BREAKING NEWS UPDATE: On July 2, 2013, it was reported that China will hold their “largest-ever naval drills” beginning on July 5 through July 12, 2013. Although it has yet to be confirmed, it appears that the sudden inclusion of Russia in the drills is an intelligence PSYOP meant to muddy the waters in respect to the now exposed plot by China to attack the United States around the 4th of July. The article was clear to point out that China and Russia will also participate in another drill on July 27 through August 15, 2013, providing even more cover for the now foiled Chinese attack plot.
SWITZERLAND, Zürich — As nuclear terror whistleblower David Chase Taylor’s case against the Obama administration for premeditated nuclear terrorism works its way up the court system of Switzerland, a new nuclear terror plot to hijack TV stations worldwide a detonate a nuclear bomb on “Live TV” has been identified.
Due in part to the escalating exposure of Taylor’s case as well as the unprecedented awakening of humanity worldwide, the rabid Zionist establishment, who was caught red-handed attempting to conduct a nuclear holocaust at Super Bowl XLV in Dallas, Texas, on February 6th, 2011, are apparently pulling out all the stops and going for broke in a desperate move to distract the world from their wicked acts of terrorism and usury.
Based on breaking news and events depicted herein, it now appears that the Zionists have authorized the Chinese government to execute a controlled “surprise” attack against the United States and Japan starting in July of 2013. This unprovoked attack will likely kick-off with a series of escalating Chinese terror attacks against western U.S. cities (i.e., Seattle, Washington, Portland, Oregon, and San Francisco, California) followed by a full-scale invasion of key U.S. military bases in the Pacific theater (i.e., Okinawa, Japan, Iwo Jima, Japan, and Pearl Harbor, Hawaii).
Once America and the world are collectively glued to their respective television sets, TV channels worldwide will be simultaneously held hostage in an unprecedented act of cyber-hijacking as the Chinese attack culminates with “Live TV” nuclear detonation in an American city with a recognizable skyline (i.e., Seattle—Space Needle, San Francisco—Golden Gate Bridge or St. Louis, Missouri—Gateway Arch).
Depending on how the world reacts to the first ever “Live” nuclear attack, a second nuclear detonation will likely target another city in the United States or Europe, quite possibly Paris, France. In order for a nuclear attack to be the most psychologically terrorizing, a well-known landmark (e.g., the Twin Towers on 9/11) must be destroyed in the attack to serve as a life-long reminder of that horrific day.
The Chinese surprise-attack depicted herein is slated to be eerily reminiscent of the December 7, 1941, Japanese attack on Pearl Harbor, and will undoubtedly spark a nuclear war between the United States and China which recent Truther.org reports such as, “Chinese “Kamikaze” Done Attack On Pearl Harbor Hawaii Imminent” and “Red Dawn Scenario: Chinese Attack On America Imminent” have attempted to thwart.
Make no mistake about it—China is fully under Zionist control and do ONLY do as they are told. Remember, American factories and military technology did not just “accidentally” make its way to China; the transfer of power from the U.S. to China has been a long standing program headed by the likes of Henry Kissinger. By starting World War III, the U.S. government can reinstated the military draft, open FEMA concentration camps nationwide, invoke martial law and initiate the global bio-terror pandemic planned for 2013. Ultimately, it’s a win, win, win, for the Zionists for they get to kill off their political opposition (U.S. military, patriots, gun owners, conservatives, etc.), get rich off war contracts, and their crimes against humanity will once again be hidden in the wake of terrifying nuclear attacks.
July 4th Attack
Although a Chinese attack on America could come at any time, a “Live TV” cyber-hijack and nuclear detonation will most likely occur on July 4th, 2013, America’s 237th birthday. Prior to a high-profile nuclear detonation on the 4th of July, the American public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. On March 22nd, 2013, a propaganda film entitled “Olympus Has Fallen” (2013) was released (see trailer) in which Washington D.C., America’s capital, was brutally attacked by an ex-North Korean terrorist on the day after the 4th of July. The movie was clear to depict classic Independence Day symbology such as red, white and blue banners, balloons and ribbons. Coincidentally, on May 2nd, 2013, it was reported that the alleged Boston Bombers had initially planned a July 4th attack, giving further credence to the notion that this date has been chosen for terror by the intelligence community. A couple months later on June 28th, 2013, ABC News ran a headline which stated “Feds Worry About July 4 Fireworks Bombs”, the key words being “July 4” and “Bombs”. According to the report, the FBI has vocalized paramount concern for July 4th, 2013, because masses of revelers are expected to pack city centers and other locations which could be an “an opportunity to perpetuate a mass casualty attack”. Coincidentally, Zionist operative Adam Kokesh, who allegedly works for Obama’s “Revolution Czar”, will be holding an armed protest in Washington D.C. on July 4th, 2013. Should a nuke be detonated on “Live TV”, a bloody riot in America’s capital will likely ensue and spread like a pandemic throughout the United States.
As witnessed prior to the 9/11 Attacks, 2011 Super Bowl Nuke Plot (4:12 in video) and the recent Boston Bombings, Hollywood foreshadowing aka predictive programming has become standard operating procedure; the “Live TV” cyber-hijack and nuclear attack is no different. On November 25th, 2012, the hit terror series entitled “Homeland”, aired an episode entitled “Two Hats” (S2E21), which just happened to feature a storyline in which terrorist leader “Abu Nazir” was plotting a terror attack on the U.S. and planned to film the terror attack on “Live TV” and broadcast it globally. Roughly 7 months later on June 27th, 2013, the hit television show starring Charlie Sheen entitled “Anger Management“, aired an episode entitled “Charlie And The Hot Nerd” (S2E36), in which Charlie’s TV is hijacked by his girlfriend’s x-boyfriend who was an alleged “hacker for the CIA. In short, the x-boyfriend hacks Charlie’s computer, appliances and television and is shown talking to Charlie from inside Charlie’s own TV, eerily similar to the photo depicted right. Watch Anger Management episode here.
Asian/Pacific Surprise “Attack” Propaganda
Prior to a high-profile Asian based Pacific coast attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., America’s capital, is ambushed in a surprise attack by an ex-North Korean terrorist with military aircraft, suicide bombers and cyber-warfare. On July 12th, 2013, the film “Pacific Rim” (2013) (see trailer) will be released which features a story line in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to trailer, their first three attacks target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico. If and when this Hollywood terror programming will manifest in reality is unknown, but it is definitely in the cards.
“Live TV” Nuclear Detonation
Due to the 30-60 second nature of a nuclear explosion, venues such as the NFL Super Bowl, FIFA World Cup, NBA Finals, MLB World Series and the Olympic Games are optimal targets for nuclear terror mainly due to the potentially hundreds of millions watching on “Live TV”. However, since the nuclear attack on Super Bowl XLV was ultimately foiled, a new plot to terrorize humanity with “Live TV” nuclear attack had to be orchestrated. For those who think a Chinese nuclear attack on the U.S. is laughable, consider this: On September 30th, 2012, it was reported that the White House was attacked by hackers allegedly linked to China’s government. The unprecedented cyber-terror attack targeted the U.S. government’s most sensitive computer networks, ultimately breaching a system used by the White House Military Office for nuclear commands. Interestingly, only 9 months later on June 27th, 2013, the U.S. and Japan held war games off the coast of California imitating a Chinese Invasion.
Cyber-Related Nuclear Terror
Prior to a high-profile “Live TV” cyber-hijack and subsequent nuclear detonation, the public must be psychologically prepared to accept that this is in fact possible. Zionist media and Hollywood movie propaganda is a slick way of showing that yes, it can happen. Based purely on research conducted to date, the marriage between cyber-terror and nuclear terror was first made on February 19th, 2013, when a CNN headline entitled “Former CIA Official: Cyber War ‘More Sinister Than Nuclear Age’” first paired the terms “cyber” and “nuclear” together in the same sentence. Roughly a month later on March 22nd, 2013, the propaganda film entitled “Olympus Has Fallen” (2013) was released (see trailer) in which Washington D.C., America’s capital is attacked by an ex-North Korean terrorist who wants to hack the White House computer network and detonate American nuclear warheads while in their respective missile silos. Exactly a month later on April 22nd, 2013, the Wall Street Journal ran a headline entitled “China: Cyberattacks Are Like Nuclear Bombs”, ultimately linking the words “China”, Cyberattacks” and “Nuclear Bombs” in the same sentence. Roughly two months later on June 28th, 2013, another propaganda film entitled “White House Down” (2013), was released (see trailer) in which Washington D.C., America’s capital, was attacked by hackers attempting to breach the U.S. Department of Defense’s computers to access the “Nuclear Football”, the briefcase used by the President of the United States to initiate nuclear war.
Emergency “Nuclear Terror” Meetings
Just 6 days prior to the planned nuclear attack at Super Bowl XLV, then U.S. Secretary of State Hillary Clinton called an historic first of its kind ambassadors meeting in Washington D.C., which lasted from January 31, 2011, until February 4, 2011. The meeting was so important to matters of state that ambassadors from all 260 U.S. embassies and consulates in more than 180 countries were ordered present. Fast forward roughly 27 months to May 24th, 2013, when 85 nations and four official observers met for the Global Initiative to Combat Nuclear Terrorism (GICNT) in Mexico City, Mexico, to discuss “nuclear terrorism”. Exactly a month later on June 24th, 2013, it was reported that the International Atomic Energy Agency (IAEA) is scheduled to hold an emergency meeting on July 1st through July 5th, 2013, in Vienna, Austria, with members from 112 countries and 20 organizations to again discuss “nuclear terrorism”. Aside from giving government officials plausible deniability in the aftermath of a nuclear attack, these nuclear “prep” meetings are used by the Zionist establishment to instruct their minions on the policies and procedures they will need to adhere to as the world officially enters the terrifying age of nuclear terrorism.
Despite the growing evidence that nuclear bombs are not exactly what they are cracked up to be, U.S. President Barack “O-bomb-a”, real name Barry Soetoro, is the anointed nuclear president. Therefore, until Obama is ousted from public office, the world will be under the threat of state-sponsored nuclear terrorism. As with any legal matter, a full, independent and open investigation must be conducted prior to filing any legal charges. However, after reviewing the documented evidence in respect to the following nuclear terror cases, it is abundantly clear that the Obama administration is in fact guilty of premeditated nuclear terrorism.
Foiled Obama Nuclear Terror Plots:
1. February 6, 2011: Super Bowl XLV Nuclear Terror Plot (Dallas, Texas)
2. December 31, 2011: New Year’s Eve Times Square Dirty Bomb Plot (New York City, New York)
3. April 18, 2013: U.N. Dirty Bomb And U.S. Nuclear Reactor Attack Plot (New York City & Pennsylvania)
4. July ? 2013: “Live TV” Cyber-Hijack And Nuke Attack Plot (Unknown)
A “Live TV”cyber-hijack may be the moment when the world finds out that the government funded cyber-hacking terror group known as “Anonymous” is in fact the cover for a Chinese military hacking operation. After all, Guy Fawkes masks which are worn by members of Anonymous do appear to have unmistakably Asian features. Other potential nuclear terror scapegoats include Al Qaeda, Pakistan, Chechen terrorists or rough Chinese terrorists who allegedly plotted to bomb the 2008 Beijing Olympics. However, based on the evidence depicted herein, it is most likely a “Live TV” cyber-hijack and subsequent nuclear detonation will be blamed directly on the Chinese government so that World War III between the United States and China can commence.
NASA’s Nuclear Photos
In order to get the most “bang for their buck”, no pun intended, a nuclear detonation must be photographed and videotaped from all different angles in order to be more vividly terrorizing. As seen just prior to the foiled Super Bowl XLV nuclear terror plot on February 6th, 2011, NASA’s “Discovery” shuttle took off on its last mission on February 3rd, 2011, to “document the event”. Just like in 2011, this upcoming “Live TV” cyber-hijack and subsequent nuclear detonation will also be photographed and videotaped from space as NASA just launched a satellite entitled “Interface Imaging Spectrograph” (IRIS) on June 27th, 2013, to study how material heats up and gathers energy as it travels through space. IRIS will also study this energy’s impact on our planet’s climate. In other words, in the after-math of a nuclear attack, the energy released from the nuclear weapons will be used as justification for “Global Warming” legislation and the new taxes that it will bring, irregardless of the cloud-seeding, chemtrails, geo-engineering which is openly admitted and executed on a daily basis.
Singapore Smog Beta-Test?
The horrific smog currently engulfing Singapore and Indonesia is apparently a beta-test for the upcoming nuclear detonation and its subsequent fallout. A major beta-test is needed to see how people respond to a massive change in their environment. Although unprecedented smog is being blamed on “fires”, there doesn’t appear to be any ash falling. Therefore, the deadly smog is most likely the result of heavy-duty chemtrails delivered by aerial drones. After a nuclear detonation in Seattle, for example, expect to see Singapore-type smog all over the Pacific west coast due to “nuclear fallout”.
As witnessed just prior to the Super Bowl XLV nuclear terror plot on February 6th, 2011, both alleged STRATFOR intelligence operative Alex Jones and Texas Governor Rick Perry were caught acting quite suspicious in preparation for the “big event” and the bloody revolution that was slated to follow. Jones was routinely beta-testing his listeners and “oiling his guns” in the days prior, Perry actually left Texas for California despite it hosting its first ever Super Bowl. As the world embarks on a new nuclear 9/11, both Jones and Perry are again preparing for the “big event” in their own way. On the June 28th, 2013, episode of the Alex Jones Show, Jones was overshadowed on the air by group of men talking in the background which was clearly heard on-air. Jones quipped, “We are just doing some “training” in there”. What exactly Jones is training for is unknown, but Perry, who is also located in Austin, Texas, is holding a “Special Session” of the Texas Legislature which will begin at 2 p.m. Monday, July 1st, 2013. Perry stated that, “I am calling the Legislature back into session because too much important work remains undone for the people of Texas.”
UPDATE: In the wake of this Truther.org terror warning, the opening day of the “hotly anticipated” special legislative session lasted only 30 minutes as the Texas Senate inexplicably voted to recess until July 9th, 2013. Curiously, Alex Jones was also a no-show on his radio program of July 1st, 2013.
Recent Nuclear Terror Headlines:
1. November 29, 2012: Nuclear Christmas, False Flag In America To Blame On Iran (Press TV)
2. January 22, 2013: Indian Police Warn Kashmir Residents Of Possible Nuclear Attack (Fox News)
3. February 19, 2013: Fmr. CIA Official: Cyber War ‘More Sinister Than Nuclear Age’ (CNN)
4. February 25, 2013: Radiation Panic Grips Mumbai (WSJ)
5. March 15, 2013: Dirty Bomb Material Secured In Philadelphia (Fox News)
6. March 15, 2013: Feds Swarm Metro Train After Detecting Nuclear Risk (CBS News)
7. April 9, 2013: Russia Conducts Topol Nuclear ICBM Drills (RIAN)
8. April 13, 2013: DOE Finalizing Plans To Dump Uranium Out West (Fox News
9. April 16, 2013:Era Of Atomic Bombs Over: President Ahmadinejad (Press TV)
10. April 17, 2013: Zionists Warm Up To Wage Nuclear Wars Across Mideast (Press TV)
11. April 18, 2013: After Petition, Atomic Bomb Re-Enactment Dropped From Ohio Air Show (Fox News)
12. April 18, 2013: ‘Like A Nuclear Bomb’: Deadly Fertilizer Plant Blast Devastates Texas Town (CNN)
13. April 22, 2013: China: Cyberattacks Are Like Nuclear Bombs (WSJ)
14. June 3, 2013: China, India, Pakistan Boost Nuclear Arsenals (France 24)
15. June 24, 2013. World Worried About Nuclear Terrorism, But Little Action At Talks (Reuters)
16. June 25, 2013: From Benghazi To Nuclear Terrorism (WND)
17. June 29, 2013: Survivors Of World War II Atomic Bombings To Be Tested (Fox News)
[Does not purport to be a complete list of headlines]
1. MEDIA CYBER-HIJACKS:
1.1: Media Hacks Trending
Prior to a major “Live TV” cyber-hijack and subsequent nuke detonation, the public must be psychologically programed that this is in fact possible. Starting in February of 2013, there have been at least 3 major instances whereby media and government affiliated network computers were hacked and their security breached. Taken collectively, these events show an unmistakable trend which indicates that a major media cyber-hijack “event” is imminent.
Media Hack Timeline:
1. February 12, 2013: Zombie Apocalypse Alert Hits Montana’s Emergency Warning System (Montana)
2. April 14, 2013: ‘Belarusian MTV’ Possibly Hijacked, Ran Porn Videos In Daytime (Minsk, Belarus)
3. June 14, 2013: CBS News Anchorwoman Sharyl Attkisson’s Computer Hacked (New York, New York)
[Does not purport to be a complete list of events]
1.2: TV Cut-Offs Trending
Prior to a numerous TV channels going offline or blank due to an alleged cyber-hijack, the public must be psychologically programed that this is in fact possible. Starting in May of 2013, there have been at least 3 major instances whereby TV stations and providers have cut certain TV broadcasts and channels or the TV station was shut down altogether. Taken collectively, these events show an unmistakable trend which indicates that a future TV shutdown/blackout due to a cyber-hijack “event” is imminent.
TV Cut Off Timeline:
1. May 19, 2013: Vietnam Cable TV Drops CNN, BBC Over Translation Decree (Hanoi, Vietnam)
2. May 27, 2013: Iran Pro-Reform Candidate Says State TV Cuts Off His Broadcast (Tehran, Iran)
3. June 14, 2013: EU Broadcast Chief: Turn Greek State TV Channel Back On (Geneva, Switzerland)
4. June 18, 2013: Greek TV Screens Still Blank As Political Dispute Continue (Athens, Greece)
[Does not purport to be a complete list of events]
1.3: Media Terror Trending
Prior to a major terror related attack on a media complex, television studio or TV channel, the public must first be psychologically programed that this is in fact possible. Starting in January of 2012, there has been an unprecedented wave of media related terror attacks, hoaxes and threats which have occurred at in and around various media related entities worldwide. Taken collectively, these events show an unmistakable trend which indicates that a major media related terror “event” is imminent.
Media Terror Timeline:
1. March 25, 1997:Radio Station Gets Bomb Threat (Miami, Florida)
2. July 12, 2004: Bomb Threat on TBC Radio station (London, England)
3. September 28, 2004: Man Makes Radio Station Bomb Threat (Dallas, Texas)
4. December 8, 2007: Radio Station Gets Bomb Threat (North Cotabato, Philippines)
5. May 30, 2011: Man Threatens To Bomb TV Station (New York, New York)
6. January 26, 2012: Radio Station Receives Bomb Threat (Jakarta, Indonesia)
7. September 22, 2012: Riot Outside MTV Event In Madrid (Madrid, Spain)
8. September 25, 2012: Radio Stations Evacuated Over Beeping Package (Los Angeles, California)
9. September 30, 2012: Shots Fired In Parking Lot Of BET Awards (Atlanta, Georgia)
10. October 8, 2012: FBI Investigating Suspicious Package At CBS TV Studio (Los Angeles, California)
11. October 17, 2012: NatGeo Bombarded With Terror Threats (Washington D.C.)
12. November 2, 2012: Chemical Bomb Threat At CNN Center (Atlanta, Georgia)
13. November 30, 2012: CBS Radio Building Hit By Gunfire (Dallas, Texas)
14. February 12, 2013: Radio Station Bomb Threat Reported (Melbourne, Australia)
15. March 29, 2013: Man Arrested For Threat To Blow Up TV Station (Niigata, Japan)
16. March 30, 2013: Eiffel Tower Radio Tower Receives Bomb Threat (Paris, France)
17. April 14, 2013: ‘Belarusian MTV’ Possibly Hijacked, Ran Porn Videos In Daytime (Minsk, Belarus)
18. May 4, 2013: CNN Anchor Robbed On Piedmont Avenue (Atlanta, Georgia)
19. May 19, 2013:Man Threatens To Blow Up Studio With Grenade In Live TV Interview (Canes, France)
20. May 27, 2013: Ten NASCAR Fans Injured By Fallen TV Cable (Charlotte, North Carolina)
21. May 27, 2013:TV Correspondent Killed On TV While Covering War Near Lebanon (Dabaa, Syria)
22. June 5, 2013: TV Crew Attacked While Reporting On Shooting Story (Providence, Rhode Island)
23. June 11, 2013:Employees Seize Greek State TV And Radio HQ (Athens, Greece)
24. June 14, 2013:CBS News Anchor Sharyl Attkisson’s Computer Hacked (New York, New York)
25. June 14, 2013: Grenade Hurled At Libyan TV Station In Benghazi (Benghazi., Libya)
26. June 17, 2013: Government Terror Exercise Broadcast Live On TV (Bangalore, India)
27. June 25, 2013: Honduran TV Journalist Kidnapped By Armed Men (San Pedro SulaHonduras)
28. June 29, 2013: Heli TV News Helicopter Crashes, 4 Killed (Bellinzona, Switzerland)
[Does not purport to be a complete list of events]
1.4: Live TV Beta-Tests
In order to properly gage and predict public response in the wake of an unprecedented action such as a “Live TV” hijack and subsequent nuclear detonation, various beta-tests must be conducted prior to the “event” occurring in reality. These beta-tests set the precedent for a copy-cat attack as well as allow the real terrorists to work out any unforeseen problems that may arise. To date, at least three “live TV” beta-tests have been identified:
I. Live TV & EAS Hijack
In what appears to be the first beta-test for a “Live TV” cyber-hijack to gage public reaction to the activation of the EAS, on February 12th, 2013, it was reported that a Montana TV network and the Emergency Alert System (EAS) had been hacked. The fake EAS warning was transmitted on KRTV during the Steve Wilkos Show in several Montana counties. According to the report, the TV station quickly pulled the alert off air and apologized both on air and online, but not before the following statement was read on-air: “The bodies of the dead are rising from their graves and attacking the living…Do not attempt to approach or apprehend these bodies as they are considered extremely dangerous…Follow the messages on screen that will be updated as information becomes available.”
II. TV Channel Hijack
In what appears to be the second beta-test for a “Live TV” cyber-hijack to gage social media reaction, on April 14th, 2013, it was reported that a Belarusian music TV channel had been hijacked and pornography had been broadcast. According to the report, on Saturday, April 13th, 2013, at about 3:45pm local time, “BelMuzTV”, which is reportedly seen in public places like shopping malls and restaurants, began airing explicit pornographic images featuring full nudity and sexual intercourse which lasted for approximately 10 to 20 minutes. Reportedly thousands of people throughout the Belarusian capital of Minsk watched the broadcast and began to share their experience on various social networking sites. A rumor then was circulated that a “subversive operation” was executed by the channel’s studio engineer, who entered the control room, loaded the inappropriate content into rotation and then disappeared. In the aftermath of a global “Live TV” cyber-hijack, social networking sites worldwide will be buzzing about having no TV. Eventually, the TV will come back on and billions of people worldwide will collectively witness the nuke attack on “Live TV”.
III. Live TV Terror Drill
In what appears to be the third beta-test for a “Live TV” cyber-hijack to gage public reaction to “Live” terrorism, on June 17th, 2013, it was reported that an state-sponsored terror drill was broadcast “Live TV” without the police, TV station or its viewers ever being informed that it was fake. According to the report, the televised terror drill caused “scaremongering across the city” when four “terrorists” began hovering around their target, the Taj Vivanta Hotel. The terrorists sparked off a major alert which then tipped off TV reporters and by 11.25pm, multiple TV channels had begun flashing images of four terrorists on the loose in the city.
1.5: Newsrooms Vulnerable to Cyber-Hijack
In an ominous warning sign that news related organizations may be hacked by cyber-terrorists in the near future, on April 23rd, 2013, it was reported that news organizations may have to revisit policies on retweeting breaking news and shore up the security of their social-media accounts due to the fallout from the hacking of the Associated Press’ Twitter account which stated that there had been an explosion at the White House. Stephen Ward, director of the Center for Journalism Ethics at the University of Wisconsin-Madison, stated that, “In light of this, news organizations have to certainly increase security procedures so that they can’t be hacked so easily…(If it was phishing that led to this)…then that is not proper security. They’ve got to review security procedures.” According to Dominic Lasorsa, a journalism professor at the University of Texas, “This is the kind of stuff the media has to deal with today,” he says. “It’s difficult to stay ahead of the hacking community. But our reputation is all we’ve got going for us. News media organizations need to be more savvy about the [security] problem.”
1.6: CBS News Hacked
In a case meant to set the precedent for cyber-hacks against TV stations, on June 14th, 2013, it was reported that CBS News correspondent Sharyl Attkisson’s computer, including her CBS News work computer, was hacked by “an unauthorized, external, unknown party on multiple occasions”, prompting CBS News to hire a firm to look into the hacking. According to the report, CBS News spokeswoman Sonya McNair said that a cyber-security firm hired by CBS News “has determined through forensic analysis” that “evidence suggests this party performed all access remotely using Attkisson’s accounts. While no malicious code was found, forensic analysis revealed an intruder had executed commands that appeared to involve search and exfiltration of data.
1.7: New Israeli 24-Hour TV Channel
Just as the international TV airwaves are about to suffer an unprecedented cyber-hijack, a June 21st, 2013, report states that a new Israel-based 24-hour TV news channel broadcasting in English, French and Arabic will go “Live” on air starting on July 1st, 2013. According to the report, a new TV station based in Tel Aviv named “i24 News” has 150 journalists will be broadcasting Zionist propaganda around the clock in English and French as well as five hours a day in Arabic. With the likes of BBC, CNN, and Fox News likely down due to the TV cyber-hijack, the new Israeli channel will likely be the only television station on the air, due of course to their ability to circumvent the cyber-hijack because of their new state-of-the-art security features. This scenario will allow “i24 News” to have an unabated worldwide audience as well as a timely opportunity to spin the nuclear attacks and the wars which will surly follow to their liking. Naturally, their timing couldn’t be more impeccable.
1.8: New Anchorman Movie Trailer
“Anchorman: The Legend of Ron Burgundy” (2004) is a film (see trailer) which was released in 2004 about an eccentric news anchor from San Diego, California. Roughly nine years later, the film is suddenly getting a long overdue sequel entitled, “Anchorman 2: The Legend Continues”. Curiously, the movie trailer was officially released on June 18th, 2013, despite the fact that the film will not be released until December 19th, 2013. Exactly why a movie trailer for a low-budget SNL comedy is being released 6 months too early in the middle of summer is rather suspicious and begs the question: why now? Although it’s impossible to know for certain, it does appear that the Anchorman 2 trailer was released with the sole purpose of bringing as much as attention to television anchors as possible just prior to an unprecedented “Live TV” cyber-hijack.
2. CYBER WAR:
2.1: United States v. China
Inflammatory war propaganda, rising diplomatic tensions between the U.S. and China along with unprecedented U.S. propaganda against China indicates that World War III scenario between the United States and China is on the horizon. On June 4th, 2012, it was reported that the Australian government’s Defense White Paper published in 2009 contained a “secret chapter” that assessed “Australia’s ability to fight an air-sea battle alongside the United States against China”. A few weeks later on June 27th, 2012, Chinese Maj. Gen. Peng Guangqian stated that a future conflict with the United States is coming as a result of U.S. “containment” policy. Guangqian was then quoted as saying, “The United States has been exhausting all its resources to establish a strategic containment system specifically targeting China” and that “The contradictions between China and the United States are structural, not to be changed by any individual, whether it is G.H.W. Bush, G.W. Bush or Barack Obama, it will not make a difference to these contradictions”.
2.2: Cyber Doomsday
Since June of 2012, numerous propaganda articles have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, “Threat Of ‘Spectacular’ Cyberattack Looms” and “U.S. Homeland Chief: Cyber 9/11 Could Happen “Imminently“, all indicate that an unprecedented act of state-sponsored cyber-terror upon the United States is imminent. Exactly how a cyber-Doomsday will manifest itself is unknown, but a “Live-TV” cyber-hijack and subsequent nuke detonation appears to be the working plan at this given time.
2.3: China & Cyber Terror
As previously, reported, the nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. Based on recent news and events, China, more than any other nation, is sure to be scapegoated in the aftermath of a cataclysmic cyber-terror attack against the United States. On October 5, 2011, U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two U.S. satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyber espionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta recently stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to clamp down on aggressive Chinese cyber-attacks against American companies and the U.S. government. On October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.
2.4: Obama Cyber Attacks
A Chinese attack highlighted by a massive cyber-attack will allegedly be in response to U.S. hacking and cyber-espionage by the Obama administration. As evidenced, these attacks will be used as the “motive” or justification for an unprovoked attack by China against the United States. According to June 1st, 2013, report by the New York Times, Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons. Six days later on June 7, 2013, it was reported that Obama has ordered his senior national security and intelligence officials to draw up a list of potential overseas targets for US cyber-attacks, a list which China is surly on. The 18-page Presidential Policy Directive 20, issued in October of 2012 states that Offensive Cyber Effects Operations (OCEO) “can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging”. Three days later, a Foreign Policy report from the Council on Foreign Relations stated that “Deep within the National Security Agency, an elite, rarely discussed team of hackers and spies is targeting America’s enemies abroad”, again highlighting Obama’s offensive cyber-warfare just prior to a retaliatory attack from China.
2.5: Cyber Terror Blinking Red
Cyber-terror related attacks, which are occurring at an unprecedented rate with over 40 high-profile
cyber-attacks in 2013 alone, are getting more and more diverse with each passing day. As evidenced, the notion that one can attack a jet, bank, stock market, water system, medical device or car via a computer has been floated by the media and brought to the attention of the public over the last few months.
1. April 11, 2013: Crashing Passenger Jet With Android Phone? (RT)
2. April 23, 2013: Stocks Gyrate Wildly After Fake Terror Tweet (USA Today)
3. May 9, 2013: In Hours, Thieves Took $45 Million In A.T.M. Scheme (NYT)
4. May 9, 2013: Cyber-Attacks Behind Possibly Record-Breaking Bank Heist (CBS)
5. May 11, 2013: World Grapples With Rise In Cyber Crime (Fox News)
6. May 25, 2013: Hackers Tried To Access Haifa’s Water System In Failed Cyberattack (Fox News)
7. June 13, 2013: US Warns Of Cyber Attacks On Medical Devices (France 24)
8. June 25, 2013: Bush Advisor: Hastings Crash ‘Consistent With A Car Cyberattack’ (RT)
[Does not purport to be a complete list of headlines]
3. U.S. MILITARY COMPROMISED:
3.1: U.S. Military Vulnerable to Attack
Prior to an unabated attack by China against U.S. military bases in the Pacific (i.e., Okinawa, Japan, Iwo Jima, Japan, and Pearl Harbor, Hawaii), the public must first be led to believe through propaganda and alleged whistleblowers that U.S. military equipment and weapons systems are vulnerable to Chinese cyber-related espionage. That way, in the aftermath of a Chinese invasion whereby U.S. defense systems such as missiles, planes and radars are suddenly rendered useless, the narrative of a Chinese cyber-attack can be floated to the American public and military as the reason for the deadly attack which will surely take America to war. If the following reports are to be believed, Chinese hackers have gained access to U.S. weapons secrets, stole blueprints from Australia’s intelligence agency, stole the latest U.S. weapons, hacked the NSA chairman’s accounts, targeted U.S. missile systems, hacked the Obama campaign, and hacked the head of the Nuclear Security Agency.
Chinese Cyber Espionage Headlines:
1. March 29, 2013: Report: China Gained U.S. Weapons Secrets Using Cyberespionage (CNN)
2. May 27, 2013: Chinese Hackers Steal Australian Security Intelligence Blueprints (News.com)
3. May 28, 2013: Pentagon: The Chinese Stole Our Newest Weapons (RT)
4. May 28, 2013: Chinese Infiltrated Top U.S. Weapons Systems, Confidential Report Claims (Fox News)
5. May 28, 2013: Obama Intelligence Agency Chairman Hacked By “Guccifer” (Smoking Gun)
6. May 28, 2013: Report Lists U.S. Weapons Compromised By Chinese Cyberspies (Washington Post)
7. May 29, 2013: Pentagon Aircraft, Missile Defense Programs Target Of China Cyber Threat (Fox News)
8. May 29, 2013: China To Hold Digital War Games (Guardian)
9. May 31, 2013: Hagel Says Chinese Cyberthreats Pose ‘Stealthy’ Danger To US (Fox News)
10. June 5, 2013:China Claims ‘Mountains Of Data’ On Cyber Attacks By US (FT)
11. June 6, 2013: Chinese Hacked Obama, McCain Campaigns, Took Internal Documents (NBC)
12. June 12, 2013: Head Of U.S. Nuclear Security Agency Is Hacked By “Guccifer” (Smoking Gun)
[Does not purport to be a complete list of headlines]
3.2: U.S. Weapons Compromised by Chinese Hackers
Based on the multiple reports, Chinese hackers have compromised numerous U.S. military weapons system ultimately making U.S. military personal and equipment vulnerable to Chinese attack. According to a May 28th, 2013, report by the Washington Post, the following is an “expanded partial list” of compromised DOD system designs and technologies:
I. U.S. System Designs
Terminal High Altitude Area Defense, Patriot Advanced Capability-3, Extended Area Protection and Survivability System (EAPS), F-35, V-22, C-17, Hawklink, Advanced Harpoon Weapon Control System, Tanker Conversions, Long-term Mine Reconnaissance System, Global Hawk, Navy antenna mechanisms, Global Freight Management System, Micro Air Vehicle, Brigade Combat Team Modernization, Aegis Ballistic Missile Defense System, USMC Tracked Combat Vehicles, Warfighter Information Network-Tactical (WIN-T), T700 Family of Engines, Full Authority Digital Engine Controller (FADEC), UH-60 Black Hawk, AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile), Affordable Weapons System, Littoral Combat Ship, Navy Standard Missile (SM-2,3,6), P-8A/Multi-Mission Aircraft, F/A and EA-18, RC-135 Detect./Collect, and the Mk54 Light Weight Torpedo.
II. U.S. Technologies
Directed Energy, UAV video system, Specific Emitter identification, Nanotechnology, Dual Use Avionics, Fuze/Munitions safety and development, Electronic Intelligence Processing, Tactical Data Links, Satellite Communications, Electronic Warfare, Advanced Signal Processing Technologies for Radars, Nanostructured Metal Matrix Composite for Light Weight Ballistic Armor, Vision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV), Space Surveillance Telescope, Materials/processing technologies, IR Search and Track systems, Electronic Warfare systems, Electromagnetic Aircraft Launch, Rail Gun, Side Scan sonar, Mode 5 IFF, Export Control, ITAR, Distribution Statement B,C,D Technical Information, CAD drawings, 3D models, schematics, Software code, Critical technology, Vendor/supply chain data, Technical manuals, PII (email addresses, SSN, credit card numbers, passwords, etc.), and attendee lists for program reviews and meetings.
3.3: Whistleblower Edward Snowden
The case offormer National Security Agency (NSA) whistleblower Edward Snowden is fascinating for many reasons but mainly because of his role in an upcoming Chinese cyber-related attack. In the aftermath of a Chinese attack, Snowden will be scapegoated as a traitor for giving information to the Chinese which ultimately enables them to circumvent U.S. military programs and weapons systems. This particular narrative first began to form on June 10th, 2013, when CIA officer Bob Baer stated on CNN that Obama officials are speculating that Snowden’s whistleblowing could be considered “potential Chinese espionage”. Four days later on June 14th, 2013, it was reported that a popular Communist Party-backed newspaper was urging China’s leadership to get more information from Snowden rather than send him back to the U.S., because his revelations about secret U.S. surveillance programs were in China’s national interest. Another June 14th, 2013, report stated that Snowden could offer intelligence that would help China update its understanding of cyberspace and improve its position in negotiations with Washington D.C. A week later, on June 21st, 2013, the Obama Administration reportedly charged NSA Whistleblower Snowden with espionage, theft and conversion of government property. These charges were leveled at Snowden in order to give the Obama administration the much needed plausible deniability in the aftermath of a Chinese attack on the U.S. Six day later on June 26th, 2013, it was reported that intelligence agencies in China and Russia had gained access to highly classified U.S. intelligence and military information contained on electronic media held by Snowden. According to the report, the exact compromise of the secret data held on Snowden’s laptop computers remains unknown but the biggest fear is that China gained access to new U.S. nuclear war plans.
3.4: Whistleblower James “Hoss” Cartwright
In the wake of the Edward Snowden case, the Obama administration has presented yet another intelligence patsy who can be scapegoated in the aftermath of a Chinese attack based on U.S. cyber-intelligence failures. On June 28th, 2013, it was reported that retired Marine Gen. James ‘Hoss’ Cartwright, a four-star general, is under a DOJ investigation over leaking details of a classified cyber-terror operation to the press. According to the report, Cartwright, who was deputy chairman of the Joint Chiefs of Staff between 2007 and 2011, was responsible for the ‘Olympic Games’, a massive attack on Iranian uranium enrichment facilities. He allegedly broke details of the top secret operation to the media, including collaboration with Israeli hackers in development of the Stuxnet computer worm. If indicted, Cartwright would join Bradley Manning, Edward Snowden and six others charged under the 1917 Espionage Act by the Obama administration.
4.1: Attack on Japan
The Japanese people are some of the most independent people on earth and therefore have been the focus of numerous wars, nuclear attacks (i.e., Hiroshima, Nagasaki, and Fukushima) tsunamis and earthquakes. The Zionist backed Chinese would love nothing more than to invade and destroy their culture and way of life as much as possible. Unfortunately, as it currently stands, the country of Japan is America’s closest ally in the Pacific and therefore an attack on Japan by China would instantly be seen as an attack on America. The U.S. has numerous military bases in Japan including two very strategic locations in Okinawa, Japan, and Iwo Jima, Japan. In World War II, the Battle of Iwo Jima was made famous by a photo of U.S. soldiers hoisting an American flag atop the island, and therefore, the capture of this island by “Communist” China would undoubtedly serve as an American war cry for revenge. If China were to successfully capture these two islands along with Pearl Harbor, Hawaii, they would have almost conquered most of the Asian-Pacific region.
U.S.-Japan War Headlines:
1. June 21, 2013: US, Japan Begin Naval Drills Near China (FT)
2. February 7, 2013: US, Japan, Australia Conduct Military Drills Over Pacific (Fox News)
3. April 5, 2013: Japan Will Join US Military Drill In California In June (Press TV)
4. June 9, 2013: Japan Sending Soldiers To US For First Time Amid Tensions With China (Fox News)
5. June 27, 2013: US-Japan War Games Off The California Coast Imitate Chinese Invasion (RT)
6. June 8, 2013: ‘US Army Chief In Japan Suspended’ (Press TV)
[Does not purport to be a complete list of headlines]
4.2: Head of U.S. Military in Japan Suspended
In a move which clears the way for an unabated Chinese attack on U.S. troops stationed Japan, it was reported on June 7th, 2013, that U.S. Army Major General Michael Harrison, the man directly responsible for responding to an attack on Japan, was suspended for allegedly failing to properly report or investigate a sexual assault complaint. Harrison, who was stationed in Camp Zama, was in charge of U.S. Army-Japan and was suspended four days prior to his completion of his 32-month assignment. It’s no secret that sexual assault and the military are synonymous and therefor the timing of the suspension is highly suspicious to say the least. Harrison’s scheduled replacement is Major General James Boozer, the former deputy commanding general of the US Army in Europe. With Boozer at the helm, plausible deniability due to his greenness on the job and his name “Boozer”, meaning drinker or drunk, will be cited as the reasons he failed to properly respond to a Chinese sneak attack.
4.3: U.S. F-15 Squadron Grounded
Prior to a Chinese invasion in which U.S. military aircraft fail to work properly, there must be an incident whereby U.S. planes can be “updated” with a virus or mechanical tweak so they are rendered useless. On May 28th, 2013, it was reported that U.S. pilot flying an F-15 over the Pacific Ocean identified an unspecified problem which forced him to eject in mid-flight. A day later on May 29th, 2013, it was reported that the U.S. Air Force had grounded its F-15 fighters on the southern Japan island of Okinawa for a safety review following a crash that forced the aforementioned pilot to eject over the Pacific Ocean. All F-15s attached to the 18th Wing on Okinawa’s Kadena Air Base were scheduled to undergo “inspections” during the reported stand down to ensure that they are “safe” to fly. Although it is not clear whether these planes are still grounded, the so called “inspections” may have allowed for the entire fleet of American planes to be sabotaged.
5.1: Nuclear Attack on Seattle
It’s no secret that Seattle, Washington, is one of the most liberal and progressive cities in the United States and therefore could be a target of Zionist terrorism. From marijuana legalization, animal rights, gay rights and recycling, Seattle is not just a city but rather a large community. Curiously, Seattle has experienced an unprecedented wave of terror and death which has been prepping the city for its impending nuclear destruction. Coincidentally, “Red Dawn” (2012) is a film (see trailer) in which the Washington state is the victim of a red-dawn surprise attack by military aircraft from Asia. At exactly 0:33 seconds into the trailer, a massive, explosion is heard at the same time a snow globe with Seattle’s Space Needle is shown, potentially foreshadowing an upcoming attack on the city.
Seattle Terror Headlines:
1. March 20, 2013: Seattle Airport Disrupted By Security Breach (Seattle, Washington)
2. March 25, 2013: Man Gets 18 Years In Seattle Terror Plot (Seattle, Washington)
3. April 1, 2013: 3 Killed After Seattle-Area Tavern Brawl Turns Into Gun Fight (Seattle, Washington)
4. April 8, 2013: Man In Seattle Terror Case Gets 17-Years For Terror Plot (Seattle, Washington)
5. April 12, 2013: Authorities Probe Death Of Man On Seattle Escalator (Seattle, Washington)
6. April 14, 2013: One Dead After Avalanches East Of Seattle (Snoqualmie Pass, Washington)
7. April 22, 2013:Domestic Dispute Starts Shootout That Kills 5 Near Seattle (Seattle, Washington)
8. June 25, 2013: FBI’s “Faces Of Global Terror” Ads Pulled Off Buses In Seattle (Seattle, Washington)
[Does not purport to be a complete list of headlines]
6. SAN FRANCISCO:
6.1: San Francisco Bay Bridge
The San Francisco–Oakland Bay Bridge (known locally as the Bay Bridge) is a pair of bridges spanning San Francisco Bay of California, in the United States. Aside from being partially demolished in the 1989 Loma Prieta Earthquake, the Bay Bridge recently underwent an emergency “repair”. On January 7th, 2013, it was reported that an oil tanker had struck a tower in the middle of the San Francisco-Oakland Bay Bridge. According to the report, the 752-foot tanker rammed the bridge tower as it headed out to sea damaging a 30 to 40 foot fender of steel on base of the bridge. Whether or not the suspicious ship accident and subsequent “repair” job will ultimately undermine the structural integrity of the bridge is not known, but the timely construction project could have theoretically provided cover for the installation of demolition explosives in and around the Bay Bridge. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated nuclear terrorist attack.
6.2: The Golden Gate Bridge
In order for a nuclear attack to be even more psychologically terrorizing, a well-known landmark such as the Golden Gate Bridge must be destroyed in the attack to serve as life-long reminder of that horrific day. The Golden Gate Bridge is a suspension bridge spanning the Golden Gate, the opening of the San Francisco Bay into the Pacific Ocean. On February 23rd, 2012, it was reported that the Golden Gate Bridge in San Francisco, California, would undergo a renovation project that will “take years to complete”. According to the report, the project involves repainting the two main suspension cables which are responsible for holding the bridge in place. Whether or not the suspicious “renovation” project will ultimately undermine the structural integrity of the bridge is not known, but the timely construction could have theoretically provided cover for the installation of demolition explosives in and around the Golden Gate Bridge. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated nuclear terrorist attack. Prior to a high-profile terror attack or “natural disaster” resulting in the demolition of the Golden Gate Bridge, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda and government propaganda is a slick way of showing that yes, it can happen. On June 2nd, 2009, the Onion ran a story which openly joked about a “horrific attack on San Francisco’s Golden Gate Bridge, which “left thousands missing and assumed dead”. Three years later, Hollywood released “Rise of the Planet of the Apes” (2012), a film (see trailer) in which a monkey literally destroys the Golden Gate Bridge.
7. PARIS, FRANCE:
7.1: Attack on Paris, France
Paris, France, is one of the most anti-government places in the world. They have absolutely no respect for authority or the political process, and are not shy to voice their anti-government sentiment. Therefore, should the U.S. be hit with a Chinese nuclear attack, depending on how Europe reacts, it’s possible that Paris could be subsequently targeted. In order for a nuclear attack to be even more psychologically terrorizing, a well-known landmark such as the Eiffel Tower must be destroyed in the attack to serve as life-long reminder of that horrific day. Coincidentally, some very suspicious events have occurred at the Eiffel Tower over the last few months. Whether or not any of these events provided cover for the installation of a nuclear weapon in or around the tower is not known, but the opportunity to do so was available.
Latest Eiffel Tower Headlines:
1. March 30, 2013:Eiffel Tower Evacuated Due To Bomb Threat (Paris, France)
2. June 18, 2013: Eiffel Tower Evacuated After Suicide Threat (Paris, France)
3. June 25, 2013: Armed Soldiers Guard Eiffel Tower After 6 Terrorists Arrested In Paris (Paris, France)
4. June 27, 2013: Eiffel Tower Reopens To Tourists After Rare 2-Day Strike
5. June 28, 2013: Eiffel Tower Fiasco A Lift For Thieves (Paris, France)
[Does not purport to be a complete list of headlines]
8. WALL STREET:
8.1: Wall Street Terror
A cyber-attack by China against Wall Street would be seen as an act of war and would be a convenient way to both publically bankrupt America and take her to war at the same time. Wall Street is the financial district of New York City and the heart of America’s economy. 93 years ago, the Wall Street bombing occurred at 12:01 pm on September 16th, 1920, in the Financial District of New York City. The terrorist attack killed 38 and seriously injured 14. With the rise of the Occupy Wall Street movement and the ever increasing hatred of banks and their practice of usury, it is highly likely that Wall Street will once again be targeted for terror. On November 18th, 2008, it was reported that terror suspect Aafia Siddiqui was taken into custody following her capture in Afghanistan on charges of attempted murder following revelations of a “Mass Casualty Attack” that listed various landmarks in New York, including Wall Street. Prior to a high-profile terror attack against Wall Street, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “The Dark Knight Rises” (2012) is a film (see trailer) which depicts a major terror attack and cyber-terror attack against Wall Street in which criminals bilk the NYSE for billions of dollars.
8.2: Wall Street Preparing for Major Cyber Attack
Prior to a major cyber-terror attack by China on the New York Stock Exchange (NYSE), one would expect there to be some stock-market related terror drills to prepare Wall Street insiders for the attack. Case in point: On June 13th, 2013, it was reported that Wall Street executed “Quantum Dawn 2”, a cyber-terror war-game apparently meant to give insiders an opportunity to make financial moves before the market crashes, for good. According to the report, Cyber Strategies oversaw a terror exercise which included Citigroup, Bank of America, the Department of Homeland Security, the Treasury Department, the Federal Reserve, the Securities and Exchange Commission, as well as 40 other firms. The drill, which featured a hacker, possibly from China, operating from a fake trading platform, prompted a response in which the participants facilitated a conference call to “figure out what was going on”. In other words, the drill simulated a real-life scenario in which insider firms received the “heads up” about an impending cyber-attack and shared this information accordingly so that their bank accounts and those of their clients would not be affected. The same sort of thing occurred just prior to 9/11 when “put options” or bets were taken out on United Airlines and American Airlines, the two airline companies involved in the attacks. According to the “9/11 Commission Report”, “some unusual trading did in fact occur”, however, it claimed that, “each such trade proved to have an innocuous explanation”.
It’s imperative to remember that starting fights between different races, classes and religions is taken word for word from the 3rd Protocol of the Protocols of Zion. The main goal of the Zionist establishment is to get America to destroy herself the same way that Russia was destroyed under Stalin. This is done by dividing and then collapse society upon itself by baiting the gun-owning American public into a violent revolution against their own police and military while the real terrorists sit off-shore and pull the strings.
About the Author
David Chase Taylor, the editor-in-chief of Truther.org, is an American journalist living in Zürich, Switzerland where he has applied for political asylum since the release of The Nuclear Bible, a book credited with subverting a false-flag/state-sponsored nuclear terror attack upon America in Dallas, Texas on February 6, 2011. Taylor has since released The Bio-Terror Bible, a website exposing the coming global bio-terror pandemic likely planned for 2013. Taylor has also exposed numerous terror plots including the 2012 DNC Terror Plot, the “Twilight” Premier Terror Plot, as well as Alex Jones’ links to STRATFOR.
Truther.org Legal Disclaimer
Truther.org’s stated purpose is to prevent terror attacks by drawing unwanted global attention to these terror plots prior to their fruition. Terror related assertions, forecasts and predictions made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility they could theoretically happen based on the cumulative terror related data. Historically, once a major false-flag terror plot is exposed (e.g., the Super Bowl Nuclear Terror Plot), the terror plot is immediately canceled or postponed. State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, as well as mislead the public from the true perpetrators of terror. By first identifying and then connecting the dots of the terror related paper trail, Truther.org has successfully blown the whistle on numerous terror related plots. Please spread the word in helping make terrorism a thing of the past. Namaste.