, a catastrophic tsunami targeting Hawaii would make Obama a victim which would make him appear sympathetic to the world, especially during the 2014 Winter Olympics. In other words, Hawaii may be targeted with the goal of raising Obama’s popularity which is at an all-time low. On January 19, 2014, a man-made earthquake attack on the NFC Championship game in Seattle, Washington was foiled and therefore another major “natural disaster” must be created so that Obama play hero and showcase his leadership skills.

Man-made earthquakes triggered by underground and underwater explosives are all the rage in the “natural disasters” terror game. In order to prepare the attack and response for the massive man-made earthquake and subsequent tsunami event depicted herein, at least 13 nations will participate in a tsunami terror drill starting on February 17, 2014, which predictably features an 8.9 magnitude earthquake and subsequent tsunami striking the Pacific Ocean.

Like the 2011 Japanese tsunami, a U.S. based tsunami would likely strike one or more of California’s nuclear reactors, leaving the Golden State radioactive. The notion of a West Coast evacuation due to an earthquake and subsequent nuclear disaster was recently highlighted in a November 6, 2013, report which found that a big earthquake near Fukushima would ‘decimate Japan and lead to a West Coast evacuation of the United States.

Prior to a major man-made tsunami attack, the American public must be led to believe though fraudulent headlines and fabricated events that yes, it can happen. For example, on March 15, 2013, it was reported that researchers had found that a massive earthquake and tsunami striking the U.S. coast would kill more than 10,000 people, flooding entire towns, and causing economic damages totaling $32 billion. According to the report, “An earthquake, together with the resulting tsunami, could leave [Americans] without water, power, heat, telephone services, and in some cases, gasoline”. Six months later on September 4, 2013, another government report found that a tsunami could disrupt California’s economy and coastal communities, potentially indicating that a California-based tsunami has already been planned. The same study found that a tsunami could strike San Diego, California, regardless of the fact that the city does not have an sever earthquake or tsunami history.

Roughly 4 months later on January 23, 2014, a propaganda report featured a house in Washington state which was built to survive a tsunami, foreshadowing a West Coast tsunami. A day later on January 24, 2014, Weather.com published a report entitled “Swell That Produced Huge Waves in Hawaii to Hit California Coast”, insinuating that large tsunami-like waves may soon be striking both Hawaii and California. That same day, the LA Times published a report entitled “Ocean Waves Help Quake Scientists Make Predictions for the Big One”, ultimately consummating the key terms “Big One” and “ocean waves” together which at least psychologically equates to a tsunami. Roughly a week later on February 3, 2014, it was reported that the U.S. is on high alert against tsunami-washed Japanese invasive species, furthering the notion that a West Coast tsunami is imminent.

Since January 1, 2012, there have been at least 108 earthquakes which have occurred within the Pacific Rim of Fire, 45 of which have had a magnitude of 6.0 or higher, 15 of which have had a magnitude of 7.0 or higher, and 2 of which have had a magnitude of 8.0 or higher. Of these earthquakes, 15 have occurred within the state of California, 5 already in 2014 alone (see list below). Needless to say, these earthquakes are trending towards a cataclysmic earthquake also known as the “Big One” which may trigger a tsunami.  

2014 Tsunami Terror Drill

As previously mentioned, from February 17 to March 7, 2014, military forces from Australia, China, France, Japan, the Republic of Korea, Singapore and the U.S. will participate in a tsunami terror drill in New Zealand. According to reports, 5 military ships and roughly 600 military personnel from 13 nations will participate in a 19-day exercise to help Pacific nations after a “natural disaster”. The training scenario will reportedly be set in the fictional South Pacific island nation of the Barclay Islands after it is hit by a devastating 8.9 magnitude earthquake and tsunami. Interestingly, the report states that “key shipping channels into the capital would be cut off and mines and explosive remnants dating from World War II would litter coastal waters”. The reference to explosives suggests that this so-called tsunami drill may in fact be the cover operation so that the military can insert tsunami bombs along the coast of the chosen target region.

United-States-and-New-Zealand-Tested-Tsunami-Bombs-In-1940s

Tsunami Bombs
Interestingly, just prior to Hurricane Sandy making landfall, it was reported on October 26, 2012, that the U.S. Navy had sent 24 naval vessels, including the aircraft carrier USS Harry S. Truman, out to sea. Whether or not the U.S. Navy ships were in fact participating in a coordinated effort to rig military grade explosives off the eastern seaboard is not known, but a few months late on January 1, 2013, it was reported that so-called “Tsunami Bombs” were tested off the coast of New Zealand. According to reports, the tests, which were carried out in the waters around New Caledonia and Auckland, showed that “Tsunami Bombs” were a feasible WMD in that a series of 10 large offshore blasts could potentially create a 33-foot tsunami wave capable of inundating a small city. The top secret operation, code-named “Project Seal”, tested out the doomsday device as a possible rival to the nuclear bomb. Although 3,700 bombs were exploded during the tests, experts concluded that single explosions were not powerful enough and that a successful tsunami bomb would require about 2 million kilograms of explosive arrayed in a line about five miles from shore. When all the facts concerning Hurricane Sandy are taken into consideration (i.e., Sandy’s unprecedented landfall pattern, “Tsunami Bomb” technology, and the 24 U.S. Navy ships off the New York and New Jersey coast), it does appear that Hurricane Sandy was in fact a man-made hurricane. Coincidentally, on June 27, 2013, it was reported that a mysterious mine was found by a swimmer just off the coast of Bay Head, New Jersey, roughly 50 miles south of New York City. According to the report, the mine, which was detonated by the U.S. Navy, sent water 100 feet into the air.

Hurricane Sandy Flashback
Although Hurricane Sandy was only a Category 1 hurricane, it had a storm surge equivalent to a tsunami which flooded parts of the East coast shoulder high and swamped the streets, subways and tunnels of New York City. Just prior to Sandy making landfall, it was reported on October 26, 2012, that the U.S. Navy had sent 24 naval vessels, including the aircraft carrier USS Harry S. Truman, out to sea from Norfolk Naval Station in Virginia to avoid being damaged in port. If Sandy was indeed a “Superstorm”, why would the Navy risk sending 24 ships out into harm’s way? Is it possible that the 24 Navy ships were in fact participating in a coordinated effort to detonate modern day “Tsunami Bombs” off the East coast of America in order to create the man-made Hurricane Sandy? Although further research must be conducted, it does appear that the deadly “hurricane” which killed over 100 people and cost an estimated $20 billion in economic damage was in fact a man-made event.



I. STATE OF CALIFORNIA:

1.1: California Nuclear Plants
California has two main nuclear reactors on its coastline: The Diablo Canyon Power Plant in San Luis Obispo County, and the San Onofre Nuclear Generating Station in San Diego County. Should a major earthquake transpire off the California coast, both nuclear reactors could be targeted. That being said, there is a far greater likelihood that the San Onofre Nuclear Generating Station will be attacked with a man-made tsunami/earthquake simply based on the recent news and events surrounding the troubled nuclear reactor. On June 19, 2012, it was reported that “San Onofre nuclear plant could become California’s Fukushima”, and to date, there have several highly suspicious incidents surrounding the nuclear plant including a radiation leak on February 1, 2012, a radioactive gas escape on April 7, 2012,a hydrogen leak on October 23, 2012, and a 700,000-pound steam generator which was allegedly removed on November 5, 2012. On September 9, 2011, there was a massive power outage in San Diego whereby 1.4 million people lost electricity, exactly the same amount of people which lost electricity on February 1, 2012, when the San Onofre plant was shut down. Whether or not the blackout was a beta-test of the eventual San Onofre nuclear meltdown is unknown, but San Onofre appears fully prepared to go offline.

1.2: San Francisco, California

The history of San Francisco in respect to earthquakes is quite storied and tragic. The 1906 San Francisco Earthquake registered a 7.8 on the Richter scale, killing 3,000 people and destroying 80% of the city. It is remembered as one of the worst natural disasters in the history of the United States. Since then, San Francisco has experienced hundreds if not thousands of significant earthquakes, including the 1989 Loma Prieta Earthquake which registered a 6.9 on the Richter scale and occurred during the MLB World Series. Due to the fact that this earthquake occurred during a nationally and internationally televised championship baseball game, the terrorizing effects of the earthquake were exponentially increased a hundred fold.

1.3: San Francisco Bay Bridge
The San Francisco–Oakland Bay Bridge (known locally as the Bay Bridge) is a pair of bridges spanning San Francisco Bay of California, in the United States. Aside from being partially demolished in the 1989 Loma Prieta Earthquake, the Bay Bridge recently underwent an emergency “repair”. On January 7th, 2013, it was reported that an oil tanker had struck a tower in the middle of the San Francisco-Oakland Bay Bridge. According to the report, the 752-foot tanker rammed the bridge tower as it headed out to sea damaging a 30 to 40 foot fender of steel on base of the bridge. Six months later on July 27, 2013, the Bay Bridge was again closed due to a suspicious device. Roughly 3 weeks later on August 15, 2013, it was reported that officials plan to re-open the eastern span of the San Francisco-Oakland Bay Bridge on Labor Day, September 2, 2013. Whether or not the aforementioned bridge closures will ultimately undermine the structural integrity of the bridge is not known, but these timely construction projects could have theoretically provided cover for the installation of demolition explosives in and around the Bay Bridge. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance that the bridge succumbed to a naturally occurring earthquake.

1.4: The Golden Gate Bridge
The Golden Gate Bridge is a suspension bridge spanning the Golden Gate, the opening of the San Francisco Bay into the Pacific Ocean. In order for a man-made earthquake attack to be even more psychologically terrorizing, a well-known landmark such as the Golden Gate Bridge must be destroyed in the attack to serve as life-long reminder of that horrific day. On February 23rd, 2012, it was reported that the Golden Gate Bridge in San Francisco, California, would undergo a renovation project that will “take years to complete”. According to the report, the project involves repainting the two main suspension cables which are responsible for holding the bridge in place. Whether or not the suspicious “renovation” project will ultimately undermine the structural integrity of the bridge is not known, but the timely construction could have theoretically provided cover for the installation of demolition explosives in and around the Golden Gate Bridge. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance that the bridge succumbed to a naturally occurring earthquake. Prior to a high-profile man-made earthquake attack resulting in the demolition of the Golden Gate Bridge, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda and government propaganda is a slick way of showing that yes, it can happen. On June 2nd, 2009, the Onion ran a story which openly joked about a “horrific attack on San Francisco’s Golden Gate Bridge, which “left thousands missing and assumed dead”. Three years later, Hollywood released “Rise of the Planet of the Apes” (2012), a film (see trailer) in which a monkey literally destroys the Golden Gate Bridge.

1.5: Los Angeles, California
As detailed in the report Carmageddon” Cover For Future L.A. Earthquake Strike”, the city of Los Angeles appears to be the slated epicenter of the dreaded California earthquake infamously known as “The Big One”. Although the “Carmageddon” Earthquake plot was exposed prior to L.A. freeways becoming a war zone on October 1, 2012, it appears that a man-made disaster of Hollywood movie proportions involving millions of cars, freeways, bridges, explosives and jaw-dropping demolitions is still being planned. As Posie Carpenter, Chief Administrative Officer of UCLA Medical Center, who was part of the “Carmageddon” medical response team stated, “We see this as being a disaster—only it’s a planned disaster”. Coincidentally, on October 17, 2013, in apparent preparation for the “Big One”, California held their annual “Great ShakeOut Earthquake Drill.

II. MAN-MADE EARTHQUAKES
:

2.1: Governments can “Set off Earthquakes”
In April of 1997, U.S. Secretary of Defense William S. Cohen stated that governments “are engaging in an eco-type of terrorism whereby they can alter the climate, set off earthquakes, volcanoes remotely through the use of electromagnetic waves”. Although Cohen would like us to take him at his word, it is far more likely that his statement was part of a military psychological operation (PSYOP) in order to draw attention away from the tried and true method of creating earthquakes—large amounts of underground or underwater explosives.

2.2: Admitted “Man-Made” Earthquakes
If in fact underground or underwater explosives are the root cause of earthquakes, oil and gas drilling operations conducted by multinational corporations would provide the optimal cover needed for these covert operations. Under the term “fracking”, the National Research Council admitted as much on June 15, 2012, when it was reported that certain oil and gas operations can result in earthquakes. The report was quick to point out that the risk of earthquakes from hydraulic fracturing is generally low and that “fracking” was only found to have caused very small quakes of 2.3 and 1.5 magnitude.

2.3: “Man-Made” Quake # 1 (Baton Rouge, Louisiana)
On October 8, 1988, the Earthquake Game took place in front of a crowd of 79,431 at Tiger’s Stadium. According to reports, the game between Auburn and LSU registered an earthquake according to a seismograph located in LSU’s Howe-Russell Geoscience Complex around 1,000 feet (305 m) from the stadium. The seismograph reading was allegedly discovered the morning after the game by LSU seismologist Don Stevenson who submitted the reading to the Louisiana Geological Survey to have it preserved.  Needless to say, if thousands of screaming fans can produce an earthquake, imagine what thousands of tons of C-4 or dynamite could do.

2.4: “Man-Made” Quake # 2 (Seattle, Washington)
On January 8, 2011, the “Beast Quake” occurred at CenturyLink Field in Seattle, Washington when Seattle Seahawks player Marshawn Lynch scored a winning 67-yard touchdown over the New Orleans Saints in the 2011 NFL Playoffs. This was the first time that the fans of Seattle Seahawks allegedly generated an earthquake during an NFL game. Needless to say, if thousands of screaming fans can produce an earthquake, imagine what thousands of tons of C-4 or dynamite could do.

2.5: “Man-Made” Quake # 3 (Punggye-ri, North Korea)
On February 12, 2013, it was reported that South Korea had detected “an artificial earthquake” as a result of North Korea’s nuclear program. According to the report, “The United States Geological Survey confirmed an earthquake in North Korea’s northeast of between 4.9- and 5.1-magnitude, at a depth of about one kilometer.” The report further stated that, “The Japanese Meteorological Agency reports that the tremor’s epicenter was located in Kilju County, at exactly the same place and depth as the quake caused by North Korea’s last known underground nuclear test in 2009. North Korea’s first nuclear test in 2006 was also carried out at the Punggye-ri test site.” Whether or not nuclear weapons exist is debatable, but this test in North Korea shows that earthquakes can result from the use of explosives.

2.6: “Man-Made” Quake # 4 (Prague, Oklahoma)
On March 26, 2013, it was reported that a team of scientists had determined that the 5.6 magnitude earthquake in Prague, Oklahoma, on November 6, 2011, was man-made as a result of “oil drilling waste [that] was injected deep underground”. These oil and gas drilling operations could easily enable the strategic placement of large amounts of explosive far beneath the earth’s surface which can then be detonated at a later date via remote control. Based on these recent revelations, it appears that “fracking” is the political cover for man-made “black ops” earthquake operations.

2.7: “Man-Made” Quake # 5 (Seattle, Washington)
On December 2, 2013, it was reported that Seattle Seahawk fans created an earthquake during a regular season game versus the New Orleans Saints. This was the second time that the fans of the Seattle Seahawks allegedly generated an earthquake during an NFL game. Needless to say, if thousands of screaming fans can produce an earthquake, imagine what thousands of tons of C-4 or dynamite could do.

2.8: “Man-Made” Quake # 6 (Seattle, Washington)
On January 13, 2014, it was reported that Seattle Seahawk fans created an earthquake during a playoff game versus the New Orleans Saints. This was the third time that the fans of the Seattle Seahawks allegedly generated an earthquake during an NFL game. Needless to say, if thousands of screaming fans can produce an earthquake, imagine what thousands of tons of C-4 or dynamite could do.

2.9: Fake Japanese Earthquake Alarm
In yet another sign that most major earthquakes are indeed man-made, on August 8, 2013, it was reported that Japan’s Meteorological Agency was investigating itself for a fake earthquake warning after it issued an alert for a 7.8 magnitude earthquake which only resulted in a minor 2.3 magnitude earthquake. According to the report, an all-out alarm sounded, including cellphones and TV warnings, just before 5 PM Japanese time, warning that Japan should prepare herself for a massive quake. However, the major quake never came, only a small 2.3 magnitude earthquake. How any government agency, earthquake or otherwise, is able to know beforehand when an earthquake will strike and how big it will be without somehow being responsible for initiating it defies logic. In the aftermath of the false alarm,news reports stated that the earthquake agency blamed electronic noise for triggering the false alarm.

III. EARTHQUAKE (PSUEDO) SCIENCE:

3.1: Earthquake Science Suddenly Changed
In another apparent man-made earthquake publicity stunt, long established peer reviewed earthquake science has been suddenly scrapped for new and laughable pseudoscience. On September 28, 2012, it was reported in an article entitled “Big Earthquakes Can Trigger Temblors Across Globe”, that earthquake behavior has suddenly changed and that large earthquakes in one part of the globe can now trigger even larger secondary earthquakes in other parts of the globe. This new theory goes against everything known about earthquakes and tectonic plates, but it provides well needed cover for man-made explosive generated earthquakes. “If you asked any of us if this event is possible a year ago, we would have laughed at you,” said Thomas Heaton, a seismologist at the California Institute of Technology. “This was a really surprising finding,” said Fred Pollitz, a seismologist with the USGS. Although the science in respect to earthquakes has been suddenly discarded, the plan to terrorize humanity under the guise of “natural disasters” has not. If and when a Doomsday asteroid, comet or meteoroid strikes Earth, expect to see a series of devastating and escalating earthquakes and tsunamis from California to Japan shortly after the alleged impact.

3.2: Earth is “Cracking Up”
In more apparent scientific programming for an impending man-made earthquake strike, it was reported on April 15, 2012, that a leading earthquake scientist has warned that the planet could crack up after a series of massive quakes. According to earthquake expert Gheorghe Marmureanu of the National Institute of Earth Physics, 39 quakes recently hit the globe within two days. Marmureanu based his finding on a series of events which started with two massive quakes in Indonesia measuring 8.6 and 8.2 on the Richter scale rapidly followed by three more only slightly smaller in Mexico within hours. This pseudoscience will likely be used post-“Doomsday Asteroid” in an attempt to explain how an asteroid strike in the Pacific Ocean could cause earthquakes and tsunamis on the other side of the globe.

3.3: Earthquake “Show Trials”
In October of 2012, an unprecedented earthquake “show trial” with absolutely no evidence was conducted in Italy. Although the underlying motive behind the mock trial is still unknown, it appears that the trial was conducted with the purpose of scaring seismologists from blowing the whistle on man-made earthquakes as well as prepping the public for upcoming earthquake disasters. According to reports, 6 Italian scientists and 1 government official were facing prison terms for manslaughter for allegedly downplaying the risk of an upcoming earthquake. The incident in question occurred on April 6, 2009, when a 6.3 magnitude earthquake killed 309 residents in the town of L’Aquila, Italy. Although the trial began about a year ago, it was on hold until October 9, 2012 (Just prior to “Carmageddon” Earthquake Plot), when the defense finally presented its closing arguments. Eventually, the 6 seismologists were ultimately convicted of manslaughter by the Italian court and have been sentenced to 6 years in prison. Four months later on February 16, 2013, apparently the same court in L’Aquila, Italy, convicted 4 people in the collapse of a university dormitory during the same 2009 earthquake. Interestingly, the Italian technicians accused of carrying out shoddy dormitory reconstruction work in 2000 were never mentioned in the previous article or trial.

IV. EARTHQUAKE TIMELINE:

4.1: Pacific Rim Earthquakes Trending

Since January 1, 2012, there have been at least 108 earthquakes which have occurred within the Pacific Rim of Fire, 45 of which have had a magnitude of 6.0 or higher, 15 of which have had a magnitude of 7.0 or higher, and 2 of which have had a magnitude of 8.0 or higher. Global earthquake activity, man-made or real, is now at an unprecedented level. In the event that the earth is stuck by powerful man-made earthquake, it could theoretically spawn tsunamis and volcanic eruptions around the Pacific Rim.

Pacific Rim Earthquake Timeline:

1. January 1, 2012: 7.0 Magnitude Earthquake (Coast of Japan)
2. March 1, 2012: 5.4 Magnitude Earthquake (Coast of Japan)
3. March 15, 2012: 6.8 Magnitude Earthquake (Coast of Japan)
4. April 13, 2012: 5.9 Magnitude Earthquake (Coast of Japan)
5. May 29, 2012:
5.2 Magnitude Earthquake (Cost of Japan)
6. August 27, 2012: 7.3 Magnitude Earthquake (Coast of El Salvador)
7. September 1, 2012: 7.6 Magnitude Earthquake (Guiuan, Philippines)
8. September 26, 2012: 6.2 Magnitude Earthquake (Coast of Baja California, Mexico)
9. September 26, 2012: 6.4 Magnitude Earthquake (Aleutian Islands, Alaska)
10. September 27, 2012: 4.5 Magnitude Earthquake (Aleutian Islands, Alaska)
11. September 28, 2012: 4.3 Magnitude Earthquake (Aleutian Islands, Alaska)
12. October 2, 2012: 6.3 Magnitude Earthquake (Coast of Sanriku, Japan)
13. November 3, 2012: 6.4 Magnitude Earthquake (Mindanao, Philippines)
14. November 7, 2012: 7.4 Magnitude Earthquake (Coast of Guatemala)
15. November 7, 2012: 4.2 Magnitude Earthquake (Coast of Oregon and California)
16. November 10, 2012: 6.8 Magnitude Earthquake (Burma-Myanmar)
17. November 11, 2012: 6.5 Magnitude Earthquake (Coast of Guatemala)
18. November 12, 2012: 6.4 Magnitude Earthquake (Gulf of Alaska)
19. November 15, 2012: 6.0 Magnitude Earthquake (Mexico City, Mexico)
20. November 15, 2012: 6.0 Magnitude Earthquake (Coast of Chili)
21. November 24, 2012:  4.9 Magnitude Earthquake (Tokyo, Japan)
22. December 10, 2013: 7.2 Magnitude Earthquake (Coast of Indonesia)
23. December 14, 2012: 6.4 Magnitude Earthquake (Coast of California)
24. December 14, 2012: 6.1 Magnitude Earthquake (Coast of California)
25. January 5, 2013: 7.5 Magnitude Earthquake (Coast of Canada & Alaska)
26. January 30, 2013: 6.7 Magnitude Earthquake (Vallenar, Chili)
27. January 31, 2013: 6.0 Magnitude Earthquake (Coast of Alaska)
28. February 6, 2013: 8.0 Magnitude Earthquake (Solomon Islands)
29. February 7, 2013: 6.2 Magnitude Earthquake (Solomon Islands)
30. February 9, 2013: 6.9 Magnitude Earthquake (Pasto, Columbia)
31. February 16, 2013: 6.2 Magnitude Earthquake (Mindanao, Philippines)
32. February 23, 2013: 5.7 Magnitude Earthquake (East Timor, Indonesia)
33. February 28, 2013: 6.9 Magnitude Earthquake (Kuril Islands, Pacific Ocean)
34. March 3, 2013: 5.5 Magnitude Earthquake (Dali City, China)
35. March 7, 2013: 5.6 Magnitude Earthquake (Hualian, Taiwan)
36. March 10, 2013: 4.0 Magnitude Earthquake (Anchorage, Alaska)
37. March 11, 2013: 4.7 Magnitude Earthquake (Los Angeles, California)
38. March 11, 2013: 4.6 Magnitude Earthquake (Los Angeles, California)
39. March 11, 2013: 3.0 Magnitude Earthquake (Los Angeles, California)
40. March 25, 2013: 6.2 Magnitude Earthquake (Guatemala City, Guatemala)
41. March 26, 2013: 5.5 Magnitude Earthquake (Oaxaca, Mexico)
42. March 26, 2013: 5.9 Magnitude Earthquake (Mexico City, Mexico)
43. April 4, 2013: 5.3 Magnitude Earthquake (Coast of Philippines)
44. April, 4, 2013: 5.4 Magnitude Earthquake (Guerrero, Mexico)
45. April 5, 2013: 6.2 Magnitude Earthquake (Zarubino, Russia)
46. April 6, 2013: 7.1 Magnitude Earthquake (Tolikara, Indonesia)
47. April 12, 2013: 5.2 Magnitude Earthquake (Zihuatanejo, Mexico)
48. April 12, 2013: 6.0 Magnitude Earthquake (Kobe, Japan)
49. April 14, 2013: 6.7 Magnitude Earthquake (Coast of Papua New Guinea)
50. April 16, 2013: 6.8 Magnitude Earthquake (Aitape, Papua New Guinea)
51. April 17, 2013: 6.2 Magnitude Earthquake (Coast of Japan)
52. April 19, 2013: 7.0 Magnitude Earthquake (Coast of Japan)
53. April 21, 2013: 6.6 Magnitude Earthquake (Chengdu, China)
54. April 22, 2013: 5.9 Magnitude Earthquake (Michoacan, Mexico)
55. April 23, 2013: 6.4 Magnitude Earthquake (Rabaul, Papua New Guinea)
56. May 16, 2013: 4.0 Magnitude Earthquake (Los Angeles, California)
57. May 18, 2013: 5.9 Magnitude Earthquake (Coast of Japan)
58. May 20, 2013: 6.8 Magnitude Earthquake (Coast of Chile)
59. May 24, 2013: 8,2 Magnitude Earthquake (East Coast of Russia)
60. May 24, 2013: 7.4 Magnitude Earthquake (South Fiji Islands)
61. May 24, 2013: 4.9 Magnitude Earthquake (Namie, Japan)
62. May 27, 2013: 5.6 Magnitude Earthquake (Changuinola, Panama)
63. May 29, 2013: 4.8 Magnitude Earthquake (Coat of Southern California)
64. June 3, 2013: 6.2 Magnitude Earthquake (Jenai, Taiwan)
65. June 15, 2013: 6.5 Magnitude Earthquake (Coast of Nicaragua)
66. June 16, 2013: 5.8 Magnitude Earthquake (Jolalpan, Mexico)
67. June 19, 2013: 5.7 Magnitude Earthquake (Los Andes, Chile)
68. June 27, 2013: 4.3 Magnitude Earthquake (Leavenworth, Washington)
69. July 3, 2013: 6.1 Magnitude Earthquake (Sumatra, Indonesia)
70. July 7, 2013: 7.2 Magnitude Earthquake (Coast of Papua New Guinea)
71. July 15, 2013: 7.3 Magnitude Earthquake (Coast of Antarctica)
72. July 21, 2013: 6.5 Magnitude Earthquake (Coast of New Zealand)
73. July 22, 2013: 5.9 Magnitude Earthquake (Chabu, China)
74. August 4, 2013: 6.0 Magnitude Earthquake (Coast of Japan)
75. August 6, 2013: 5.1 Magnitude Earthquake (Mexico City, Mexico)
76. August 12, 2013: 6.2 Magnitude Earthquake (Coast of Peru)
77. August 13, 2013: 6.7 Magnitude Earthquake (Coast of Columbia)
78. August 16, 2013: 6.5 Magnitude Earthquake (Seddon, New Zealand)
79. August 16, 2013: 5.3 Magnitude Earthquake (Guerrero, Mexico)
80. August 21, 2013: 6.2. Magnitude Earthquake (Acapulco, Mexico)
81. August 30, 2013: 7.0 Magnitude Earthquake (Aleutian Islands, Alaska)
82. August 31, 2013: 6.1. Magnitude Earthquake (Aleutian Islands, Alaska)
83. August 31, 2013: 5.9 Magnitude Earthquake (Benzilan Township, China)
84. September 3, 2013: 6.5 Magnitude Earthquake (Alaska’s Aleutian Islands)
85. September 3, 2013:
6.9 Magnitude Earthquake (Coast of Japan)
86. September 5, 2013: 6.0 Magnitude Earthquake (Coast of Coast Rica)
87. September 10, 2013: 4.1 Magnitude Earthquake (Anchorage, Alaska)
88. September 19, 2013: 5.3 Magnitude Earthquake (Fukushima, Japan)
89. September 20, 2013: 5.7 Magnitude Earthquake (Mandalay, Myanmar)
90. September 25, 2013: 7.0 Magnitude Earthquake (Coast of Peru)
91. October 6, 2013: 5.2 Magnitude Earthquake (Coyuca de Benitez, Mexico)
92. October 15, 2013: 7.1 Magnitude Earthquake (Bohol Island, Philippines)
93. October 25, 2013:
7.3 Magnitude Earthquake (Coast of Japan)
94. October 31, 2013: 6,6 Magnitude Earthquake (Hualian, Taiwan)
95. November 3, 2013: 5.0 Magnitude Earthquake (Tokyo, Japan)
96. November 12, 2013:
4.8 Magnitude Earthquake (Bohol Island, Philippines)
97. November 16, 2013: 5.5 Magnitude Earthquake (Tokyo, Japan)
98. November 23, 2013: 6.5 Magnitude Earthquake (South Pacific Ocean)
99. December 1, 2013:
6.3 Magnitude Earthquake (Coast of Indonesia)
100. December 23, 2013: 4.7 Magnitude Earthquake (Lone Pine, California)
101. December 30, 2013: 2.9 Magnitude Earthquake (Boulder City, NV)
102. January 13, 2014: 6.5 Magnitude Earthquake (Coast of Puerto Rico)
104. January 13, 2014: 1-2 Magnitude Earthquake (Seattle, Washington)
105. January 15, 2014:
4.4 Magnitude Earthquake (Fontana, California)

106. January 17, 2014: 2.6 Magnitude Earthquake
(Northridge, California)
107. January 25, 2014: 6.1 Magnitude Earthquake
(Java, Indonesia)
108. February 7, 2014: 3.0 Magnitude Earthquake (Hollywood, California)

[Does not purport to be a complete list of Pacific Rim earthquakes]

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org. Taylor currently lives in Zürich, Switzerland where he has applied for political asylum after the release of The Nuclear Bible, a book credited with foiling a state-sponsored nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011. Taylor has also authored The Bio-Terror Bible, a book and website exposing the 2014 global bio-terror pandemic. To date, David Chase Taylor has blown the whistle on 50+ state-sponsored terror plots, including the man-made comet ISON hoax, the drone strike on “Fast and Furious” star Paul Walker, and he was the first to expose Alex Jones’ links to STRATFOR.

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. State-sponsored terror alerts, warning, assertions and forecasts made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically occur based on the cited date. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl XLV Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

truther-rss