Archive for the ‘Philippino Terror’ Category

china-nuke

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history and may try and assassinate me Switzerland, especially since I have decifered the code (i.e., the Davinci Code) which is used by Greenland to plot terror attacks in the underworld via the CIA, hence the long list of foiled terror attacks and timely Truther.org terror alerts.

TRUTHER.ORG TERROR ALERT TIMELINE

1. DEC 11, 2013: Comet ISON Declared Dead: Truther.org Alert: 1 Day Prior
2. JAN 13, 2014: Wesley Chapel Theater Shooting: Truther.org Alert: 38 Days Prior
3. MAY 23, 2014: Santa Barbara Massacre: Truther.org Alert: 26 Days Prior
4. OCT 28, 2014: 
Antares Rocket Launch Explosion: Truther.org Alert: 1 Day Prior
5. NOV 20, 2014:
Florida State University Shooting: Truther.org Alert: 2 Days Prior 
6. JUN 19, 2015:
Golden State Warriors Victory Parade Shooting: Truther.org: Same Day
7. OCT 1, 2015: 
Umpqua Community College Shooting: Truther.org Alert: 7 Days Prior
8. NOV 27, 2015: Planned Parenthood Shooting:  Truther.org Alert: 1 Day Prior
9. NOV 13, 2015:
Paris Terror Attacks: Truther.org Alert: 4 Days Prior 
10. DEC 5, 2015:
London Undergroud Jihad Attack: Truther.org Alert: 9 Days Prior 
11. DEC 25, 2015:
The Philippines Terror Attack: Truther.org Alert: 1 Day Prior

[Does not purport to be complete list of timely Truther.org terror alerts]

SHOCK: 10 Reasons Why the Paris Terror Attacks Were Executed by the CIA

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
January 5, 2016
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese surprise attack and/or invasion of America, Japan and/or the Philippines this week which will predictably lead to World War III.

The notion that war will find Obama while on vaction in Hawaii was foreshadowed in a Washington Post report from December 21, 2015, entitled “The War in Afghanistan Follows Obama to His Vacation in Hawaii“.  The report stated that Obama does not support “the idea of endless war”, something which would transpire in the aftermath of a Chinese attack.

In what appears to be pre-World War III programming, it was reported on December 21, 2015, that the Pentagon is now preparing for war with China. The timely propaganda report stated that the DOD is intent on triggering a military conflict with China over disputed islands in the South China Sea, likely at Clark Air Base in the Philippines where the U.S. has stationed numerous Boeing P-8A Poseidon advanced maritime surveillance aircraft.

The impending Chinese attack will likely involve one or more of the following: a) conventional nuclear attack; b) a TV-related cyber-hijack and subsequent nuclear attack; c) an EMP attack; and/or d) the full-scale Chinese invasion of Australia, Hawaii, Japan, the Philippines, Taiwan, and/or mainland U.S.

Consequently, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

That being said, the U.S. Navy began Annual Exercise 16 on November 16, 2015, a naval war game between Japan and the United States which featured the USS Ronald Reagan aircraft carrier. Consequently, a made-for-TV Chinese aerial attack on iconic aircraft carrier is expected.

Annual Exercise 16 was likely executed in order to provide a timely motive for an unprovoked attack by China on Japan which will likely result in the first ever Chinese beachhead and military base in Japan, a country which is currently home to numerous U.S. military bases.

In order to foreshadow the aformentioned attack on the USS Ronald Reagan aircraft carrier, the Washington Free Beacon published a report on December 15, 2015, entitled “Chinese Submarine Practiced Missile Attack on USS Reagan“. The incident  violated China’s 2014 commitment to the multinational Code for Unplanned Encounters at Sea, known as CUES, designed to reduce the risk of a shooting incident between naval vessels.

Four days later on December 19, 2015, USA Today published a report entitled “China Urges U.S. to Stop ‘Provocative Actions’ after B-52 Flights”, an action allegedly taken by the U.S. on December 10, 2015, which is designed to provide a timely motive for a revenge-like attack on America by China.

This notion was confimed the very same day on December 19, 2015, when the Examiner published a report entitled “China Blames U.S. for ‘Serious Military Provocation;’ Will Take Action“. Said action will likley be in the form of a suprise attack on Hawaii, Japan, the Philippines and/or mainland United States.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 20 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

China pearl harbor

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan
12. South China Sea (Disputed Islands)

South China Sea Attack
Based on breaking news and events, it appears that the CIA is plotting a Chinese attack on the U.S Navy which has ships trolling the disputed islands within the South China Sea. This latest Chinese attack narrative was first identified back on October 15, 2015, when the Guardian published a report entitled “Chinese Media: Military Must be Ready to Counter US in South China Sea”, foreshadowing that a confrontation may be imminent. Nine days later on October 24, 2015, Yahoo News published a report entitled “U.S. Patrols to Raise Stakes with Beijing in Disputed South China Sea”, further raising the specter of a naval confrontation with China. Three days later on October 27, 2015, Reuters published a report entitled “Angry China Shadows U.S. Warship Near Man-Made Islands”, foreshadowing a Chinese attack on the USS Lassen destroyer. Lastly, in what appear to be the final warning by China just prior to a surprise revenge-like attack, it was reported on October 27, 2015, that China has officially warned the United States after the USS Lassen passes near the disputed islands. Needless to say, these reports, taken collectively, suggest that a confrontation between the U.S. and China in the South China Sea is imminent.

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Advertisements

20151201_isis_tempo

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

SHOCK: 10 Reasons Why the Paris Terror Attacks Were Executed by the CIA

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
December 24, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva will stage a wave of Islamic terror in the Philippines which will likely be scapegoated onto the state-sponsored terror group known as ISIS.

Exactly what type of terror is planned for the Philippines is not known, but a future terror scenario in which soft targets are attacked by ISIS-inspired terrorists is the most likely terror scenario. That being said, the CIA could also stage an ISIS-related invasion of the island.

In what appears to be pre-ISIS terror programing for an attack on the Philippines, the International Business Times published a report back on October 14, 2015, entitled “ISIS in Philippines: New Video Shows Kidnapped Canadian, Norwegian Hostages Pleading for Life”.

In what appears to be pre-ISIS terror attack/invasion programming, ABS News published a report on November 15, 2015, entitled “Why Philippines Should Worry about ISIS Threat”. Said threat will likely manifest itself while in the very near future.

In order to raise the specter of an ISIS-related invasion of the Philippines just prior to its fruition in reality, the Manila Bulletin published a report on November 17, 2015, entitled “ISIS Has Not Penetrated the Philippines” despite numerous reports to the contrary.

In what appears to be the pre-terror attack strategy meeting in the Philippines, it was reported back on May 16, 2015, that so-called anti-terror experts from the Association of Southeast Asian Nations (ASEAN) member-states called for a “more intense approach against the possible influence of ISIS the region”.

The terror experts reportedly met in the Philippines on May 15, 2015, in order to “purposely […] craft a collective strategy against the spread of violent Islamist movements such as ISIS in Asia”. Translation, the Philippines has now been officially prepped for ISIS-related attacks.

In order to give the Pilipino government officials plausible deniability in the wake of a horrific terror attack in Manila, it was reported back on April 27, 2015, that the AFP stated that there are no ISIS militants in the Philippines.

Interestingly, that very same day, April 27, 2015, it was also reported that ISIS threatened the Philippines through the Black Flag Movement in Mindanao. Needless to say, the contrary reports suggest that an ISIS-related attack on the Philippines is imminent.

Pope

FLASHBACK: Pope Francis Assassination Foiled in the Philippines
Back on January 14, 2015, Truther.org published a report entitled “Terror/Stampede Alert for Philippines During Pope Francis’ Visit” in respect to the Catholic leader’s visit to the Philippines on January 15-19, 2015. Predictably, three days later on January 17, 2015, a so-called volunteer mysteriously died in an accident after the Pope’s mass in the Philippines. Although only conjecture, it appears that the man privy to first-hand knowledge of the foiled terror plot. Less than 24-hours later on January 18, 2015, the country of Indonesia reportedly executed 6 men for drug-related offenses. These men were likely the slated terrorists who planned to carry out the attack on Pope Francis. This notion is corroborated by the fact that on February 10, 2015, members of the Indonesian-based terror group Jemaah Islamiyahwere arrested in a plot to bomb Pope Francis while in the Philippines.

FLASHBACK: Bojinka Terror Plot in the Philippines
Back on January 6, 1995, the state-sponsored Bojinka Terror Plot was exposed in the Philippines. According to Wikipedia, the attack “would involve a plot to assassinate Pope John Paul II, an air bombing of 11 airliners flying from [the Philippines] to the United States with their approximately 4,000 passengers, and a proposal to crash a plane into the headquarters of the CIA in Fairfax County, Virginia”.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China pearl harbor

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

SHOCK: 10 Reasons Why the Paris Terror Attacks Were Executed by the CIA

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
December 22, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese surprise attack and/or invasion of America, Japan and/or the Philippines while President Obama is on vacation in Hawaii until January 4, 2016. The Pearl Harbor-like attack will predictably lead to World War III.

The notion that war will find Obama while on vaction in Hawaii was foreshadowed in a Washington Post report from December 21, 2015, entitled “The War in Afghanistan Follows Obama to His Vacation in Hawaii“.  The report stated that Obama does not support “the idea of endless war”, something which would transpire in the aftermath of a Chinese attack.

In what appears to be pre-World War III programming, it was reported on December 21, 2015, that the Pentagon is now preparing for war with China. The timely propaganda report stated that the DOD is intent on triggering a military conflict with China over disputed islands in the South China Sea, likely at Clark Air Base in the Philippines where the U.S. has stationed numerous Boeing P-8A Poseidon advanced maritime surveillance aircraft.

The impending Chinese attack will likely involve one or more of the following: a) conventional nuclear attack; b) a TV-related cyber-hijack and subsequent nuclear attack; c) an EMP attack; and/or d) the full-scale Chinese invasion of Australia, Hawaii, Japan, the Philippines, Taiwan, and/or mainland U.S.

Consequently, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

That being said, the U.S. Navy began Annual Exercise 16 on November 16, 2015, a naval war game between Japan and the United States which featured the USS Ronald Reagan aircraft carrier. Consequently, a made-for-TV Chinese aerial attack on iconic aircraft carrier is expected.

Annual Exercise 16 was likely executed in order to provide a timely motive for an unprovoked attack by China on Japan which will likely result in the first ever Chinese beachhead and military base in Japan, a country which is currently home to numerous U.S. military bases.

In order to foreshadow the aformentioned attack on the USS Ronald Reagan aircraft carrier, the Washington Free Beacon published a report on December 15, 2015, entitled “Chinese Submarine Practiced Missile Attack on USS Reagan“. The incident  violated China’s 2014 commitment to the multinational Code for Unplanned Encounters at Sea, known as CUES, designed to reduce the risk of a shooting incident between naval vessels.

The notion that China is about to impede on the U.S. military’s presence around the world was foreshadowed by a Russian Today report from November 27, 2015, entitled “China to Set Up 1st Overseas Naval Base in Djibouti Next to US Airbase”.

In what appears to be pre-U.S.-China war propaganda, it was reported on November 23, 2015, that the US and China have set up a ‘space hotline’ to avoid cosmic conflicts. Needless to say, said conflict will be naval rather than space-related.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 20 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan
12. South China Sea (Disputed Islands)

South China Sea Attack
Based on breaking news and events, it appears that the CIA is plotting a Chinese attack on the U.S Navy which has ships trolling the disputed islands within the South China Sea. This latest Chinese attack narrative was first identified back on October 15, 2015, when the Guardian published a report entitled “Chinese Media: Military Must be Ready to Counter US in South China Sea”, foreshadowing that a confrontation may be imminent. Nine days later on October 24, 2015, Yahoo News published a report entitled “U.S. Patrols to Raise Stakes with Beijing in Disputed South China Sea”, further raising the specter of a naval confrontation with China. Three days later on October 27, 2015, Reuters published a report entitled “Angry China Shadows U.S. Warship Near Man-Made Islands”, foreshadowing a Chinese attack on the USS Lassen destroyer. Lastly, in what appear to be the final warning by China just prior to a surprise revenge-like attack, it was reported on October 27, 2015, that China has officially warned the United States after the USS Lassen passes near the disputed islands. Needless to say, these reports, taken collectively, suggest that a confrontation between the U.S. and China in the South China Sea is imminent.

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Screen-Shot-2015-01-08-at-4.03.43-PM.png

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

SHOCK: 10 Reasons Why the Paris Terror Attacks Were Executed by the CIA

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
November 19, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva will stage a Chinese and/or ISIS-related attack on the APEC Philippines 2015 Summit in Manila on November 19, 2015.

Exactly what type of terror is planned for the Philippines is not known, but a future terror scenario in which the Chinese military invade the country of launch a missile based attack is highly likely. That being said, the CIA could also stage an ISIS-related attack and/or invasion during the high profile summit.

Although the impending attack on the Philippines could target the APEC Philippines 2015 Summit directly, the CIA may stage an attack on the summit protesters who are now reportedly clashing with police outside the APEC summit in Manila.

In what appears to be pre-ISIS hostage terror programing for an attack on the APEC Philippines 2015 in Manila, the International Business Times published a report back on October 14, 2015, entitled “ISIS in Philippines: New Video Shows Kidnapped Canadian, Norwegian Hostages Pleading for Life”.

In what appears to be pre-ISIS terror attack/invasion programming, ABS News published a report on November 15, 2015, entitled “Why Philippines Should Worry about ISIS Threat”. Said threat will likely manifest itself while the world is collectively fixated on the APEC Philippines 2015 Summit.

In order to raise the specter of an ISIS-related invasion of the Philippines just prior to its fruition in reality, the Manila Bulletin published a report on November 17, 2015, entitled “ISIS Has Not Penetrated the Philippines” despite numerous reports to the contrary.

In what appears to be the pre-terror attack strategy meeting in the Philippines, it was reported back on May 16, 2015, that so-called anti-terror experts from the Association of Southeast Asian Nations (ASEAN) member-states called for a “more intense approach against the possible influence of ISIS the region”.

The terror experts reportedly met in the Philippines on May 15, 2015, in order to “purposely […] craft a
collective strategy
against the spread of violent Islamist movements such as ISIS in Asia”. Translation, the Philippines has now been officially prepped for ISIS-related attacks.

In order to give the Pilipino government officials plausible deniability in the wake of a horrific terror attack in Manila, it was reported back on April 27, 2015, that the AFP stated that there are no ISIS militants in the Philippines.

Interestingly, that very same day, April 27, 2015, it was also reported that ISIS threatened the Philippines through the Black Flag Movement in Mindanao. Needless to say, the contrary reports suggest that an ISIS-related attack on the Philippines is imminent.

FLASHBACK: Pope Francis Assassination Foiled in the Philippines
Back on January 14, 2015, Truther.org published a report entitled “Terror/Stampede Alert for Philippines During Pope Francis’ Visit” in respect to the Catholic leader’s visit to the Philippines on January 15-19, 2015. Predictably, three days later on January 17, 2015, a so-called volunteer mysteriously died in an accident after the Pope’s mass in the Philippines. Although only conjecture, it appears that the man privy to first-hand knowledge of the foiled terror plot. Less than 24-hours later on January 18, 2015, the country of Indonesia reportedly executed 6 men for drug-related offenses. These men were likely the slated terrorists who planned to carry out the attack on Pope Francis. This notion is corroborated by the fact that on February 10, 2015, members of the Indonesian-based terror group Jemaah Islamiyah were arrested in a plot to bomb Pope Francis while in the Philippines.

FLASHBACK: Bojinka Terror Plot in the Philippines
Back on January 6, 1995, the state-sponsored Bojinka Terror Plot was exposed in the Philippines. According to Wikipedia, the attack “would involve a plot to assassinate Pope John Paul II, an air bombing of 11 airliners flying from [the Philippines] to the United States with their approximately 4,000 passengers, and a proposal to crash a plane into the headquarters of the CIA in Fairfax County, Virginia”. Evidently, the CIA is planning a redux of at least part of the allegedly foiled terror plot.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
November 14, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva will stage a made-for-TV assassination “event” of President Obama’s during his upcoming visit to Turkey, the Philippines and Malaysia on November 14-22, 2015.

According to reports, Obama will attend: the 2015 G-20 Antalya Summit in Antalya, Turkey on November 15-16, 2015; the APEC Philippines 2015 Summit in in Manila on November 18-19, 2015; and the Tenth East Asia Summit in Kuala Lumpur, Malaysia on November 21-22, 2015.

Back on July 21, 2015, the BBC revealed that the “travel pool” is a group of journalists who accompany Obama wherever he goes so that they can report on what’s euphemistically known as his “transformative moment” (i.e., a made-for-TV assassination/terror attack).

Exactly what type of terror is planned for Obama is not known, but a sniper-related assassination event is the most likely terror scenario. That being said, a surprise attack by the state-sponsored terror group ISIS is also a realistic possibility.

In order to provide a timely motive for a terrorist attack on Obama, it was reported on July 28, 2015, that while in Africa, Obama stated that “I’m a pretty good president” and that “If I ran for a third term, I could win”. Needless to say, the assassination of Obama would obviously prevent that.

In the event that Obama suffers an attack, it will likely be reported that he died, only to reappear injured or unscathed at a later date. This hoax will be seen as the death and resurrection of Obama who, politically speaking, has been on life-support for quite some time.

An elaborate assassination “event” will do the same for Barack Obamas as it did for one Adolf Hitler. Back on July 20, 1944, Hitler was targeted in an unsuccessful bombing, resulting in 5,000 executions and 7,000 arrests.

In the wake of a successful Obama assassination “event”, the attack will be used as an excuse to round up “disloyal” Americans within the U.S. government, bringing about the naked dictatorship of one Barack Hussein Obama II.

Considering Obama’s poll numbers are at an all-time low, an assassination event would boost his popularity as well as the Democrats who suffered historic losses in November’s election. An attack could also be used to institute some form of martial law, possibly to find the alleged assassin, making every American gun owner a suspect.

The notion that Obama is vulnerable to an attack was recently witnessed on October 3, 2014, when it was revealed the Secret Service allowed a fake congressman to sneak backstage at Obama event in Washington, D.C. Needless to say, the event was staged in order to set the precedent for a similar event that will likely culminate with an attack on Obama’s person.

Back on September 10, 2015, it was reported that a Georgia couple created a 7-acre corn maze tribute to “American Sniper” Chris Kyle. Needless to say, the CIA-spawned publicity stunt was executed in order to raise the profile of snipers just prior to a false-flag sniper attack on Obama.

Lastly, in what appears to be pre-Obama assassination terror programming, it was reported back on October 21, 2015, that a creepy viral video contained a hidden threat to kill President Obama. Needless to say, the video was created by the CIA in order to foreshadow an attack on Obama.

obama

Obama Under Threat
Prior to a high-profile Obama assassination event or terrorist attack his person, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, Obama-related attacks, threats and security breaches are now at an all-time high which suggests that a state-sponsored attack on Obama or the White House is imminent. Since 2007, there have been over 100 Obama assassination threats and plots in which individuals were either questioned, arrested, detained or convicted for making death threats against Obama. It appears that most if not all of these Obama-related assassination events were staged in order to give the impression that Obama is in tremendous danger, especially due to his race. Whether people like Obama or not, the staged or real assassination of Obama must be stopped at all costs. An assassination event of Obama would ultimately divide America between black and white, Democrat and Republican, and would inevitably cause riots, looting, violence, bloodshed and chaos across America.

121019095738-secret-service-story-top

Secret Service in Chaos
In what appears to be pre-Obama assassination programming, The Telegraph published a report on September 29, 2014, entitled “Is Barack Obama’s Life Safe in the Secret Service’s Hands?“. The ominous report was evidently designed to foreshadow that an attack on Obama’s person is imminent. With the resignation of Chief Julia Pierson, the director of the Secret Service, on October 1, 2014, the Secret Service has never looked more vulnerable to an attack. Pierson’s resignation came in the wake of several security breaches that were designed to set the precedent for an attack on the Obama White House. In what appears to be pre-Obama assassination terror programming, the Huffington Post published a report on October 1, 2014, entitled “Politico Piece Says Obama’s Assassination Might Be Only Thing That Could Improve Secret Service”. Two days later on October 3, 2014, it was reported that the Secret Service allowed a fake congressman to sneak backstage at Obama event in Washington, D.C., ultimately setting the precedent for a similar event. Roughly a week later on October 9, 2014, a former agent stated that the Secret Service is now in collapse. Needless to say, the aforementioned reports have made the U.S. Secret Service look weak, making the likelihood of an attack on President Obama all the more likely. In order to provide plausible deniability for the U.S. government in the wake of a White House attack, it was reported on November 10, 2014, that the Secret Service has dealt with 40 White House barrier-jumping incidents, a fabricated number to be sure. Three days later on November 13, 2014, it was reported that a fence jumping probe has found problems with the Secret Service. The timely report was designed to show that the Secret Service is weak, making the likelihood of a successful attack on the Obama and/or the White House seem all the more plausible. In more pre-coup programming, it was reported on November 20, 2014, that the Secret Service arrested a woman with a gun outside the White House. The alleged incident occurred shortly after President Obama delivered an address to the nation on immigration, foreshadowing a potential motive for the impending coup. Lastly, on March 11, 2015, it was reported that 2 Secret Service agents crashed into White House barricades after attending a party. The timely report was evidently fabricated by the CIA in order to show Secret Service malfeasance just prior to a lapse in presidential security when Obama is attacked.

FLASHBACK: White House Dinner Assassination Plot
Back on May 2, 2014, Truther.org issued a terror warning in respect to the 2014 White House Correspondences’ Association (WHCA) which took place on May 3, 2014. Interestingly, three days later on May 6, 2014, a car allegedly trailing President Obama daughters’ motorcade prompted a White House lockdown. What exactly a suspicious car had to do with the White House is not known, but evidently the subsequent lockdown provided the necessary cover needed so that weapons and/or explosives could be removed from the White House premises without drawing any suspicion.

FLASHBACK: MSNBC Assassination Plot
Back on December 4, 2013, Truther.org published a report entitled, “Live TV Obama Assassination “Event” Planned for December 5, 2013 on MSNBC?” in respect to a possible “live” Obama terror event planned for American University (AU). Two weeks later on December 16, 2013, it was reported that American University went into lockdown after an alleged gunman was reported on campus. Predictably, the gunman turned out to be an off-duty police officer but that fact wasn’t reported until the entire AU campus was locked down for 2 full hours. The gunman at American University was evidently staged in order to create a major diversion on campus so that intelligence agencies (e.g., the ATF, FBI, CIA, etc.) could dispose of any incriminating evidence (e.g., weapons and/or explosives) planted on campus in preparation for the planned attacks. In order to remove said incriminating evidence without drawing any suspicion from students and staff, a mini-false-flag was executed in order to provide the necessary cover needed to clean-up the now foiled false-flag. In other words, since the terror plots were exposed, a second operation had to be executed under the cover of an emergency in order to tie up loose ends.

FLASHBACK: Smithsonian Assassination Plot
Back on November 20, 2013, Truther.org published a report entitled, “Obama Assassination “Event” May Be Planned for JFK Legacy Dinner at the Smithsonian’s National Museum of American History”. Coincidentally, three days later on November 23, 2013, it was confirmed that an unidentified man fell to his death from the fourth floor railing at the Smithsonian National Museum of the American Indian in Washington, D.C. Whether or not this man was involved in an Obama assassination “event” is not known, but his death is highly suspicious and has all the earmarks of a foiled state-sponsored terror attack.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss