Archive for the ‘San Diego Terror’ Category

isis-texas.jpg

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history and may try and assassinate me Switzerland, especially since I have decifered the code (i.e., the Davinci Code) which is used by Greenland to plot terror attacks in the underworld via the CIA, hence the long list of foiled terror attacks and timely Truther.org terror alerts.

TRUTHER.ORG TERROR ALERT TIMELINE

1. DEC 11, 2013: Comet ISON Declared Dead: Truther.org Alert: 1 Day Prior
2. JAN 13, 2014: Wesley Chapel Theater Shooting: Truther.org Alert: 38 Days Prior
3. MAY 23, 2014: Santa Barbara Massacre: Truther.org Alert: 26 Days Prior
4. OCT 28, 2014: 
Antares Rocket Launch Explosion: Truther.org Alert: 1 Day Prior
5. NOV 20, 2014:
Florida State University Shooting: Truther.org Alert: 2 Days Prior 
6. JUN 19, 2015:
Golden State Warriors Victory Parade Shooting: Truther.org: Same Day
7. OCT 1, 2015: 
Umpqua Community College Shooting: Truther.org Alert: 7 Days Prior
8. NOV 27, 2015: Planned Parenthood Shooting:  Truther.org Alert: 1 Day Prior
9. NOV 13, 2015:
Paris Terror Attacks: Truther.org Alert: 4 Days Prior 
10. DEC 5, 2015:
London Undergroud Jihad Attack: Truther.org Alert: 9 Days Prior 
11. DEC 25, 2015:
The Philippines Terror Attack: Truther.org Alert: 1 Day Prior

[Does not purport to be complete list of timely Truther.org terror alerts]

SHOCK: 10 Reasons Why the Paris Terror Attacks Were Executed by the CIA

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
January 2, 2016 
Truther.org

SWITZERLAND, Zurich —Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is plotting a wave of ISIS-inspired attacks in Mexico and/or the full-scale ISIS invasion of Mexico, most likely in Tijuana.

The notion that the state-sponsored terror group ISIS has already invaded Mexico was confirmed back on April 14, 2015, when it was reported that Mexican authorities confirmed that an ISIS terrorist camp was only a few miles away from Texas.

Although the impeding ISIS attack and/or invasion of Mexico could theoretically tranpsire anywhere withing the country of Mexico, it will most likely occure across the border from San Diego, California at the Tijuana International Airport in Mexico.

A future terror scenario in which one or more hijacked planes land at the  Tijuana International Airport specifically so that scores of Islamic terrorists can invade the United States via the new Cross Border Xpress air terminal which now connects the two countries appears imminent.

Although only conjecture, it appears that the first-ever American airport bridge straddling two countries was specifically built at behest of the CIA on December 9, 2015, in order to facilitate the ISIS-insprired invasion of the United States via Tijuana, Mexico.

Said invasion will likely come via the previously hijacked Malaysian Airlines Flight MH370 which was disappeared by the CIA back on March 8, 2014, in order to transport scores of ISIS terrorists to the West. That being said, other hijacked airliners could be utilized in the impeding invasion as well.

The disappearance of Malaysian Airlines Flight MH370 is unprecedented and therefore highly suspicious, namely because it was previously outfitted with GPS navigational equipment which has never been used to locate the plane. Consequently, it can be deduced that the plane was specifically disappeared so that it can be used in an upcoming terror attack.

 

The invasion will likley be executed in-part by 2 Afghani men who went missing on December 11, 2015, while reportedly training at Georgia Air Force Base. Aside from being pilots, the 2 missing Afghani airmen will predictably have military clearence, allowing them to circumvent the Mexican Air Force and/or the U.S. Air Force.

Coincidentally, the notion of an airliner crashlanding was recently witnessed on December 15, 2015 when 8 people were injured after a Southwest Airlines plane crash landed in Nashville, Tennessee. The incident was likely staged by the CIA in order to set the precedent for a similar landing in Mexico.

maxresdefault.jpg

Terrorist Invasion via Mexico
In order to raise the notion of human terrorist trafficking on the U.S.-Mexico border just prior to the state-sponsored Islamic terrorist invasion of America, it was reported on November 18, 2015, that San Diego Border Patrol agents are now hunting for a human trafficker who assaulted an officer. In what appears to be a CIA-spawned publicity stunt designed to raise the specter of smuggling on the U.S.-Mexico border just prior to an Islamic terrorist invasion,. it was reported on November 19, 2015, that a traveler was busted for smuggling 450 illegal pork tamales. That same day, November 19, 2015, CNN published a report entitled “More Mexicans Seen Leaving the US than Arriving”. The timely propaganda report was evidently designed to highlight illegal immigration on the southern U.S. border just prior to the impending invasion. The notion that Islamic terrorists will be invading America via the U.S.-Mexico border was foreshadowed by a Fox News report from November 20, 2015, entitled “Phoenix Flagged as Potential ‘Hotbed’ for Terror Recruiting”. Three days later on November 23, 2015, KVOA News published a report entitled “Group Patrols Arizona Border for Terrorists”, raising the notion of Islamic terrorists invading the United States via the state of Arizona prior to its fruition in reality.

Islamic Invasion of Americas Trending
Prior to a high-profile Islamic invasion of the United States via Mexico, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, Islamic person traveling to the Americas is now at an all-time high which suggests that a state-sponsored Islamic invasion of the United States is imminent.

Islamic Invasion Timeline
:

1. November 18, 2015: 8 Syrians Caught at Texas Border in Laredo
2. November 19, 2015: Honduras arrests 5 US-bound Syrians with stolen passports
3. November 19, 2015: 6 Middle Eastern men arrested crossing Mexico-Arizona border
4. November 21, 2015: 3 Syrian refugees with fake passports detained near Puerto Rico!
5. November 21, 2015: 3 Syrians Detained in St. Maarten, 1 Stopped in Honduras
6. November 22, 2015: 5 more Syrians stopped at Texas border

[Does not purport to be a complete list of Islamic invasion incidents]

Flight MH370

Flight MH370 Attack/Invasion
Based on breaking news and events, it appears that the CIA in Switzerland is plotting an attack via Malaysian Airlines Flight MH370 which was specifically hijacked by CIA on March 8, 2014, in order to execute a surprise WMD attack and/or stage the full-scale ISIS invasion of America, Australia, the Caribbean, Europe and/or the Mediterranean. According to a report dated July 29, 2015, debris found in the Indian Ocean is now being checked to see if it emanated from Flight MH370. The report was evidently designed to draw unprecedented media attention to the hijacked plane just prior to a 9/11-style attack and/or terrorist invasion. Although a USA Today report from August 2, 2015, stated that the debris found on Reunion Island was not from Flight 370, an August 5, 2015, report from Reuters broke the story that Malaysia Airlines has confirmed that airplane parts found on Reunion Island are in fact from Flight MH370. Whether this discovery will stand the test of time is not known, but it’s highly unlikely as it appears to be a hoax. Consequently, a 9/11-style attack and/or an ISIS-related terrorist invasion via Flight MH370 now appears imminent.

090314_airport

Islamic Airport Attack
Back on April 10, 2014, a photo of San Francisco Airport appeared in al-Qaida’s magazine “Inspire”. Since Al Qaeda and ISIS are the primary terrorist arms of the CIA, the magazine’s “photos” are in essence the targets that the CIA is planning to attack. The notion that Islamic terrorists wants to execute an airport related terror attack was foreshadowed back on October 6, 2014, when a teenager was arrested at O’Hare Airport in Chicago after trying to join ISIS. Less than a week later on October 12, 2014, U.S. General Dempsey stated that ISIS had “straight shot” to Baghdad airport, implying that an ISIS airport attack may be forthcoming. Roughly 5-months later on March 7, 2015, a female ISIS recruiter was reportedly arrested at the Barcelona Airport. Less than 24.-hours on March 8, 2015, 2 teenagers were reportedly stopped at the Sydney Airport on suspicion of trying to join ISIS, further suggesting that an ISIS-related airport attack is imminent. Lastly, on September 21, 2015, it was reported that 5 ISIS terror suspects were nabbed at the Johannesburg airport with $6,000,000 in cash. The incident was obviously fabricated or staged in order to show that wealthy ISIS terrorists will target airports in the near future, most likely in America. Needless to say, these reports, taken collectively, confirm that an ISIS-related airport attack is now in play.

Islamic Airport Attacks:

1. June 9, 2014: ‘This is just the beginning’: Taliban claim Pakistan airport attack
2. June 10, 2014: Gunmen attack Karachi Airport security training facility in second assault
3. June 26, 2014: Separatists attack airport in east Ukraine, defy truce
4. July 17, 2014: Gunmen attack airport in Afghan capital
5. July 27, 2014: Over 50 dead in Tripoli airport battle as foreigners leave collapsing Libya
6. August 9, 2014: Rocket hits Kabul airport after Kerry departure
7. August 23, 2014: Libyan militants claim to have taken control of Tripoli’s main airport
8. November 11, 2014: Shiite rebels clash with security guards at Sanaa airport; 4 killed
9. December 21, 2014: 20 jihadists killed in failed east Syria airport attack
10. March 19, 2015: Clashes in southern Yemeni city force closure of airport
11. April 16, 2015: Al Qaeda captures major airport, seaport and oil terminal in southern Yemen
12. May 17, 2015: Suicide car bomb near Kabul airport kills at least 3
13. May 29, 2015: Islamic State affiliate in Libya takes civilian airport in Sirte
14. August 4, 2015: Yemen crisis: Houthi rebels ‘driven from key al-Anad airbase’
15. August 10, 2015: Suicide blast hits Kabul airport road amid surge in violence
16. September 18, 2015:
Taliban kill 29 in attack on Pakistan air force base’s mosque
17. September 30, 2015: NATO forces fight Taliban near besieged Kunduz airport
18. December 9, 2015: 46 Dead After Taliban Attack Airport In Afghanistan

[Does not purport to be a complete list of Islamic airport attacks]

GITMO Invasion

Mass Invasions Trending
Prior to the full-scale terrorist invasion of Florida, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, invasion-related terror is now at an all-time high which suggests that a state-sponsored Islamic terrorist invasion of the United States is imminent. The invasion terror narrative was first identified back on July 24, 2015, when Yahoo News published a report entitled “Saudi King Hits French Beach — With a Cast of 1,000”, foreshadowing an Islamic beach invasion of at least1,000 Islamic terrorists. Three days later on July 27, 2015, it was reported that illegal immigrants stormed Miami Beach during a model’s photoshoot. A day later on July 28, 2015, the U.S. Border Patrol reportedly responds to a video of illegals ‘storming the shore’ in Miami, an apparent preview of things to come post Cuba-terrorist attack. A day later on July 29, 2015, it was reported that a man died after 1,500 migrants from Africa and the Middle East stormed the Eurotunnel between England and France. A day later on July 30, 2015, it was reported that a human smuggling ring that transported immigrants dismantled in Texas. Four days later on August 3, 2015, 24 Cuban migrants reportedly landed in Key West. Needless to say, these reports, taken collectively, suggest that a state-sponsored Islamic terrorist invasion of the United States is imminent. Lastly, on August 7, 2015, the Washington Times published a report entitled “DHS Admits New Surge of Illegal Immigrant Families”, further foreshadowing the notion of a surge by illegal aliens, most likely affiliated with ISIS.

A drone designed and constructed by Concepcion University and the Chilean army is seen during a flight test at Concepcion city

Predator Drone Strikes
In the aftermath of an ISIS invasion of Florida Predator drones will be released in mass in order to hunt and kill the Islamic terrorists. In time, said terrorists will be linked to white domestic terrorists, resulting in drone strikes on both parties. After all, the goal of the Obama administration is to somehow merge bearded Islamic terrorists with those who fly the Confederate Rebel Flag and root for the Ole Miss Rebels in the American South. These so-called domestic/jihadist terrorists will likely be dubbed “White Al Qaeda”, looking similar to the actors depicted on the hit television show Duck Dynasty. This marriage will give the U.S. government the plausible deniability it needs so that it the wake of domestic drone strikes, it cannot be held responsible for not being able to discern between Islamic terrorists and so-called domestic terrorists. This will ultimately allow the Obama administration to eradicate all of its political opposition with autonomous Predator drones, a preview of which was witnessed back on November 30, 2013, when Paul Walker was assassinated via drone strike in Los Angeles. The notion that Predator drones are the endgame of JADE HELM 15 was ominously foreshadowed by Daily Show host John Stewart on May 4, 2015, when he made a reference to the Predator (and thereby Predator drones) in relation to JADE HELM 15. Stewart stated, “I find it adorable that your governor [of Texas] thinks your state guard can take on the U.S. military; it’s like a little dog growling at a big dog, or an 8-year old dog picking a fight with the Predator”.

FEMA-Camp-ft

FEMA Camps
The endgame of JADE HELM 15 is the opening of Nazi-like FEMA concentration camps which have been built for the wholesale slaughter of the American public. Yes, there are concentration camps located across the United States, a notion which has been confirmed by multiple mainstream and alternative news sources. Bard-wire fences facing inward, human transport rail cars, mass coffins, and human incinerators reminiscent of Nazi Germany’s concentration camps are all present at FEMA facilities across America. In the aftermath of the ISIS invasion of Texas, FEMA camps will be opened under the guise of housing Islamic terrorists who were apprehended in Texas. In time, these Islamic terrorists will be joined by thousands of Texans who are allegedly working with ISIS. The notion that the war game is cover for the opening of FEMA camps was first identified back on March 23, 2015 in an Army Times report which stated that JADE HELM 15 would prepare troops to “throw citizens in FEMA camps,” and that there are allegations that “FEMA ‘death domes’ popping up across Texas“, purportedly to “house captured American insurgents”. Roughly 6-weeks later on May 6, 2015, the New York Times published a report which stated that “shuttered Wal-Mart stores would be used for “FEMA processing camps“. Roughly 2-weeks later on May 17, 2015, the Hartford Courant‍ published a report which stated that the U.S. military “plans to round up political dissidents” and “remove key political figures”, plans eerily reminiscent of Nazi Germany. Roughly 2-months later on July 10, 2015, the Houston Chronicle published a report which stated that JADE HELM is raising “fears [about] the imminent opening of concentration camps”. That same day, July 10, 2015, Russia Today published a report which stated that JADE HELM 15 will feature “deportations to FEMA “internment camps”. Two days later on July 12, 2015, the New York Times published a report which stated that “Political opponents of President Obama will be rounded up and herded into detention centers”. Also on July 12, 2015, Yahoo News published a report which quoted a Bastrop, Texas resident Josh Munyon who stated that “They already have FEMA trains that […] look like the trains that the Nazis used in World War II”. A day later on July 13, 2015, the Guardian published a report which stated that JADE HELM 15 is a prelude to “locking innocent Americans in internment camps”. A day later on July 14, 2015, Russia Today published a report which stated that Texans may be “bundled into concentration camps”. Needless to say, these reports, taken collectively, suggest that JADE HELM 15 is for the cover for the opening of Nazi-like FEMA concentration camps which will cull millions of Americans, namely in Texas.

FEMA Camp Propaganda
Based on breaking news and events, it now appears that the Obama administration (at the behest of the CIA in Switzerland) is preparing to open FEMA Camps in America, namely in Texas. This redux of Nazi-Germany will likely transpire in the aftermath of an ISIS invasion, under the guise of housing Islamic terrorists. In time, the FEMA camps will house and exterminate millions of people deemed by Obama to be a threat to the U.S. government. In order to psychologically prepare American and the world for the opening of FEMA Camps, a number of propaganda reports in respect to “World War II-style camps”, “prison camps”, “interrogation facilities”, and “detention” centers and facilities have been published. For example, on July 21, 2015, ex-NATO Commander and former U.S. General Wesley Clark suggests that World War II-style camps should be opened for radicalized Americans. This shocking statement was echoed by a report from July 21, 2015, entitled “FEMA Identifying Potential ‘Extremists’”. Three days later on July 24, 2015, CNN published a report entitled “America’s Shameful ‘Prison Camps’”, further programming the world for FEMA Camps in America. Roughly 2-weeks later on August 5, 2015, it was reported that Chicago police have detained thousands of black Americans at an interrogation facility, further confirming that FEMA-like camps exist. That same day, August 5, 2015, it was reported that Israel has placed a Jewish extremist in administrative detention where he will be denied due process. Lastly, on August 7, 2015, Fox News published a report entitled “Justice Department Asks Judge Not to Release Families in Immigration Detention Centers”, further foreshadowing the notion that once a person has been detained in a FEMA Camp they will not be released. Needless to say, these reports, taken collectively, conform that FEMA Camps will be opened in the United States in order to cull millions of people.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Advertisements

151127ProcesoCBX ENG

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

SHOCK: 10 Reasons Why the Paris Terror Attacks Were Executed by the CIA

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
December 16, 2015
Truther.org

SWITZERLAND, Zurich —Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is plotting the full-scale ISIS-inspired terrorist attack and/or invasion of San Diego, California via the Tijuana International Airport in Mexico.

Said invasion will likely come via the previously hijacked Malaysian Airlines Flight MH370 which was disappeared by the CIA back on March 8, 2014, in order to transport scores of ISIS terrorists to the West. That being said, other hijacked airliners could be utilized in the impeding invasion as well.

The disappearance of Malaysian Airlines Flight MH370 is unprecedented and therefore highly suspicious, namely because it was previously outfitted with GPS navigational equipment which has never been used to locate the plane. Consequently, it can be deduced that the plane was specifically disappeared so that it can be used in an upcoming terror attack.

A future terror scenario in which Flight MH370 crash lands at the  Tijuana International Airport and scores of Islamic terrorists invade the United States via the new Cross Border Xpress air terminal which now connects the two once serperated countries now appears imminent.

Although only conjecture, it appears that the first-ever American airport bridge straddling two countries was specifically opened by the CIA on December 9, 2015, in order to facilitate the ISIS-insprired invasion of the U.S. via Mexico.

The invasion will likley be executed in-part by 2 Afghani men who went missing on December 11, 2015, while reportedly training at Georgia Air Force Base. Aside from being pilots, the 2 missing Afghani airmen will predictably have military clearence, allowing them to circumvent the Mexican Air Force and/or the U.S. Air Force.

Coincidentally, the notion of an airliner crashlanding was recently witnessed on December 15, 2015 when 8 people were injured after a Southwest Airlines plane crash landed in Nashville, Tennessee. The incident was likely staged by the CIA in order to set the precedent for a similar landing in Mexico.

 

Flight MH370

Malaysian Airlines Flight MH370 Attack/Invasion
Based on breaking news and events, it appears that the CIA in Switzerland is plotting an attack via Malaysian Airlines Flight MH370 which was specifically hijacked by CIA on March 8, 2014, in order to execute a surprise WMD attack and/or stage the full-scale ISIS invasion of America, Australia, the Caribbean, Europe and/or the Mediterranean. According to a report dated July 29, 2015, debris found in the Indian Ocean is now being checked to see if it emanated from Flight MH370. The report was evidently designed to draw unprecedented media attention to the hijacked plane just prior to a 9/11-style attack and/or terrorist invasion. Although a USA Today report from August 2, 2015, stated that the debris found on Reunion Island was not from Flight 370, an August 5, 2015, report from Reuters broke the story that Malaysia Airlines has confirmed that airplane parts found on Reunion Island are in fact from Flight MH370. Whether this discovery will stand the test of time is not known, but it’s highly unlikely as it appears to be a hoax. Consequently, a 9/11-style attack and/or an ISIS-related terrorist invasion via Flight MH370 now appears imminent.

090314_airport

Islamic Airport Attack
Back on April 10, 2014, a photo of San Francisco Airport appeared in al-Qaida’s magazine “Inspire”. Since Al Qaeda and ISIS are the primary terrorist arms of the CIA, the magazine’s “photos” are in essence the targets that the CIA is planning to attack. The notion that Islamic terrorists wants to execute an airport related terror attack was foreshadowed back on October 6, 2014, when a teenager was arrested at O’Hare Airport in Chicago after trying to join ISIS. Less than a week later on October 12, 2014, U.S. General Dempsey stated that ISIS had “straight shot” to Baghdad airport, implying that an ISIS airport attack may be forthcoming. Roughly 5-months later on March 7, 2015, a female ISIS recruiter was reportedly arrested at the Barcelona Airport. Less than 24.-hours on March 8, 2015, 2 teenagers were reportedly stopped at the Sydney Airport on suspicion of trying to join ISIS, further suggesting that an ISIS-related airport attack is imminent. Lastly, on September 21, 2015, it was reported that 5 ISIS terror suspects were nabbed at the Johannesburg airport with $6,000,000 in cash. The incident was obviously fabricated or staged in order to show that wealthy ISIS terrorists will target airports in the near future, most likely in America. Needless to say, these reports, taken collectively, confirm that an ISIS-related airport attack is now in play.

Islamic Airport Attacks:

1. June 9, 2014: ‘This is just the beginning’: Taliban claim Pakistan airport attack
2. June 10, 2014: Gunmen attack Karachi Airport security training facility in second assault
3. June 26, 2014: Separatists attack airport in east Ukraine, defy truce
4. July 17, 2014: Gunmen attack airport in Afghan capital
5. July 27, 2014: Over 50 dead in Tripoli airport battle as foreigners leave collapsing Libya
6. August 9, 2014: Rocket hits Kabul airport after Kerry departure
7. August 23, 2014: Libyan militants claim to have taken control of Tripoli’s main airport
8. November 11, 2014: Shiite rebels clash with security guards at Sanaa airport; 4 killed
9. December 21, 2014: 20 jihadists killed in failed east Syria airport attack
10. March 19, 2015: Clashes in southern Yemeni city force closure of airport
11. April 16, 2015: Al Qaeda captures major airport, seaport and oil terminal in southern Yemen
12. May 17, 2015: Suicide car bomb near Kabul airport kills at least 3
13. May 29, 2015: Islamic State affiliate in Libya takes civilian airport in Sirte
14. August 4, 2015: Yemen crisis: Houthi rebels ‘driven from key al-Anad airbase’
15. August 10, 2015: Suicide blast hits Kabul airport road amid surge in violence
16. September 18, 2015:
Taliban kill 29 in attack on Pakistan air force base’s mosque
17. September 30, 2015: NATO forces fight Taliban near besieged Kunduz airport
18. December 9, 2015: 46 Dead After Taliban Attack Airport In Afghanistan

[Does not purport to be a complete list of Islamic airport attacks]

 

GITMO Invasion

Mass Invasions Trending
Prior to the full-scale terrorist invasion of Florida, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, invasion-related terror is now at an all-time high which suggests that a state-sponsored Islamic terrorist invasion of the United States is imminent. The invasion terror narrative was first identified back on July 24, 2015, when Yahoo News published a report entitled “Saudi King Hits French Beach — With a Cast of 1,000”, foreshadowing an Islamic beach invasion of at least1,000 Islamic terrorists. Three days later on July 27, 2015, it was reported that illegal immigrants stormed Miami Beach during a model’s photoshoot. A day later on July 28, 2015, the U.S. Border Patrol reportedly responds to a video of illegals ‘storming the shore’ in Miami, an apparent preview of things to come post Cuba-terrorist attack. A day later on July 29, 2015, it was reported that a man died after 1,500 migrants from Africa and the Middle East stormed the Eurotunnel between England and France. A day later on July 30, 2015, it was reported that a human smuggling ring that transported immigrants dismantled in Texas. Four days later on August 3, 2015, 24 Cuban migrants reportedly landed in Key West. Needless to say, these reports, taken collectively, suggest that a state-sponsored Islamic terrorist invasion of the United States is imminent. Lastly, on August 7, 2015, the Washington Times published a report entitled “DHS Admits New Surge of Illegal Immigrant Families”, further foreshadowing the notion of a surge by illegal aliens, most likely affiliated with ISIS.

A drone designed and constructed by Concepcion University and the Chilean army is seen during a flight test at Concepcion city

Predator Drone Strikes
In the aftermath of an ISIS invasion of Florida Predator drones will be released in mass in order to hunt and kill the Islamic terrorists. In time, said terrorists will be linked to white domestic terrorists, resulting in drone strikes on both parties. After all, the goal of the Obama administration is to somehow merge bearded Islamic terrorists with those who fly the Confederate Rebel Flag and root for the Ole Miss Rebels in the American South. These so-called domestic/jihadist terrorists will likely be dubbed “White Al Qaeda”, looking similar to the actors depicted on the hit television show Duck Dynasty. This marriage will give the U.S. government the plausible deniability it needs so that it the wake of domestic drone strikes, it cannot be held responsible for not being able to discern between Islamic terrorists and so-called domestic terrorists. This will ultimately allow the Obama administration to eradicate all of its political opposition with autonomous Predator drones, a preview of which was witnessed back on November 30, 2013, when Paul Walker was assassinated via drone strike in Los Angeles. The notion that Predator drones are the endgame of JADE HELM 15 was ominously foreshadowed by Daily Show host John Stewart on May 4, 2015, when he made a reference to the Predator (and thereby Predator drones) in relation to JADE HELM 15. Stewart stated, “I find it adorable that your governor [of Texas] thinks your state guard can take on the U.S. military; it’s like a little dog growling at a big dog, or an 8-year old dog picking a fight with the Predator”.

FEMA-Camp-ft

FEMA Camps
The endgame of JADE HELM 15 is the opening of Nazi-like FEMA concentration camps which have been built for the wholesale slaughter of the American public. Yes, there are concentration camps located across the United States, a notion which has been confirmed by multiple mainstream and alternative news sources. Bard-wire fences facing inward, human transport rail cars, mass coffins, and human incinerators reminiscent of Nazi Germany’s concentration camps are all present at FEMA facilities across America. In the aftermath of the ISIS invasion of Texas, FEMA camps will be opened under the guise of housing Islamic terrorists who were apprehended in Texas. In time, these Islamic terrorists will be joined by thousands of Texans who are allegedly working with ISIS. The notion that the war game is cover for the opening of FEMA camps was first identified back on March 23, 2015 in an Army Times report which stated that JADE HELM 15 would prepare troops to “throw citizens in FEMA camps,” and that there are allegations that “FEMA ‘death domes’ popping up across Texas“, purportedly to “house captured American insurgents”. Roughly 6-weeks later on May 6, 2015, the New York Times published a report which stated that “shuttered Wal-Mart stores would be used for “FEMA processing camps“. Roughly 2-weeks later on May 17, 2015, the Hartford Courant‍ published a report which stated that the U.S. military “plans to round up political dissidents” and “remove key political figures”, plans eerily reminiscent of Nazi Germany. Roughly 2-months later on July 10, 2015, the Houston Chronicle published a report which stated that JADE HELM is raising “fears [about] the imminent opening of concentration camps”. That same day, July 10, 2015, Russia Today published a report which stated that JADE HELM 15 will feature “deportations to FEMA “internment camps”. Two days later on July 12, 2015, the New York Times published a report which stated that “Political opponents of President Obama will be rounded up and herded into detention centers”. Also on July 12, 2015, Yahoo News published a report which quoted a Bastrop, Texas resident Josh Munyon who stated that “They already have FEMA trains that […] look like the trains that the Nazis used in World War II”. A day later on July 13, 2015, the Guardian published a report which stated that JADE HELM 15 is a prelude to “locking innocent Americans in internment camps”. A day later on July 14, 2015, Russia Today published a report which stated that Texans may be “bundled into concentration camps”. Needless to say, these reports, taken collectively, suggest that JADE HELM 15 is for the cover for the opening of Nazi-like FEMA concentration camps which will cull millions of Americans, namely in Texas.

FEMA Camp Propaganda
Based on breaking news and events, it now appears that the Obama administration (at the behest of the CIA in Switzerland) is preparing to open FEMA Camps in America, namely in Texas. This redux of Nazi-Germany will likely transpire in the aftermath of an ISIS invasion, under the guise of housing Islamic terrorists. In time, the FEMA camps will house and exterminate millions of people deemed by Obama to be a threat to the U.S. government. In order to psychologically prepare American and the world for the opening of FEMA Camps, a number of propaganda reports in respect to “World War II-style camps”, “prison camps”, “interrogation facilities”, and “detention” centers and facilities have been published. For example, on July 21, 2015, ex-NATO Commander and former U.S. General Wesley Clark suggests that World War II-style camps should be opened for radicalized Americans. This shocking statement was echoed by a report from July 21, 2015, entitled “FEMA Identifying Potential ‘Extremists’”. Three days later on July 24, 2015, CNN published a report entitled “America’s Shameful ‘Prison Camps’”, further programming the world for FEMA Camps in America. Roughly 2-weeks later on August 5, 2015, it was reported that Chicago police have detained thousands of black Americans at an interrogation facility, further confirming that FEMA-like camps exist. That same day, August 5, 2015, it was reported that Israel has placed a Jewish extremist in administrative detention where he will be denied due process. Lastly, on August 7, 2015, Fox News published a report entitled “Justice Department Asks Judge Not to Release Families in Immigration Detention Centers”, further foreshadowing the notion that once a person has been detained in a FEMA Camp they will not be released. Needless to say, these reports, taken collectively, conform that FEMA Camps will be opened in the United States in order to cull millions of people.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China pearl harbor

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
November 15, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese attack and/or invasion, most likely targeting the United States or her military, most likely in San Diego, Hawaii and/or the South China Sea.

The impending Chinese attack will likely involve one or more of the following: a) a cyber-related attack on the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Australia Hawaii, Japan, Taiwan, the Philippines and/or mainland United States.

Consequently, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 17 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan
12. South China Sea (Disputed Islands)

South China Sea Attack
Based on breaking news and events, it appears that the CIA is plotting a Chinese attack on the U.S Navy which has ships trolling the disputed islands within the South China Sea. This latest Chinese attack narrative was first identified back on October 15, 2015, when the Guardian published a report entitled “Chinese Media: Military Must be Ready to Counter US in South China Sea”, foreshadowing that a confrontation may be imminent. Nine days later on October 24, 2015, Yahoo News published a report entitled “U.S. Patrols to Raise Stakes with Beijing in Disputed South China Sea”, further raising the specter of a naval confrontation with China. Three days later on October 27, 2015, Reuters published a report entitled “Angry China Shadows U.S. Warship Near Man-Made Islands”, foreshadowing a Chinese attack on the USS Lassen destroyer. Lastly, in what appear to be the final warning by China just prior to a surprise revenge-like attack, it was reported on October 27, 2015, that China has officially warned the United States after the USS Lassen passes near the disputed islands. Needless to say, these reports, taken collectively, suggest that a confrontation between the U.S. and China in the South China Sea is imminent.

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Veterans Day

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
November 11, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the Obama administration (at the behest of CIA Headquarters beneath Lake Geneva) will execute a wave of terror attacks on Veterans Day, Wednesday, November 11, 2015.

Exactly what type of terror is planned for Veterans Day is not known, but a beheadings, bombings, mass shootings, mass stabbings and/or suicide bomber attacks are most likely terror scenarios. Said attacks will predictably be scapegoated onto domestic and/or Islamic terrorists.

Exactly where Veterans Day terror will commence is also not known, but Veteran-related ceremonies, homecomings, parades and parties are the most likely to suffer an attack. That being said, Applebee’s Restaurants, U.S. military bases and war memorials could also be targeted.

One potential location for a Veterans Day attack is the USS Midway Veteran’s Day Festival in San Diego, California which is holding a blood drive, a parade and a Salute to Service festival. An exhibition by the U.S. Navy Dive Team and vintage war plane fly over are also planned.

A future terror scenario in which one or more U.S. military veterans crash their plane into a San Diego apartment building, skyscraper and/or or the USS Midway may now be in order. Needless to say, the attack would invoke both the 9/11 Attacks and the Japanese attack on Pearl Harbor.

Top Veterans Day Terror Targets:

1. Veterans Day Events (e.g., ceremonies, parades, parties, etc.)
2. U.S. Military Bases (domestic and worldwide)
3. Veteran Homecomings (international airports, military bases, etc.)
4. Applebee’s Restaurants (2,003 U.S. locations)
5. U.S. War Memorials (e.g., Vietnam Memorial: WWII War Memorial, etc.)

Airport Attack
Since U.S. military veterans will be traveling through airports unarmed on November 11, 2015, they will be easy targets for state-sponsored terrorists. Back on November 9, 2014, it was reported that a U.S. Army vet was killed after a party celebrating his return from Afghanistan. Consequently, a redux attack may now be in order.

Applebee’s Attack
If and when Veterans Day terror attacks occur, a majority of the U.S. military will likely watch it happen on “live TV”. This is because all veterans and active duty U.S. service men and women have been invited by Applebee’s for a free meal on Veterans Day in order to honor their service to America. Whether or not veterans themselves will be targeted while eating at Applebee’s is not known, but the notion that Applebee’s could be attacked is not that farfetched. Following Applebee’s lead, Chili’s, On the Border, TGIF, Red Robin and a host of other restaurants have also offered veterans a free meal. Therefore, millions of veterans will be literally sitting sucks on November 11, 2015.

Parade Attack
Back on November 15, 2012, the Veterans Day parade massacre took place in Texas, killing 4 and injuring 11 veterans. Although there is debate as to who was at fault, the fact that a train was traveling at a high rate of speed through a parade route was no accident. In all likelihood, the event was staged in order to set the precedent for Veterans Day-related terror.

US Military Bases

U.S. Military Base Attack
Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is plotting a wave of domestic and/or Islamic terror on the U.S. military come Veterans Day, Wednesday, November 11, 2015. Exactly what type of Veterans Day terror is planned for the U.S. military is not known, but attacks on National Guard armories, U.S. military personal, U.S. military base housing, U.S. military recruitment centers and/or U.S. military bases are the most likely. Back on July 16, 2015, 4 Marines were executed at a U.S. military base in Tennessee. The incident occurred in the aftermath of a foiled terror plot as depicted in the July 16, 2015, Truther.org report entitled “Attack on US Marines in Chattanooga, TN Result of Foiled Obama Terror Plot, Not ISIS”. In order to highlight the long list of attacks on U.S. military bases (see list below) just prior to another attack transpiring in reality, Fox News published a report on July 16, 2015, entitled “A Look at Attacks in Recent Years on Military Bases in the US”. In what appears to be pre-U.S. military housing/personal terror attack programming, it was reported back on August 12, 2015, that an arrest had been made in the alleged attack on the first gay couple ever married at West Point. That same day, August 12, 2015, Fox News published a report entitled “Army: Hundreds of Feral Horses Impede Training at Fort Polk, Leave Manure on Base”, foreshadowing a future U.S. military base attack/invasion by either domestic and/or ISIS-inspired terrorists. A few weeks later on August 26, 2015, it was reported that a 4th Fort Hood soldier has been found guilty of using a military ID to smuggle immigrants. The incident was likely staged or fabricated in order to show that military IDs could be used by ISIS immigrants to gain access to U.S. military bases. A day later on August 27, 2015, Fox News published a report entitled “Family of Marines Taking the Fight to ISIS” which was evidently designed to associate U.S. military families with ISIS juts prior to an ISIS-inspired attack on U.S. military families that reside in U.S. military base housing. The impending attack on the U.S. military may come courtesy of Malaysian Airlines Flight MH370 which was specifically hijacked by CIA on March 8, 2014, in order to execute a surprise WMD attack and/or a full-scale terrorist invasion, possibly of a military base such as Diego Garcia. In what appears to be pre-Diego Garcia terror attack programming, the BBC published a report back on August 11, 2015, entitled “Diego Garcia: Maldives Tourists ‘Were Sailing to US Base’”, foreshadowing the notion that terrorists may travel to the base in the near future, possibly via Flight MH370. Lastly, the notion of a terror attack on a military base was witnessed on September 18, 2015, when a Taliban attack on a Pakistani Air Force Base’s mosque resulted in the deaths of 29 people. Needless to say, the attack has set the precedent for a far deadlier terrorist attack on a U.S. military base.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

NFL Terror Warning

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
November 9, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the Obama administration (the behest of CIA Headquarters beneath Lake Geneva) will stage a terror attack during Week 9 of the 2015 NFL season, namely on Monday, November 9, 2015.

Come Monday night, the Chicago Bears vs. San Diego Chargers game in San Diego, California may suffer a 9/11-style bio-terror attack, Chinese invasion, North Korean WMD missile strike, mass shooting and/or race war attack.

Attacking the NFL has been the primary focus of the Obama administration and the CIA in Switzerland who have been caught red-handed on multiple occasions (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, etc.) trying to execute WMD-related terror attacks against America’s most popular sports league.

A 9/11-style attack on the NFL may come courtesy of Malaysian Airlines Flight MH370 which was explicitly hijacked by CIA on March 8, 2014, in order to execute a surprise WMD attack on America. Consequently, a nuclear and/or bio-chemical 9/11-style attack may now be in order for the NFL.

Because numerous NFL stadiums are located just off the Atlantic Ocean and the Gulf of Mexico, Flight MH 370 could theoretically fly in off the water from an undisclosed location (e.g., Cuba) at full speed, attacking the game prior to a retaliatory military response from NORAD or the U.S. Air Force.

The CIA could also stage a so-called “accident” or “natural disaster” during the 2015 NFL season (e.g., fire, gas explosion, melee, stampede, stage collapse, vehicular manslaughter attack, etc.) which would also kill and terrorize scores of NFL players and fans.

TOP NFL TERROR SCENARIOS:

1. 9/11-Style Attack
2. ISIS Attack/Invasion via Flight MH370
3. Race War Massacre
4. Bio-Terror Attack
5. Nuclear Terror Attack
6. Gang-Related Massacre
7. NFL Cheerleader Attack
8. NFL Locker Room Attack
9. ISIS Invasion of NFL City and/or Stadium
10. Mumbai-Like Attack of NFL City

In what appears to be a Roman-like blood sacrifice to a successful NFL terror attack in 2015, it was reported back on July 20, 2015, that a former NFL player’s mistress abducted and killed his wife before killing self. Persons associated with a given terror target (e.g., the NFL) are often sacrificed just prior to an attack on said target.

Three days later on July 23, 2015, traitorous Infowars published a report entitled “MI5, British Defense Sources Say ISIS Will Bomb Football Games with Drones”, potentially foreshadowing a 9/11-style terror attack on an NFL football game.

In what appears to be pre-NFL terror attack programming, it was reported on July 25, 2015, that Arizona Cardinals rookie Damond Powell was shot in the face in his Ohio home. The attack was likely executed at the behest of the CIA in order to set the precedent for an NFL-related terror attack.

The notion of NFL football players coming under attack was also witnessed back on March 8, 2015, when former Jets running back Chris Johnson’s posse was shot in Florida, resulting in one death. Again, the attack was likely executed at the behest of the CIA in order to set the precedent for an NFL-related terror attack.

The notion of an NFL-related event being stormed by terrorists was foreshadowed back on July 30, 2015, when rabid Patriots fans stormed the gates of their NFL training camp. The incident was likely staged in order to set the precedent for a domestic or jihad-related invasion of an NFL game in 2015.

In what appears to be pre-NFL locker room terror attack programming, it was reported back on October 5, 2015, that three women were temporarily barred from entering the Jaguars locker room after the Colts game. Needless to say, the incident was staged in order to highlight NFL locker rooms just prior to an attack.

Lastly, in what appears to be another Roman-like blood sacrifice offered up to a successful NFL-related attack in 2015, it was reported on August 4, 2015, that Green Bay Packers player Andrew Quarless’ newborn daughter died at birth. Persons associated with a given terror target (e.g., the NFL) are often sacrificed just prior to an attack on said target.

WEEK 9: NFL GAMES UNDER THREAT (NOV 5-9, 2015):

1. Cleveland @ Cincinnati
2. Green Bay @ Carolina
3. Washington @ New England
4. Tennessee @ New Orleans
5. Miami @ Buffalo
6. St. Louis @ Minnesota
7. Jacksonville @ New York
8. Oakland @ Pittsburgh
9. New York @ Tampa Bay
10. Atlanta @ San Francisco
11. Denver @ Indianapolis
12. Philadelphia @ Dallas
13. Chicago @ San Diego

[NFL games highlighted are most likely to suffer attack]

North Korea MIssile launch

North Korean Bio-Missile Attack
As depicted in the July 26, 2015, Truther.org report entitled “Swiss CIA Plotting North Korean-Based Nuclear, Bio-Chemical or EMP-Related Missile Strike on America”, a North Korean missile strike on China may be imminent. Because China is located next to North Korean, a missile strike emanating from North Korea or a North Korean submarine is a plausible narrative. According to reports, North Korea has an “active” and “secretive” bioweapons program which has been allegedly testing bioweapons on children. Also, North Korea attempted to launch a biochemical attack against South Korea prior to the G20 Summit in Seoul, and has the ability to produce upwards of 1.25 million chemical bombs. They also have approximately 200,000 troops, which are reportedly ready to carry out military operations, including the dispersal of anthrax spores with specialized equipment. North Korea was also “caught” shipping approximately 14,000 anti-chemical weapons suits along with reagents used to identify chemical substances that become airborne after a chemical weapons attack. In the event that North Korea executes a bio-terror attack on China, it will most likely come from a missile laden with anthrax (Bacillus anthracis) and/or smallpox (Variola major).

NFL is FBI
Further confirming that the National Football League (NFL) is just a corporation (co-operation) of the U.S. government and that state-sponsored terror attacks are indeed imminent, it was revealed in a September 13, 2014, report by the Washington Post, that the NFL, America’s most popular sports league, is “set up just like the FBI” whose “code [is] mostly one of silence”. According to the report, the NFL has “an intricate and largely secretive three-layered security force — mainly comprised of former federal agents — in charge of staying in front of the league’s problems” whose tentacles even reach into states without an NFL team. Jeffrey Miller, the NFL’s chief security officer, was once Pennsylvania’s state police commissioner while his lead investigator, John Raucci, is a former assistant director of the FBI, where he was the bureau’s top agent in London and helped coordinate the 2012 Olympics. Also, the NFL just appointed former FBI director Robert S. Mueller III, who led the Bureau for 12 years, to oversee an independent investigation. The NFL’s three previous security directors — Jack Danahy, Warren Welsh and Milt Ahlerich — were also all former FBI executives. “It’s set up just like the FBI” said another former NFL team official. “Think of the 32 teams as field offices.” Since federal operatives are not only employed by the NFL but are attending NFL games “undercover”, the propensity for a NFL-related terror attack has never been greater.

NFL Logo

New NFL Logo
Although the NFL states that their new 4 and 4 star logo is representative of the four divisions within the NFC and AFC conferences, the NFL is currently looking to expand internationally with prospective franchises in Canada, Mexico and even Europe. Therefore, the new NFL logo will only be valid for a few years at best, leading to suspicions that the 4 and 4 star logo is representative of the 44th President of the United States—Barrack Hussein Obama. Since the aforementioned nuclear terror attacks were slated to take place on Obama’s watch, the NFL was evidently kind enough to change their logo to represent him prior to these would-be Earth changing events.

NFL Security Compromised
Starting on June 13, 2013, the NFL implemented new security measures by banning purses, seat cushions, and coolers from games. The change in security was a calculated decision by the NFL to gain plausible deniability in the aftermath of a terror attack at one of their stadiums. Aside from the legal changes, the NFL launched a media campaign entitled, “Be Clear On Game Day Safety”, which has highlighted the notion that the NFL could be attacked. Interestingly, on September 12, 2013, it was reported that undercover officers will now be at NFL games aim to “prevent excessive heckling”. In the event that terror strikes the NFL, these so called undercover agents will most likely be responsible for participating in the attacks in some manner.

ISIS NFL

NFL Exempt from Terror Lawsuits
Congressional legislation passed in December of 2008 conveniently dismisses any potential lawsuits against the NFL stemming from a future terror attack on any of the NFL’s football stadiums. The new law, entitled the SAFETY Act (Support Anti-terrorism by Fostering Effective Technologies), which was curiously not reported until September of 2009, essentially guarantees that the NFL will not have to pay any claims that terror victims may file in the aftermath of an attack. According to the report, the “protection extends only to companies’ services or equipment that the Homeland Security Department has approved as being effective in anti-terrorism.” The NFL got the protection after the government approved the league’s nine-page stadium-security guidelines. “An attack from a terrorist organization could put us out of business”, stated NFLsecurity chief Milt Ahlerich.

NFL DHS Homeland

NFL-DHS Partnership
The NFL was intimately connected to the foiled Super Bowl XLV nuclear terror plot, so it should come as no surprise that the NFL and DHS have partnered together in the “If You See Something, Say Something” terror program. The NFL and DHS terror partnership was forged just two days prior to Super Bowl XLV, when U.S. Department of Homeland Security Secretary Janet Napolitano stated that: “We are partnering this year with the NFL on our ‘If You See Something, Say Something’ campaign and launching that NFL partnership right here at the Super Bowl…The idea is simple…We are simply asking the American people to be vigilant, recognizing that our security is a shared responsibility that all of us must participate in. If a fan at the Super Bowl or any other American at any other place sees something that is potentially dangerous, then say something about it to local law enforcement or someone in authority”.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

China pearl harbor

Download & Forward PDF

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
November 8, 2015
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese attack and/or invasion, most likely targeting the United States or her military, most likely in San Diego, Hawaii and/or the South China Sea.

The impending Chinese attack will likely involve one or more of the following: a) a cyber-related attack on the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Australia Hawaii, Japan, Taiwan, the Philippines and/or mainland United States.

Consequently, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 17 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan
12. South China Sea (Disputed Islands)

South China Sea Attack
Based on breaking news and events, it appears that the CIA is plotting a Chinese attack on the U.S Navy which has ships trolling the disputed islands within the South China Sea. This latest Chinese attack narrative was first identified back on October 15, 2015, when the Guardian published a report entitled “Chinese Media: Military Must be Ready to Counter US in South China Sea”, foreshadowing that a confrontation may be imminent. Nine days later on October 24, 2015, Yahoo News published a report entitled “U.S. Patrols to Raise Stakes with Beijing in Disputed South China Sea”, further raising the specter of a naval confrontation with China. Three days later on October 27, 2015, Reuters published a report entitled “Angry China Shadows U.S. Warship Near Man-Made Islands”, foreshadowing a Chinese attack on the USS Lassen destroyer. Lastly, in what appear to be the final warning by China just prior to a surprise revenge-like attack, it was reported on October 27, 2015, that China has officially warned the United States after the USS Lassen passes near the disputed islands. Needless to say, these reports, taken collectively, suggest that a confrontation between the U.S. and China in the South China Sea is imminent.

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Legoland

TRUTHER.ORG — “Peace by Revelation”

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
November 8, 2015
Truther.org

SWITZERLAND, Zurich — Unable to execute a Disney-related attack or a SeaWorld-related attack, it now appears that the Obama administration (at the behest of CIA Headquarters beneath Lake Geneva) will stage a domestic and/or jihad-related terror attack on Legoland.

Exactly what type of terror is planned for Legoland is not known, but a 9/11-style bio-terror attack, hostage crisis, mass shooting, mass stabbing and/or siege are the most likely terror scenarios. That being said, beheadings and a vehicular manslaughter attack are also realistic possibilities.

Although any Legoland could theoretically suffer a state-sponsored terror attack, the Legoland California Resort located just outside of San Diego, California is the most likely to suffer an attack due to its location and popularity.

In order to foreshadow the notion that a terror ring will stage an attack on the Legoland California Resort, the New York Daily News published a report on June 15, 2015, entitled “San Diego Cops Bust Up Lego Theft Ring that Nets $100,000 in Toys”.

Roughly 10-weeks later on August 28, 2015, it was reported that cocaine was sent through the U.S. mail in a Lego box. Needless to say, the incident was fabricated or staged in order to associate criminal drug dealers with the Lego brand just prior to an attack on Legoland.

In what appears to be a CIA-spawned publicity stunt designed to highlight Legoland on an international level just prior to a horrific attack, it was reported on September 25, 2015, that a woman was embarrassed and humiliated after being denied entrance to Legoland because she was without a child.

In order to foreshadow the notion of violence at Legoland just prior to a false-flag attack, it was reported on August 13, 2015, that two men arrested after ‘vicious’ fight at Legoland in Windsor. Needless to say, the fight was likely fabricated or staged in order to set the precedence for a Legoland-related attack.

In order to associate the Lego brand (and thereby Legoland) with criminality just prior to a security breach and subsequent terror attack at Legoland, it was reported on October 4, 2015, that a women is wanted by police for stealing Legos from toy store.

Lastly, on October 28, 2015, PR Week published a report entitled “Ai Weiwei is Taking Down Lego’s Reputation Brick by Brick”, foreshadowing the notion that Lego’s reputation will be shattered post-terror attack.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss