AUTHOR’S NOTE: Because I, David Chase Taylor officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, consider this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat were it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.
JADE HELM 15: Swiss CIA Plotting ‘Robin Sage’ Redux, Attacks on Jade Helm Soldiers by ‘Operation Counter Jade Helm’, Domestic & ISIS Terror Attacks, Predator Drone Strikes, Suspension of 2016 US Presidential Election, Martial Law & Obama Dictatorship
SWITZERLAND, Zurich — Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA in Switzerland) is preparing to execute a wave of drone-related cyber-hijack-attacks during “BLACK DART”, a military exercise currently taking place in California from July 27 until August 10, 2015.
The 2-week cyber-drone exercise, which is openly being funded by the U.S. government, will take place above Naval Air Station Point Mugu at Naval Base Ventura County, just outside Los Angeles, California, The exercise will reportedly test “tactics and technologies to combat hostile drones”. Translation: hostile drone attacks are likely now in play for the City of Angels.
According to reports, BLACK DART will feature “tests” of at least 55 drone-related computer systems which were shipped to Point Mugu at their own expense by an “assortment of military units, government agencies, private contractors and academic institutions”. The variety of audience members provides the CIA a number of patsies and black hat actors to scapegoat at a later date.
Considering that the phrase “private contractors” is code-word for state-sponsored corporations such as Blackwater, Halliburton and KBR, all of which have previously employed current of former Special Forces (i.e., professional terrorists), the drones and computers of said contractors, and those of their respective employees, could suffer an alleged “cyber-attack” during the exercise.
Aside from the 55 drones which will admittedly be operational during BLACK DART, it’s highly likely that drones stationed at numerous U.S. military bases across Southern California (see below) could also suffer a cyber-terror attack, possibly resulting in 9/11-style Kamikaze drone attacks and/or drone-related missile strikes on LA-based infrastructure, landmarks, skyscrapers and military installations.
The notion that terror may be planned for BLACK DART was foreshadowed by the New York Post from July 25, 2015, entitled “Military Exercise Black Dart to Tackle Nightmare Drone Scenario”. The nightmare scenario in question appears to be a state-sponsored cyber-attack and subsequent hijack of multiple drones during the exercise.
Exactly what type of drone-related attacks are planned BLACK DART is not known, but drone-related missile attacks, kamikaze attacks, and/or accidents or crashes that ultimately result in major wildfires or forest fires within the drought-stricken state of California now appear to be in order. Mass evacuations would likely follow.
The aforementioned New York Post report on BLACK DART also stated that there have been “sightings of unidentified small drones flying over nuclear reactors in France”, and that “a drone carrying radioactive sand” landed on the roof of the Japanese Prime Minister. Consequently, drone-related attacks on California’s nuclear reactors are expected.
Disclosed in 2014, BLACK DART is no longer a secret war game. It is, however, only open to a select group of media personal, prompting the U.S. Department of Defense to state that it is “aware of this problem” (i.e., lack of access) and that they are “concerned about it” and now “working on it”. Consequently, a majority of the world’s media will likely be present in Los Angles during this year’s BLACK DART exercise.
According to U.S. Air Force Major Scott Gregg, the director of this 14th edition of BLACK DART, there will be roughly “1,000 people at Black Dart this year”, including but not limited to: “participants, observers and support”. Since no government agency can monitor 1,000 potential hackers simultaneously in real time, state-sponsored cyber-attacks are executed at some point during the event.
Since the U.S. Departments of Energy and the U.S. Department of Homeland Security will reportedly “send observers” (i.e., agents) to BLACK DART, hacks and attacks by state-sponsored “actors” are expected to transpire prior to the end of the exercise on August 9, 2015.
Lastly, the exercise will feature a small fleet of surrogate threat drones that will be airborne for 5-hours a day for a cumulative total of 14-days. During that time, 6 drone will reportedly fly over Naval Air Station Point Mugu while participants “test radars, lasers, missiles, guns and other technologies” that the U.S. military will “use to detect and kill or neutralize drones of all sizes”.
BLACK DART Actors:
[Does not purport to be a complete list of BLACK DART actors]
Prior to a high-profile drone-related terror attack, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, cyber and drone-related terror is now at an all-time high which suggests that a state-sponsored drone-related attack is now imminent.
Drone-Cyber Hijack Attack Narrative:
1. July 6, 2015: Robotics company Cyberdyne introducing ‘service’ robots with artificial intelligence
2. July 22, 2015: US drone crashes in Iraq desert, locals pose for selfies
3. July 25, 2015: Military exercise Black Dart to tackle nightmare drone scenario
4. July 25, 2015: Spy-in-the-sky terror threat to William: Security alert over app that lets anyone track pilot
5. July 26, 2015: San Francisco police shoot man who attempted carjacking near airport
6. July 27, 2015: Plane crashes into yard in California killing pilot
7. July 27, 2015: China eliminates all restrictions on gaming consoles
8. July 27, 2015: Lynch: Thought of cyber-attack on US ‘keeps me … up at night’
9. July 27, 2015: Experts: “Racist” Killer Robots Could Conduct Ethnic Cleansing Campaigns
[Does not purport to be a complete list of drone-related cyber-attack headlines]
1.1: MQ-1 Predator Drones Based in Southern California
In the event of cyber-related attacks on drones during BLACK DART, MQ-1 Predator drones based in Riverside and Lancaster, California may come under attack. Back in 1996, the U.S. Secretary of Defense selected the U.S. Air Force as the operating service for the RQ-1A Predator system, placing an undisclosed amount of MQ-1 Predator drones under the Air National Guard‘s 163d Reconnaissance Wing at March Air Reserve Base in Riverside, California. Some 16-years later on June 13, 2012, a Public Intelligence report revealed that there are now 64 drone bases on American soil, 12 of which house Predator drones. The notion that MQ-1 Predator drones are flying sorties over California was first reported on September 1, 2012, when it was revealed that Predator drones operated by the 163rd Reconnaissance Wing were flying above the Rim Fire at Yosemite National Park, likely sparking the blaze with multiple Hellfire missile strikes. In a Los Angeles Times report dated December 7, 2009, it was revealed that MQ-1 Predator drones are now being used by the U.S. Border Patrol to track illegal immigrants on the Mexico-California border. Said drone are reportedly based in Antelope Valley in northern Los Angeles County, roughly 35 miles (55 kilometers) from where Walker was assassinated in Valencia, California. Lastly, on January 28, 2014, it was reported that the U.S. Border Patrol grounded its drone fleet after a $12 million drone crashed off the coast of California, further confirming that drones are actively flying over California.
1.2: SKYNET Terminator Drone Program Activated
The SKYNET terminator scenario depicted in the film “Terminator 2” (1991) was a colossal psychological operation (PSYOP) because the real autonomous terminators hell bent on humanity’s destruction do not walk on land as depicted in the movie, but rather fly through the air in the form of autonomous drones. Although SKYNET was billed as the fictional name for the terminator program within the Terminator movie series, it is in fact the actual name of NATO’s satellite program which currently encircles the globe. According to Wikipedia, “SKYNET is a family of military satellites, now operated by Paradigm Secure Communications on behalf of the UK Ministry of Defense, which provide strategic communication services to the three branches of the British Armed Forces and to NATO forces engaged on coalition tasks.” Without the use of SKYNET satellites, which provide GPS-related logistics and communication for autonomous aerial vehicles (UAVs), the SKYNET terminator scenario would not be able to function. In other words, SKYNET is the electronic backbone of the terminator drone program. Although SKYNET was founded in 1969, the 2012 NATO Summit in Chicago marked the first time in history that the full-scale implementation of autonomous aerial terminators was publically disclosed.
1.3: SKYNET Operating Under Alias Astrium Services
The hi-tech computerized kill system known as SKYNET was originally exposed by Truther.org on May 20, 2012, in a report entitled “Chicago Terror Cover for NATO Implementation of SKYNET Terminator Program”. The report revealed for the first time in history that the SKYNET terminator program was not only real but was officially activated during the 2012 NATO Summit in Chicago. Roughly 5 months later, SKYNET inexplicably changed their name to Astrium Services, despite the fact that they had used the name SKYNET since 1969. The sudden attempt to rebrand the SKYNET satellite system appears to be a direct reaction to fact that the nightmare terminator program was exposed by Truther.org.
II. CHINESE DRONE ATTACK:
2.1: Chinese Cyber-Terror Trending
Prior to an Earth-changing cyber-terror attack that will likely spark World War III between the U.S. and China, it has to be well-established that China is actively hacking the U.S. This notion was confirmed on July 23, 2015, when Russia Today published a report entitled “US Won’t Publicly Blame China for Massive Government Hacks” which essentially confirmed as much. A day later on July 24, 2015, the New York Times published a report entitled “U.S. Fears Data Stolen by Chinese Hacker Could Identify Spies” which further implicated Chinese hackers for attacks just prior to a horrific attack. Lastly, a day later on July 25, 2015, Fox News published a report entitled “FBI: China the Most Predominant Economic Espionage Threat to US”, basically stating that China is the #1 threat to America just prior to a wave of drone-related attacks that spark a nuclear World War III.
2.2: Chinese Cyber-Hijack Possible
Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.
2.3: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.
2.4: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.
2.5: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.
2.6: Revenge Drone Attack
In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.
2.7: Book: “Sting of the Drone”
The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.
About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.
Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste