AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history and may try and assassinate me Switzerland, especially since I have decifered the code (i.e., the Davinci Code) which is used by Greenland to plot terror attacks in the underworld via the CIA, hence the long list of foiled terror attacks and timely Truther.org terror alerts.
TRUTHER.ORG TERROR ALERT TIMELINE:
1. DEC 11, 2013: Comet ISON Declared Dead: Truther.org Alert: 1 Day Prior
2. JAN 13, 2014: Wesley Chapel Theater Shooting: Truther.org Alert: 38 Days Prior
3. MAY 23, 2014: Santa Barbara Massacre: Truther.org Alert: 26 Days Prior
4. OCT 28, 2014: Antares Rocket Launch Explosion: Truther.org Alert: 1 Day Prior
5. NOV 20, 2014: Florida State University Shooting: Truther.org Alert: 2 Days Prior
6. JUN 19, 2015: Golden State Warriors Victory Parade Shooting: Truther.org: Same Day
7. OCT 1, 2015: Umpqua Community College Shooting: Truther.org Alert: 7 Days Prior
8. NOV 27, 2015: Planned Parenthood Shooting: Truther.org Alert: 1 Day Prior
9. NOV 13, 2015: Paris Terror Attacks: Truther.org Alert: 4 Days Prior
10. DEC 5, 2015: London Undergroud Jihad Attack: Truther.org Alert: 9 Days Prior
11. DEC 25, 2015: The Philippines Terror Attack: Truther.org Alert: 1 Day Prior
[Does not purport to be complete list of timely Truther.org terror alerts]
SHOCK: 10 Reasons Why the Paris Terror Attacks Were Executed by the CIA
ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks
BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland
RED ALERT: 10 Reasons Why Switzerland is Home to the CIA
David Chase Taylor
January 7, 2016
SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese surprise attack and/or invasion of America, Japan and/or the Philippines this week which will predictably lead to World War III.
The notion that war will find Obama while on vaction in Hawaii was foreshadowed in a Washington Post report from December 21, 2015, entitled “The War in Afghanistan Follows Obama to His Vacation in Hawaii“. The report stated that Obama does not support “the idea of endless war”, something which would transpire in the aftermath of a Chinese attack.
In what appears to be pre-World War III programming, it was reported on December 21, 2015, that the Pentagon is now preparing for war with China. The timely propaganda report stated that the DOD is intent on triggering a military conflict with China over disputed islands in the South China Sea, likely at Clark Air Base in the Philippines where the U.S. has stationed numerous Boeing P-8A Poseidon advanced maritime surveillance aircraft.
The impending Chinese attack will likely involve one or more of the following: a) conventional nuclear attack; b) a TV-related cyber-hijack and subsequent nuclear attack; c) an EMP attack; and/or d) the full-scale Chinese invasion of Australia, Hawaii, Japan, the Philippines, Taiwan, and/or mainland U.S.
Consequently, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.
That being said, the U.S. Navy began Annual Exercise 16 on November 16, 2015, a naval war game between Japan and the United States which featured the USS Ronald Reagan aircraft carrier. Consequently, a made-for-TV Chinese aerial attack on iconic aircraft carrier is expected.
Annual Exercise 16 was likely executed in order to provide a timely motive for an unprovoked attack by China on Japan which will likely result in the first ever Chinese beachhead and military base in Japan, a country which is currently home to numerous U.S. military bases.
In order to foreshadow the aformentioned attack on the USS Ronald Reagan aircraft carrier, the Washington Free Beacon published a report on December 15, 2015, entitled “Chinese Submarine Practiced Missile Attack on USS Reagan“. The incident violated China’s 2014 commitment to the multinational Code for Unplanned Encounters at Sea, known as CUES, designed to reduce the risk of a shooting incident between naval vessels.
Four days later on December 19, 2015, USA Today published a report entitled “China Urges U.S. to Stop ‘Provocative Actions’ after B-52 Flights”, an action allegedly taken by the U.S. on December 10, 2015, which is designed to provide a timely motive for a revenge-like attack on America by China.
This notion was confimed the very same day on December 19, 2015, when the Examiner published a report entitled “China Blames U.S. for ‘Serious Military Provocation;’ Will Take Action“. Said action will likley be in the form of a suprise attack on Hawaii, Japan, the Philippines and/or mainland United States.
As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 20 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.
In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.
The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.
Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.
Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.
In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.
In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.
In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.
Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.
Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.
That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.
In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.
In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.
In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.
Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.
Top Chinese Attack Locations:
1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
12. South China Sea (Disputed Islands)
South China Sea Attack
Based on breaking news and events, it appears that the CIA is plotting a Chinese attack on the U.S Navy which has ships trolling the disputed islands within the South China Sea. This latest Chinese attack narrative was first identified back on October 15, 2015, when the Guardian published a report entitled “Chinese Media: Military Must be Ready to Counter US in South China Sea”, foreshadowing that a confrontation may be imminent. Nine days later on October 24, 2015, Yahoo News published a report entitled “U.S. Patrols to Raise Stakes with Beijing in Disputed South China Sea”, further raising the specter of a naval confrontation with China. Three days later on October 27, 2015, Reuters published a report entitled “Angry China Shadows U.S. Warship Near Man-Made Islands”, foreshadowing a Chinese attack on the USS Lassen destroyer. Lastly, in what appear to be the final warning by China just prior to a surprise revenge-like attack, it was reported on October 27, 2015, that China has officially warned the United States after the USS Lassen passes near the disputed islands. Needless to say, these reports, taken collectively, suggest that a confrontation between the U.S. and China in the South China Sea is imminent.
Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.
China’s “Invisibility Cloak”
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.
I: CYBER-HIJACK DRONE ATTACK:
1.1 Chinese Cyber-Hijack Possible
Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.
1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.
1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.
1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.
1.5: Revenge Drone Attack
In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.
1.6: “Sting of the Drone”
The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.
II. CHINESE NUCLEAR ATTACK:
2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.
2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.
2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles. Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.
3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.
III. CHINESE CYBER-ATTACK:
3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.
3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.
3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.
3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.
IV. CHINESE EMP ATTACK:
4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.
4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.
About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.
READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland
Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste