china-nuke

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history and may try and assassinate me Switzerland, especially since I have decifered.

SHOCK: 10 Reasons Why the Paris Terror Attacks Were Executed by the CIA

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
July 27, 2016
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese attack and/or invasion of Australia which may be followed by nuclear attack on Brisbane, Melbourne, Perth and/or Sydney.

In order to provide a timely motive for a Chinese attack on Australia, the Chinese news agency Xinhau published a report on February 18, 2016, entitled “China Urges Australia to be Impartial on South China Sea Disputes“, suggesting, albeit in a de facto manner, that Australia is partial to the United States.

In what appears to be the war game for a confrontation between China and Australia, the Australian, Japanese and U.S. military executed military drills dubbed “Talisman Saber” which began on July 7, 2015. Consequently, both sides are trained on how to attack and respond to an attack.

According to an official statement on the Talisman Sabre exercises, “Japan will join a major US-Australian military exercise for the first time in a sign of growing security links between the three countries as tensions fester over China’s island building in the South China Sea”.

Nevertheless, Japanese Defense Minister General Nakatani rejected any so-called theories the exercises were targeted at China. Only 40 Japanese officers and soldiers will participate in the war games which will reportedly involve roughly 30,000 U.S. and Australian troops.

Consequently, a Chinese attack on the aforementioned drills and/or the counties of Australia. Japan and/or the U.S. may now be forthcoming as the drills have provided a timely motive for an unprovoked attack by the Chinese government.

China pearl harbor

 

South China Sea Attack
Based on breaking news and events, it appears that the CIA is plotting a Chinese attack on the Australian and/or U.S Navy which has ships trolling the disputed islands within the South China Sea. This latest Chinese attack narrative was first identified back on October 15, 2015, when the Guardian published a report entitled “Chinese Media: Military Must be Ready to Counter US in South China Sea”, foreshadowing that a confrontation may be imminent. Nine days later on October 24, 2015, Yahoo News published a report entitled “U.S. Patrols to Raise Stakes with Beijing in Disputed South China Sea”, further raising the specter of a naval confrontation with China. Three days later on October 27, 2015, Reuters published a report entitled “Angry China Shadows U.S. Warship Near Man-Made Islands”, foreshadowing a Chinese attack on the USS Lassen destroyer. Lastly, in what appear to be the final warning by China just prior to a surprise revenge-like attack, it was reported on October 27, 2015, that China has officially warned the United States after the USS Lassen passes near the disputed islands. Needless to say, these reports, taken collectively, suggest that a confrontation between the U.S. and China in the South China Sea is imminent.

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

uss-mccampbell-south-china-sea.jpg

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland

ISIS ENDGAME:
How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
July 27, 2016
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears CIA Headquarters beneath Lake Geneva is plotting a surprise Chinese attack targeting the United States and/or the U.S. Navy in the disputed South China Sea.

In order to foreshadow Chinese aggression in the South China Sea just prior to an attack on the United States, Fox News (at the behest of the CIA) published a report on February 16, 2016, entitled “Exclusive: China Sends Surface-to-Air Missiles to Contested Island in Provocative Move“.

Consequently, the most likely Chinese attack scenario is a surface-to-air attack on U.S. planes in the region, a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) that may be followed by a full-scale nuclear attack on Hawaii, Las Vegas, Los Angeles and/or San Francisco.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 17 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

South China Sea Attack
Based on breaking news and events, it appears that the CIA is plotting a Chinese attack on the U.S Navy which has ships trolling the disputed islands within the South China Sea. This latest Chinese attack narrative was first identified back on October 15, 2015, when the Guardian published a report entitled “Chinese Media: Military Must be Ready to Counter US in South China Sea”, foreshadowing that a confrontation may be imminent. Nine days later on October 24, 2015, Yahoo News published a report entitled “U.S. Patrols to Raise Stakes with Beijing in Disputed South China Sea”, further raising the specter of a naval confrontation with China. Three days later on October 27, 2015, Reuters published a report entitled “Angry China Shadows U.S. Warship Near Man-Made Islands”, foreshadowing a Chinese attack on the USS Lassen destroyer. Lastly, in what appear to be the final warning by China just prior to a surprise revenge-like attack, it was reported on October 27, 2015, that China has officially warned the United States after the USS Lassen passes near the disputed islands. Needless to say, these reports, taken collectively, suggest that a confrontation between the U.S. and China in the South China Sea is imminent.

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

china-nuke

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history and may try and assassinate me Switzerland, especially since I have decifered.

SHOCK: 10 Reasons Why the Paris Terror Attacks Were Executed by the CIA

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
July 27, 2016
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese attack and/or invasion of Argentina, Australia, Guam, Hawaii, Japan, North Korea, the Philippines, Taiwan, Thailand, United States mainland and/or Vietnam. An attack on the aforementioned islands will allegedly be due to U.S. military bases.

That being said, Alaska, California, Hawaii, Oregon and/or Washington could suffer a Chinese Special Forces invasion. In order to highlight Asian Special Forces on an international level just prior to a Chinese Special Forces-related attack/invasion, the Pentagon stated on February 13, 2016, that North Korean Special Forces are “highly trined” and “well equipped“.

In what appears to be pre-World War III programming, it was reported on December 21, 2015, that the Pentagon is now preparing for war with China. The timely propaganda report stated that the DOD is intent on triggering a military conflict with China over disputed islands in the South China Sea, likely at Clark Air Base in the Philippines where the U.S. has stationed numerous Boeing P-8A Poseidon advanced maritime surveillance aircraft.

The impending Chinese attack will likely involve one or more of the following: a) conventional nuclear attack; b) a TV-related cyber-hijack and subsequent nuclear attack; c) an EMP attack; d) Special Forces-related attasck/invasion and/or e) the full-scale Chinese invasion of Australia, Guam, Hawaii, Japan, the Philippines, Taiwan, and/or mainland U.S.

Consequently, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

That being said, the U.S. Navy began Annual Exercise 16 on November 16, 2015, a naval war game between Japan and the United States which featured the USS Ronald Reagan aircraft carrier. Consequently, a made-for-TV Chinese aerial attack on iconic aircraft carrier is expected.

Annual Exercise 16 was likely executed in order to provide a timely motive for an unprovoked attack by China on Japan which will likely result in the first ever Chinese beachhead and military base in Japan, a country which is currently home to numerous U.S. military bases.

In order to foreshadow the aformentioned attack on the USS Ronald Reagan aircraft carrier, the Washington Free Beacon published a report on December 15, 2015, entitled “Chinese Submarine Practiced Missile Attack on USS Reagan“. The incident  violated China’s 2014 commitment to the multinational Code for Unplanned Encounters at Sea, known as CUES, designed to reduce the risk of a shooting incident between naval vessels.

Four days later on December 19, 2015, USA Today published a report entitled “China Urges U.S. to Stop ‘Provocative Actions’ after B-52 Flights”, an action allegedly taken by the U.S. on December 10, 2015, which is designed to provide a timely motive for a revenge-like attack on America by China.

This notion was confimed the very same day on December 19, 2015, when the Examiner published a report entitled “China Blames U.S. for ‘Serious Military Provocation;’ Will Take Action“. Said action will likley be in the form of a suprise attack on Hawaii, Japan, the Philippines and/or mainland United States.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 20 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

In the wake of said Chinese attack plots, roughly 60 Chinese officials suddenly died due to unnatural causes. Although only conjecture, it appears that these Chinese officials were executed due to their first-hand knowledge of the aforementioned foiled war plots. After all, dead men tell no tales.

The notion that the Chinese are plotting a nuclear attack on Los Angeles was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the American cities of Los Angeles and Seattle after they were hit by nuclear warheads from China.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

Four days later on August 14, 2015, it was reported that the NSA has now pinpointed China’s cyberattacks, citing a secret NSA document which revealed the “massive nature of China’s cyberattacks against the United States, with nearly 700 intrusions in private-sector and government networks”.

In order to provide a timely motive for a Chinese-based attack on the United States, it was reported back on August 30, 2015, that the U.S. is now developing sanctions against China over the alleged cyber-thefts. Consequently, a revenge-like attack by China is likely forthcoming.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Low and behold, two days later on September 4, 2015, Chinese warships were reportedly spotted off Alaskan coast as they passed through U.S. waters. The incident was likely ordered by the CIA in order to foreshadow the notion of a surprise Chinese attack on America.

Roughly 2-weeks later on September 20, 2015, Fox News published a report entitled “Concerns Over Cyberattacks, Territorial Ambitions Overshadow Chinese Leader Xi’s US Visit”, foreshadowing that Chinese attacks and/or invasions may be planned surrounding Xi’s visit.

That same day, September 20, 2015, USA Today published a report entitled “Breakthrough in Cloaking Technology Grabs Military’s Attention” foreshadowing that China will execute drone-related attacks on the U.S. via so-called cloaking technology which will make incoming Chinese drones invisible to U.S. radar.

In what appears to be an ominous sign of an aerial confrontation to come, it was reported on September 23, 2015, that a Chinese fighter jet made an unsafe intercept of a U.S. Air Force plane over Yellow Sea. The incident was likely ordered by the CIA in order to set the precedent for a real military confrontation with China.

In order to further foreshadow the a Chinese-based aerial assault on America is imminent, the Wall Street Journal published a report on September 25, 2015, entitled “China Completes Runway on Artificial Island in South China Sea”. Needless to say, runways imply planes and/or drones.

In order to highlight U.S.-Chinese relations (or lack thereof) just prior to an unprecedented Chinese attack on the United States, Chinese President Xi came to America on September 22-25, 2015, visiting President Obama in Washington, D.C.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

China pearl harbor

Top Chinese Attack Locations:

1. San Francisco, California
2. Seattle, Washington
3. Las Vegas, Nevada
4. Los Angeles, California
5. San Diego, California
6. Honolulu, Hawaii
7. Naval Station Pearl Harbor
8. Australia
9.
Japan
10.
Philippines
11.
Taiwan
12. South China Sea (Disputed Islands)

South China Sea Attack
Based on breaking news and events, it appears that the CIA is plotting a Chinese attack on the U.S Navy which has ships trolling the disputed islands within the South China Sea. This latest Chinese attack narrative was first identified back on October 15, 2015, when the Guardian published a report entitled “Chinese Media: Military Must be Ready to Counter US in South China Sea”, foreshadowing that a confrontation may be imminent. Nine days later on October 24, 2015, Yahoo News published a report entitled “U.S. Patrols to Raise Stakes with Beijing in Disputed South China Sea”, further raising the specter of a naval confrontation with China. Three days later on October 27, 2015, Reuters published a report entitled “Angry China Shadows U.S. Warship Near Man-Made Islands”, foreshadowing a Chinese attack on the USS Lassen destroyer. Lastly, in what appear to be the final warning by China just prior to a surprise revenge-like attack, it was reported on October 27, 2015, that China has officially warned the United States after the USS Lassen passes near the disputed islands. Needless to say, these reports, taken collectively, suggest that a confrontation between the U.S. and China in the South China Sea is imminent.

Red Dawn

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

635783831469620327-invisible

China’s “Invisibility Cloak
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

Chinese Drone Attack

1.1 Chinese Cyber-Hijack Possible

Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)
In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

Cyber War China

1.4: China’s Military Hacking Program
In order to create a believable narrative in the media prior to China’s cyber-hijack of U.S. drones, a number of fabricated incidents and staged events have taken place in order to set the stage for the attack. For example, on May 19, 2014, the U.S. officially accused China of hacking 6 companies, stating that China was after U.S. military secrets. This was the first time that a nation state was officially charged by the U.S. with cyber-espionage. In total, 5 Chinese “military hackers” were indicted in U.S. courts for cyber spying. Predictably, a day later on May 20, 2014, China suspended its cybersecurity cooperation with the U.S. over the aforementioned charges. That same day, Chinese officials confronted a U.S. envoy over the cyber-spying accusations in what appeared to be a CIA-spawned publicity stunt. Less than 24-hours later on May 21, 2014, China banned the use of Windows 8 on Chinese government computers, producing even more international headlines about the incident. Three days later on May 24, 2014, a report stated that the U.S. plans to “keep up the pressure” on China and that it is now in the process of selecting from a range of retaliatory options. Five days later on May 29, 2014, China openly suggested that the U.S. may have made up evidence for cyber-attacks, further confirming that the cyber-rift is indeed just political theater. Roughly 2 weeks later on June 10, 2014, it was revealed that the Chinese military has been hacking the U.S. aerospace industry for the last 7 years, a timely report designed to show that China likely has the ability to hack U.S. drones. Lastly, on June 10, 2014, it was revealed that a second Chinese military unit has been linked to hacking. According to reports, the Chinese hackers launched attacks against defense, satellite and aerospace firms within the U.S., Japan and Europe. Needless to say, the notion that China and her military are actively engaged in cyber-attacks against the U.S. military has been well established, making the notion of U.S. drones being cyber-hijacked by China seem all the more feasible.

1.5: Revenge Drone Attack

In order to provide a timely motive for a Chinese attack on America using U.S. drones, it was revealed on May 30, 2014, that the U.S. has deployed two advanced military drones to a Japanese airbase. Since China is currently in a dispute with Japan over the Senkaku Islands, the placement of the drones by the U.S. was a slap in the face designed to infuriate China just prior to a revenge attack using cyber-hijacked U.S. drones. Roughly a month later on June 26, 2014, U.S. military experts warned that killer drones will trigger a “slippery slope” into endless war, a propaganda report deigned to foreshadow the start of the cyber-war between the U.S. and China. As previously mentioned, once a drone war starts between the U.S. and China, cyber-hijackings followed by deadly drone attacks will become the norm. This drone war scenario essentially allows the CIA to attack whomever and whatever they want, whenever they want to. In the aftermath of the attack, the U.S. will blame China and China will blame the U.S. In essence, drones attacks will be used to eliminate anybody who doesn’t comply with system.

HT_sting_of_the_Drone_mar_140507_16x9_608

1.6: “Sting of the Drone”

The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

II. CHINESE NUCLEAR ATTACK:

2.1: Chinese Nuclear Attack
The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

2.2: Chinese Cyber-Hijack Nuke Attack
The notion of a surprise cyber-attack by an Asian country was ominously foreshadowed in the Washington Times report from January 8, 2015, entitled “Preventing a ‘Cyber Pearl Harbor’”. The report stated “we have now reached a new era of cyberterrorism where threats cause just as much damage and fear as a bomb threat”, ultimately linking a cyber-related attack to a real world bomb, most likely nuclear in nature. A television-based cyber-hijack and nuke attack would be a redux of a previous Chinese attack plot depicted in the June 30, 2013, Truther.org report entitled “Live TV” Cyber-Hijack With “Live” Nuclear Detonation Now Trending”. The notion of a Chinese nuclear attack on the U.S. was openly flaunted back on October 31, 2013, when the Chinese government released nuclear blast map projections for the U.S. cities of Seattle and Los Angeles after they were struck by Chinese nuclear warheads. A few weeks later on December 17, 2013, a Chinese space rover advert showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the West is imminent. According to a report published on February 6, 2014, new Chinese-based submarine patrols have put Hawaii and Alaska within nuclear attack range, further foreshadowing a West Coast nuclear attack by China. Four days later on February 10, 2014, China reportedly showed off its new mobile ICBM on the internet, suggesting that China will soon be using her nuclear weapons in a mobile and offensive manner.

department-homeland-security-securing-the-cities-los-angeles-nuclear-attack-war-false-flag

2.3: California Nuclear Attack Drills
In what appears to be the nuclear terror drills for a Chinese nuke attack upon Las Vegas or Los Angeles, it was reported on April 1, 2015, that DHS executed a nuke attack drill on the US-Mexico border. According to reports, the exercise simulated “an emergency involving the detonation of a weapon of mass destruction near the U.S./Mexico border”. Authorities drilled on how they would deal with thousands of people crossing over from Mexico to escape the catastrophe, a scenario which would transpire in reality post-nuclear attack in Las Vegas and/or Los Angeles. Two days later on April 3, 2015, it was revealed that a dirty bomb drill would be executed on April 11, 2015 involving hundreds of soldiers, airmen, police and fire officials. According to reports, the nuclear terror drill was executed in Richmond, California, just 381 miles north of Los Angles.  Lastly, less than 2-weeks later on April 24, 2015, it was reported that the U.S. Military held another dirty bomb decontamination exercise in Michigan. Although only conjecture, it’s highly likely that the Michigan drill was preparation for the Chinese nuclear terror attack slated for Los Angeles and/or Las Vegas.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.

III. CHINESE CYBER-ATTACK:

Obama China

3.1: Chinese Cyber-Attacks Trending
The notion that the Chinese government is actively hacking the U.S. military was confirmed back on September 18, 2014, when it was revealed by a U.S. Senate panel that the China has hacked U.S. military contractors. Roughly 2-months later on November 2, 2014, it was reported that China has successfully developed a laser-based drone defense system. The report was designed to show that China is actively developing drone system, one which will go offensive in the near future. A week later on November 9, 2014, it was reported that China will launch the world’s longest ‘hack-proof’ network by 2016, further tying China to hacking just prior to an unprecedented cyber-hijack of U.S. drones. Coincidentally, a day later on November 10, 2014, it was reported that the U.S. Postal Service confirmed a security breach and that the Chinese hackers are suspected. Three days later on November 12, 2014, the Chinese allegedly hacked U.S. weather systems as well as a satellite network. The wave of Chinese cyber-attacks is designed to show that Chinese cyber-related aggression is escalating. Lastly, on November 20, 2014, CNN published a report entitled “The U.S. Government Thinks China could take Down the Power Grid”. Needless to say, the timely propaganda report was designed to foreshadow a massive Chinese cyber-attack on the United States not only possible but imminent.

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

reign-malware-1000x520

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

3.4: Chinese Cyber Attack on US Banks/ATMs
In the event that China executes a major cyber-related attack against the U.S., it will most likely target America’s financial system, namely banks. A future cyber-terror scenario in which Chinese hackers either delete or add trillions of fraudulent U.S. dollars to bank accounts now appears to be in order. In the case of the latter, the U.S. dollar will become worthless overnight, causing a run on the banks as well as the bankruptcy of the U.S. In order to link China with ATM’s just prior to an attack that will add or minus trillions from ATM’s, it was reported back on June 1, 2015, that Chinese researchers have invented the world’s first facial recognition ATM. Roughly 6-weeks later on July 20, 2015, it was reported that police recovered a stolen ATM machine in a parking lot after it fell out of a robber’s getaway van. The incident was likely staged or fabricated in order to show that ATM’s are vulnerable just prior to an unprecedented financial-related cyber-attack that causes a run on the banks, namely ATM’s. In order to foreshadow the notion of frozen bank funds just prior to the state-sponsored hack, it was reported on August 5, 2015, that victims of Iranian terror attacks ae suing to block the release of frozen funds. Needless to say, in the aftermath of a hack which adds trillions to the money supply, the federal government will freeze all bank accounts until the crisis is over, causing chaos and looting across America. Two days later on August 7, 2015, Chinese hackers reportedly attacked the U.S. travel industry, an incident designed to sell the notion that China is now targeting the U.S. The notion of a financial-related attack was coincidentally witnessed 5-days later on August 11, 2015, when hackers made off with $100 million from insider trades. That same day, August 11, 2015, it was also reported that 32 people were charged in the $100 million insider-trading hacking plot. A day later on August 12, 2015, the Telegraph published a report entitled “China Cannot Risk the Global Chaos of Currency Devaluation”, associating China with both global chaos and currency devaluation just prior to a cyber-related attack that brings about both, namely in the U.S. The notion of a cyber-attack holding a country hostage was highlighted that same day on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. Although gas pumps could theoretically be targeted, banks and their ATM’s are a far more likely target. Also on August 12, 2015, the Blaze published a report entitled “‘Soon, Very Soon You Will See’: ISIS Hacking Group Issues Chilling Warning to America”, further raising the notion that American is about to suffer a massive cyber-attack. A day later on August 13, 2015, Fox News published a report entitled 50 Cent’s Bankruptcy Is a Lesson in Valuing What You Earn”, highlighting the notion of bankruptcy just prior to the U.S. being forced to declare bankruptcy in the aftermath of a Chinese cyber-attack. Lastly, in order to highlight fake money just prior to an unprecedented cyber-related attack on the U.S. financial system that suddenly deposits trillions of fake dollars in people’s bank accounts, a number of propaganda reports citing the use of fake money or money-related certificates have been published. For example, on August 13, 2015, a Virginia man reportedly plead guilty to felony charges after cashing an erroneous check. That same day, August 13, 2015, a man reportedly admitted to bringing in counterfeit chips to a poker tournament. A day later on August 14, 2015, a former Brooklyn Nets basketball player reportedly cashed a fake money order for $1,000. Needless to say, these reports, taken collectively, suggest that a state-sponsored cyber-related terror attack on America’s financial system is imminent. Although the country of China will be blamed, CIA minions in Switzerland will profit.

IV. CHINESE EMP ATTACK:

chinese-emp-nuke-drone-attack

4.1: China’s EMP Quest
In a January 8, 2011, report entitled “China’s Quest For Dominance In Electro-Magnetic Warfare”, it was revealed that “China’s continued advancement in their air defense sector has continued to raise more concerns” and that “the Dong Feng 21D, a land-based anti-ship ballistic missile that officials now say has reached its initial operating capability. Which analysts have said the new Chinese missile leaves U.S. aircraft carriers vulnerable to [an EMP] attack”. The article also quotes Vice Admiral Jack Dorsett, the deputy chief of naval operations for information dominance and the service’s intelligence director, as stating that China is trying to dominate “in the electro-magnetic spectrum, to conduct counterspace capabilities, and clearly to conduct cyber activities.” China has already been set-up as the EMP terror scapegoat much the same way that it has been set-up as the cyber-terror scapegoat. If the reports are to be believed, China is currently developing EMP weapons and could use them against U.S. aircraft carriers in a future conflict. If and when an EMP attack strikes America, there is a high probability that China will be ultimately scapegoated and attacked, so long as the American military is able to function post-EMP attack.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

DNCC_SocialShare.png

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
July 27, 2016
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the Obama administration (at the behest of the CIA in Switzerland) is plotting a wave of attacks during the 2016 Democratic National Convention which is scheduled to take place at at the Wells Fargo Center in Philadelphia,Pennsylvania on July 25-28, 2016.

Exactly what type of attacks are planned during the 2016 Democratic National Convention is not known, but a 9/11-style terror attack via a plane laden with bio-chemical weapons is the most likely terror scenario. Needless to say, the attack would spark the bio-terror pandemic planned for 2016.

In what appears to be pre-eco attack programming, it was reported on July 27, 2016, that a famous environmentalist couple were both found dead in their Connecticut home in suspected double suicide. Needless to say the were likely assassinated.

Read more: http://www.dailymail.co.uk/news/article-3709951/Judi-Louis-Friedman-environmentalists-Connecticut-dead-apparent-suicides.html#ixzz4FeBIgbAC
Follow us: @MailOnline on Twitter | DailyMail on FacebookIn what appears to be pre-nuclear bombing terror propaganda, it was reported on July 21, 2016, that the U.S. Department of Homeland Security stated that they are now looking for a truck bomb in Cleveland, Ohio  during the 2016 RNC. Since the truck was never found, it may be used in an attack on the 2016 Democratic National Convention.

That being said, the 2016 Democratic National Convention may suffer one or more of the following attacks and/or invasions. Regardless if domestic and/or Islamic terrorists are scapegoated, the attacks will be executed by Special Forces (i.e., professional terrorists).

a) 9/11-Style Bio-Chemical Attack
b) Black Lives Matter-Related Attack
c) Bombing
d) Bundy-Militia-Inspired Attack and/or Invasion
e) Clinton-Related Attack and/or Assassination
f) Coup of Pennsylvania State Capital Building
g) Wells Fargo-Related Attack, Hostage Crisis and/or Siege
h) ISIS/Islamic Attack and/or Invasion
i) Mass Shootings
j) Clinton-Related Attack and/or Assassination
k) Open-Carry-Related Massacre
l) Race Riots & Race War Attacks
m) Sniper Attacks
n) Vehicular-Related Terror Attack

Considering that the 2016 Democratic National Convention is designated as a National Special Security Event, meaning that ultimate authority over law enforcement goes to the Secret Service and Department of Homeland Security, a mass attack of some kind is likely in order.  

Also, considering the City of Cleveland sought to purchase over 2,000 riot control personnel gear sets prior to the 2016 RNC for $20 million, it can be deduced that race war attacks and subsequent race riots are now in play for the 2016 Democratic National Convention.

In order to sell the notion that security is lacking at the 2016 Democratic National Convention just prior to a wave of state-sponsored attacks, CNN published a report on July 14, 2016, entitled “Security Fears Mount Ahead of GOP Convention“.

In order to foreshadow attacks during the the 2016 Democratic National Convention, traitorous Infowars published a report on July 15, 2016, entitled “Republican Convention To Get Hit Next? FBI And DHS Warn Of ‘Violence’ And ‘Terror’ At The RNC“.

Among other things, the propaganda report stated that “U.S. Homeland Security Secretary Jeh Johnson and FBI Director James Comey told lawmakers on Thursday that they were preparing their agencies for the possibility of violence, both from unruly demonstrators and terrorists, at the upcoming Republican and Democratic nominating conventions”.

Also, it was reported that the Federal Bureau of Investigation is monitoring the threat of violence at the conventions “very, very carefully.”“Anytime there is a national spotlight on a political event in the United States, there is a risk that groups that aspire to do just that, engage in acts of domestic terrorism, will be attracted,” FBI Head Comey stated,.

The notion that political candidates  are actively being targeted for assassination was witnessed back on June 19, 2015, when a Washington, D.C. hotel ball room was evacuated due to a bomb threat during a meeting of 2016 Republican candidates.

In what appears to be pre-9/11-style political terror attack programming for the 2016 Democratic National Convention, it was reported roughly 2-months later on September 12, 2015, that a drone was shot down at a fundraiser for U.S. Senator Jim Inhofe of Oklahoma.

Five days later on September 17, 2015, it was reported that a journalist was confronted by security at a Chelsea Clinton event. The incident was likely staged in order to highlight a potential security breach at a political event just prior to its fruition in reality.

Five days later on September 22, 2015, it was reported that Arizona resident Jon Ritzheimer, a militiaman, “Oathkeeper” and so-called “American Patriot, threatened to arrest U.S. Senator Debbie Stabenow over her role in the passage of the Iran Deal.

Needless to say, Jon Ritzheimer is an intelligence operative and the entire incident was likely staged at the behest of the CIA in order to sell the notion that U.S. militiamen are now taking action against America politicians just prior to a militia-related terror attack on a political event.

The notion that U.S. politicians will be murdered was foreshadowed on September 24, 2015, when South Park aired an episode which showed Donald Trump being raped and murdered. Needless to say, the episode was Hollywood programming for a real-world attack on U.S. politicians.

Lastly, four days later on September 28, 2015, it was reported that screams were heard when a stage collapsed during Republican presidential candidate Carly Fiorina’s speech. Whether the event was staged is not known, but it has set the precedent for political-related terror nonetheless.

web-bio-attack-1-gettyv2

Political Event-Related Bio-Attack
Back on February 21, 1999, a bio-terror war game entitled “Doctors Play” was executed by the U.S. government which involved terrorists contaminating a political rally with silent, odorless smallpox. Due to the fact that this terror scenario was previously drilled, a similar type of bio-attack may now be in play. As depicted in the Bio-Terror Bible, the genesis of the 2015 bio-terror pandemic will be a “made-for-TV event” whereby millions will witness the bio-terror outbreak on “live” television. This will likely occur when the agents known as anthrax (Bacillus anthracis) or smallpox (Variola major) are released into a controlled environment such as a political event.

Breaking Bad Domestic Bio Terror

Domestic Bio-Chemical Attack
Aside from the Georgia militia members (that double as government employees) which are currently on trial for an anti-government bio-terror plot, breaking news suggests that the CIA is plotting a so-called domestic terrorist bio-chemical attack. In order to foreshadow this type of attack on U.S. soil, it was reported on June 8, 2015, that a fire at a Pennsylvania chemical plant sent smoke billowing in sky. Four days later on June 12, 2015, it was reported that a Massachusetts man killed himself with chemical gas, sending 11 other to the hospital. Roughly 6-weeks later on July 29, 2015, it was reported that a Breaking Bad fan was convicted of a Dark Web ricin plot. It is imperative to note that the popular TV show entitled “Breaking Bad” (2008) was state-of-the-art domestic bio-terror attack propaganda. Aside from depicting murders via bio-chemical pathogens such as Ricin, the show mixed in a number of aviation-related disasters which were designed to foreshadow a 9/11-style bio-chemical terror attack by domestic terrorists. In order program the American public for a bio-chemical-related explosion, it was reported on August 4, 2015, that a fuel tank exploded at an Ohio gas station. That same day, August 4, 2015, a large explosion rocked a Missouri aluminum plant. Also on August 4, 2015, it was reported that 2 men were arrested after a meth lab was found inside a Taco Bell in Iowa. The timely report was designed to invoke Breaking Bad just prior to a state-sponsored domestic terror attack on a bio lab in America. Lastly, on August 23, 2015, it was reported that a guard pleaded guilty to blowing up a hi-tech US government laboratory while cooking meth. The Breaking Bad plot was fabricated or staged by the CIA in order to set the precedent for a domestic attack on a laboratory of the U.S. government, most likely the CDC. Needless to say, these reports, taken collectively, confirm that a state-sponsored terror attack involving a bio-chemical agent is imminent.

BIO chEMICAL ISIS

Bio-Chemical Releases Trending
Prior to a high-profile bio-chemical-related terror attack, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, bio-chemical releases are now at an all-time high which suggests that a state-sponsored bio-chemical attack/release is imminent. Lastly, in order to raise the notion of a chemical spill/release just prior to another transpiring in reality, it was reported on August 19, 2015, that the last of 6 company officials charged in West Virginia Chemical Spill plead guilty.

Bio I

Novichok Agent Attack?
As depicted in the Bio-Terror Bible, a state-sponsored bio-terror attack will likely involve the agents known as Anthrax (Bacillus anthracis) and/or Smallpox (Variola major) which will be released into a controlled environment during a false-flag terror attack. That being said, it now appears that the Novichok Agent, “the most deadly nerve agents ever made”, will be the actual pathogen dispersed in the attack. In other words, Novichok will be released but the media will blame Anthrax or Smallpox. This would be done in part because both Anthrax and Smallpox need direct and sustained contact with a potential host before they become infected or die, whereas Novichok (although not contagious) is “five to eight times more potent than VX”. Novichok, which belong to the “fourth generation chemical weapons“, can be “dispersed in an ultra-fine powder instead of a gas or a vapor”, making it the perfect bio-chemical cover for an alleged Anthrax or Smallpox attack. After being infected, Novichok increases neuromuscular junctions, causing involuntary contractions of all muscles. This subsequently leads to respiratory and cardiac arrest and finally death. Once photos and video of people squirming and convulsing on the ground hits social media, a majority of the public will stand in line for a vaccine that will predictably be laced with Anthrax, causing a majority of those vaccinated to perish.

ISIS Bio Chemical

ISIS Bio-Terror Attack
Plan “B” in the ISIS endgame is a bio-chemical terror attack that spawns the global pandemic planned for 2015. In order to create the necessary terror narrative in the media that ISIS is capable of executing such an attack, the CIA in Switzerland has disseminated numerous propaganda reports essentially stating as much. After all, ISIS was specifically created as political cover so that the CIA can execute an Islamic bio-chemical attack. This ISIS-bio-terror narrative was first identified back on June 19, 2014, when ISIS reportedly stormed a Saddam-era chemical weapons complex in Iraq. Roughly 3-weeks later on July 8, 2014, it was reported that “abandoned” barrels containing deadly sarin were seized by ISIS in rebel-held Syria. Less than 24-hours later on July 9, 2014, Iraq reportedly lost control of a chemical weapons depot to ISIS. Never mind that back on March 31, 2005, “The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction” reported that the intelligence community was “dead wrong” in its assessments of Iraq’s weapons of mass destruction capabilities prior to the U.S. military invasion. In other words, there were no WMDs in Iraq but ISIS located two bio-chemical weapon depots inside Iraq within 27 days. The ISIS-bio-terror endgame was confirmed yet again on August 28, 2014, when it was revealed that a black ISIS laptop containing instructions on how to weaponize the bubonic plague was found. Roughly a month later on September 24, 2014, it was revealed that an ISIS terror cell was busted by Swiss authorities in March of 2014. The shocking report was published roughly 3-months before ISIS officially declared the formation of a Caliphate on June 29, 2014, which suggests that it was pre-dated. In other words, the report was likely fabricated at a later date in order to better sell the ISIS terror narrative. According to the Swiss Federal Prosecutor, the ISIS terrorists were suspected of “misuse of explosives and toxic gases with criminal intent”. Roughly a month later on October 30, 2014, Spanish Intelligence reportedly intercepted an ISIS plot to weaponize Ebola, confirming that an ISIS-related bio-terror attack is imminent. Roughly 5-months later on March 12, 2015, it was reported that ISIS is now “using chlorine gas” in roadside bombs. Three days later on March 15, 2015, it was reported that Iraqi Kurds confirmed that ISIS has used chemical weapons against their troops. Roughly a week later on March 23, 2015, it was reported that ISIS was “highly likely” to launch a chlorine gas attack on the London Underground. The notion of a Syrian-based bio-chemical attack occurring on live TV during a sporting event was recently foreshadowed by CNN in an April 20, 2015, report entitled “Syrian Gas Attack Shown on American TV”. Ten days later on April 30, 2015, the Syrian Rebels (i.e., ISIS) reportedly launched another chemical attack in Syria, setting the precedent for a far deadlier ISIS-related bio-terror attack in the West. A week later on May 7, 2015, Fox News published a report entitled “Assad Using Chemical Weapons Again? US Eyes New Allegations”, further highlighting the use of Syrian-based bio-chemical weapons just prior to a state-sponsored bio-terror attack. Roughly a month later on June 6, 2015, the Australian government stated that ISIS may have potential to ‘build chemical weapons’, further foreshadowing an ISIS-related bio-chemical attack. Lastly, on July 1, 2015, the Washington Times published a report entitled “U.S. Unprepared for Chemical Attack as Islamic State Nears Syria’s Stockpile”, confirming, albeit in a de facto manner, that a Syrian-based bio-chemical attack is imminent. These reports, taken collectively, confirm that the entire ISIS-bio-terror narrative has been fabricated by the CIA in Switzerland in order to provide the necessary cover for a state-sponsored bio-chemical attack.

Waco Siege

Waco Siege Redux
In the event that the Iowa State Capitol building suffers a state-sponsored coup, it will most likely be a redux of the Waco Siege which lasted from February 28, 1993 until April 19, 1993. The state-sponsored made-for-TV siege of the Branch Davidians’ compound which left 82 dead, most of which were women and children. A total of 4 ATF agents were also killed by “friendly fire” during the attack. The impending siege is designed to bait scores of so-called patriots to the Bundy Ranch in Nevada were they will be double-crossed by the CIA-funded Bundy Ranch Militia who is openly at war with the U.S. government. The dead will then be used as poster boys for a new civil war in America. It is imperative to note that CIA operative Cliven Bundy was specifically chosen because his name invokes the likeness of Ted Bundy, possibly the most notorious serial killer in history. Consequently, it can be deduced that the Bundy Ranch Militia will be implicated in serial domestic terror attacks. In what appears to be a CIA-spawned propaganda report designed to highlight the Waco Siege just prior to a redux-like attack, SPIN magazine published a report on November 6, 2015, entitled “God Rocks: SPIN’s 1993 Feature on the Siege in Waco, Texas”. That being said, the Bundy Ranch Militia may execute an attack on U.S. government-related entities such as the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), the United States Bureau of Land Management (BLM), and/or the United States Forest Service if and when they try to visit. In the aftermath of a made-for-TV attack on a private or government-related entity, the domestic terrorists affiliated with the Bundy Ranch Standoff on April 5, 2014, will predictably flee to their secret domestic terrorist camp that’s been set up in the desert. The notion of a terrorist training camp within the United States was foreshadowed back on October 16, 2015, when Fox New published a propaganda report entitled “Man Who Plotted to Set Up US Terror Training Camp Sentenced”. A week later on October 23, 2015, FBI director Comey stated that the FBI has over 900 domestic probes about ISIS operatives and other extremists in America. Translation: the FBI has roughly 900 state-sponsored terrorist which they are planning to unleash on the American public. In what appears to be more pre-domestic terror attack propaganda, it was reported on October 24, 2015, that a man arrested in South Carolina after over 7,000 stolen guns were found on his property. Consequently, a gun-related siege by domestic terrorists is imminent. In order to provide a timely motive for a revenge-like attack on the U.S. government, it was also reported on October 24, 2015, that the BLM illegally sold thousands of wild horses for slaughter. The Bundy Ranch Standoff was with the BLM, hence the timely report. A day later on October 25, 2015, USA Today published a report entitled “New York Man Creates ‘Sovereign Nation’ in Utah”. In the aftermath of a high-profile militia-based terror attack, a “sovereign nation” (i.e., terrorist camp) will be formed by terrorists Arizona, Nevada, New Mexico and/or Utah. Lastly, on November 2, 2015, it was reported that an Idaho rancher was shot and killed by deputies. Needless to say, the assassination was likely a blood sacrifice offered up to a successful Waco-like siege of the Bundy Ranch in Nevada.

OKC Bombing Redux
Exactly what type of domestic terror attack is planned the Iowa State Capitol building  is not known, but a domestic Oklahoma City Bombing-like attack with allegedly homemade fertilizer explosives is most likely terror scenario. In order to sell the notion that U.S. government buildings are being targeted just prior to a redux attack, it was reported back on May 20, 2015, that a bomb threat prompted the evacuation of 2 federal buildings in Los Angeles, California. In order to further program the American public for an Oklahoma City Bombing-like attack, it was reported on July 28, 2015, that an Iowa father and son died from manure pit fumes. Needless to say, the men were likely assassinated in order to sell the fraudulent notion of the fertilizer bomb. Lastly, in order to foreshow the notion of a building collapse due to well-placed demolition explosives, USA Today published a report on August 29, 2015, entitled “Watch: 170 Detonations Take Down Denver Building”. Needless to say, these reports, taken collectively, suggest that a state-sponsored Oklahoma City Bombing-like attack is imminent.

DHS Right Wing Attack Map

Domestic Terror Trending
In order to create the necessary media narrative for domestic terror attacks in America, a DHS intelligence report warning of a domestic right-wing terror threat was released on February 19, 2015. The shocking report stated that right-wing sovereign citizen extremists who “reject government authority” are now carrying out sporadic terror attacks on police and have “threatened attacks on government buildings”. The domestic terror attack map released by DHS coincidentally included alleged attacks in both Arizona and Nevada. Roughly 2-months later on April 16, 2015, USA Today published a report entitled “Meeting McVeigh: Given the Opportunity to Express Remorse, He Offered None at All”. Although McVeigh has been dead since 2001, the report was designed to infer that: a) he is alive; and b) he would execute the bombing again if he could, foreshadowing a redux attack. Two days later on April 18, 2015, CNN published a report entitled “Today’s Most-Wanted Domestic Terrorists”, highlighting the notion that even today, domestic terrorists are alive and well in America. In other words, the U.S. is currently being targeted by domestic terrorists. Lastly, on the morning of April 19, 2015, CNN published a report entitled “Homegrown Extremist Threat Remains 20 Years after Oklahoma City Bombing”, confirming, albeit in a de facto manner, that America is still under the threat of state-sponsored domestic terror.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

venezuala.jpg

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

SHOCK: 10 Reasons Why the Paris Terror Attacks Were Executed by the CIA

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
July 27, 2016
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is plotting a wave of state-sponsored terror attacks in Venezuela. Said attack will likely be executed by Special Forces and blamed on drug cartels, Islamic terrorists and/or Syrian refugees.

Exactly what type of terror is planned for Venezuela is not known, but its largest oil reserves in the world are the most likely target. In the aftermath of oil-related attacks, Russia and their ally Venezuela will blame the U.S., likely leading to a future conflict with Russia, possibly in South America.

In order to provide a timely motive for so-called Islamic terror attacks in Venezuela by oil-producing countries in the Middle East, the Wall Street Journal published a report on October 28, 2015, entitled “Gulf Countries Oppose Venezuela’s Oil-Price Summit Proposal”.

The notion that U.S. Special Forces will be executing attacks in Venezuela was foreshadowed in a November 19, 2015, report entitled “US State Department: ‘No Interest’ in Destabilizing Venezuela”, confirming, albeit in a de facto manner, that destabilization is imminent.

In what appears to be an ominous sign of Russian influence in South America to come, Venezuelan President Nicolas Maduro and Vladimir Putin Discuss met in Tehran, Iran to discuss “oil prices” on Monday, November 23, 2015.

The notion that world oil prices will fluctuate greatly in the aftermath of oil-related attacks in Venezuela was foreshadowed by a Russia Today report from November 23, 2015, entitled “Venezuela Warns OPEC of Oil Price Drop to Mid-$20s”.

That same day, November 23, 2015, Sputnik News published a report entitled “Venezuela Supports Russian Efforts to Stabilize Middle East”, confirming that Venezuela and Russia will be collaborating together in the near future.

A day later on November 24, 2015, Counter Punch published a report entitled “NSA Spies on Venezuela’s Oil Company”, further foreshadowing that the United States is targeting Venezuelan oil interests just prior to a wave of state-sponsored oil-related terror attacks.

Back on March 9, 2015, the U.S. declared Venezuela a national security threat, suggesting, albeit in a de facto manner, that Venezuela may be plotting an attack on Americans or American interests in South America such as oil companies.

Four days later on March 13, 2015, Venezuelan President Maduro stated that he may go to U.S. and challenge Obama, suggesting that there is an ongoing rivalry between the two leaders that may translate into an international scandal, especially in the aftermath of oil-related terror attacks.

Two days later on March 15, 2015, the country of Venezuela executed military exercises which reportedly involved 100,000 soldiers, shoulder-fired missiles, fighter planes and armored trucks, all of which could be used in a full-scale attack on the U.S. military of American oil companies in the region.

Lastly, in order to foreshadow the notion that the Venezuelan government may be planning an attack on U.S. interests, it was reported on March 17, 2015, that Fidel Castro warned that Venezuela is ready to confront America, a notion which may manifest itself in the near future.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

Pope Francis Assassination

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

SHOCK: 10 Reasons Why the Paris Terror Attacks Were Executed by the CIA

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
July 27, 2016
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is plotting an attack in Italy, namely Vatican City. The impending attack will likely end with the assassination of Pope Francis who’s been rumored to have a brain tumor since returning from America unscathed.

Exactly what type of terror is planned for Vatican City and Pope Francis is not known, but a future terror scenario in which Islamic terrorists storm the gates of Vatican City and hold Francis and other clergy members hostage is the most likely terror scenarios. In time, Francis will likely be beheaded on live TV.

Back on January 13, 2015, Patheos published a report entitled “Is Pope Francis Safe from Terrorists?” which revealed that Francis has spoken out against ISIS, namely their “unjust aggression” and “deviant forms of religion”. The comments were designed to provide a timely motive for an ISIS-inspired revenge attack on the Pope.

The notion that ISIS is targeting Pope Francis was further confirmed on March 15, 2015, when an ISIS assassination plot targeting Francis was allegedly foiled. In response to the state-sponsored terror plot, Francis reportedly stated, “Please make it painless”.

A month later on April 24, 2015, it was revealed that Islamic terrorists from Pakistan planned a terror attack on Vatican City. Although the attack was allegedly planned for 2010, its highly suspicious disclosure in 2015 was evidently designed to set the precedent for an Islamic terror attack on the Vatican this year.

Roughly 3-months later on June 6, 2015, an ISIS video reportedly called for jihad in the Balkans ahead of the Pope Francis’ visit. Consequently, a state-sponsored Islamic terror attack on the Pope and/or his residence in Vatican City may now be in order.

Roughly 3-months later on September 13, 2015, the U.S. government reportedly thwarted a terror plot involving an attack on Francis. The incident was fabricated in order to set the precedent for a real-world attack on the Francis and/or Vatican City.

The notion that Vatican City is being targeted for attack was witnessed on October 31, 2015, when hackers targeted a Vatican accountant’s computer. Needless to say, the hack was fabricated by the CIA in order to set the precedent for a real-world attack on Vatican City.

Two days later on November 2, 2015, it was reported that the Vatican arrested 2 people accused of leaking documents. The document leak was likely fabricated or staged by the CIA in order to show that the Vatican security is weak and vulnerable to attack just prior to a horrific false-flag attack.

In order to draw unprecedented global media attention to the aforementioned leak, the Vatican reportedly arrested a senior priest and adviser over the alleged leaks on November 2, 2015. Since the Vatican is charged with policing itself, it can be deduced that the arrests were staged for public consumption.

A day later on November 3, 2015, Yahoo New published a report entitled “Exclusive: Vatican Inspectors Suspect Key Office was Used for Money Laundering”. Needless to say, the shocking report was designed to make the Vatican appear criminal in nature just prior to a state-sponsored terror attack.

Lastly, on November 4, 2015, it was reported that Trevi Fountain in Rome was once again functional after undergoing a 17-month $2.2 million renovation. The Trevi Fountain is located roughly 1.86 miles (3 kilometers) from the gates of Vatican City.

Whether the timely renovation of Trevi Fountain provided the necessary cover for the installation of weapons and/or explosives around the iconic fountain is not known, but it’s highly likely. Said weapons and/or explosives could be utilized at a later date in a coordinated state-sponsored terror attack.

Pope Francis

Pope Francis Elected to be Assassinated
When Pope Joseph Aloisius Ratzinger (Pope Benedict XVI) inexplicable resigned back on February 28, 2013, he paved the way for the election of Pope Francis (Jorge Mario Bergoglio) on March 13, 2013. Since then, the CIA-run media has built up Francis as a champion of the people, as well as a rebel against the historically conservative Catholic Church. This was premeditatively done in order to: a) popularize the Catholic Church which has become a relic, and b) make the impending assassination of Pope Francis an international tragedy designed to demonize America, namely her gun owners which will likely be scapegoated for the death of Francis. Despite the fact that Francis is a Jesuit (i.e., member of the Society of Jesus), his coat of arms contains the “ǂ” symbol (i.e., the letter “F) which was derived from the Wheel of Fortuna. The “ǂ” symbol (i.e., the Patriarchal cross) is representative of the “double-cross” (i.e., backstab) which is indicative of Greco-Roman behavior as evidenced by the Rome adage, “By deception, thou shalt do war”. Consequently, Pope Francis will be double-crossed by the CIA at some point in the near future, likely leading to his death.

Pope

FLASHBACK: Pope Francis Assassination Foiled
Back on January 14, 2015, Truther.org published a report entitled “Terror/Stampede Alert for Philippines During Pope Francis’ Visit” in respect to the Catholic leader’s visit to the Philippines on January 15-19, 2015. Predictably, three days later on January 17, 2015, a so-called volunteer mysteriously died in an accident after the Pope’s mass in the Philippines. Although only conjecture, it appears that the man privy to first-hand knowledge of the foiled terror plot. Less than 24-hours later on January 18, 2015, the country of Indonesia reportedly executed 6 men for drug-related offenses. These men were likely the slated terrorists who planned to carry out the attack on Pope Francis. This notion is corroborated by the fact that on February 10, 2015, members of the Indonesian-based terror group Jemaah Islamiyah were arrested in a plot to bomb Pope Francis while he was in the Philippines.

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss

ISIS Pope Italy

AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.

SHOCK: 10 Reasons Why the Paris Terror Attacks Were Executed by the CIA

ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks

BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland

RED ALERT: 10 Reasons Why Switzerland is Home to the CIA

David Chase Taylor
July 27, 2016
Truther.org

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is plotting a wave of ISIS, asylum seeker and/or refugee-related terror in the Southern European countries of Italy and/or Vatican City, most likely this week.

In what appears to be the latest terror target, it was reported on July 12, 2016, that scores of illegal refugees are now massing near a rail way station by Lake Como in Northern Italy. In order to draw unprecedented media attention to the camp just prior to an attack , it was reported that the camp is near George Clooney’s house which is nowhere near a tran station.

The  impending attacks will be used to: a) revoke or repeal the Schengen Agreement which allows free travel through Europe, namely in Switzerland; and/or b) revoke or repeal the Dublin Regulation which governs asylum law in Europe.

Exactly what type of terror is planned for Italy is not known, but domestic, Islamic and/or Neo-Nazi-related attacks on asylum seekers/refugees, terror attacks by Islamic terrorists posing as asylum seekers/refugees, and/or made-for-TV riots resulting in mass death due to fire now appears imminent.

Exactly where the aforementioned attacks and riots will transpire is not known, but asylum seeker/refugee-related apartment buildings, buses, camps, government offices, housing, immigration centers and tents are the most likely to suffer a state-sponsored attack.

That being said, Italian airports, landmarks, nuclear reactors, trains, train stations, theaters and schools may also suffer attacks by Islamic terrorists posing as asylum seekers and/or refugees. Consequently, beheadings, firebombings, gun-related massacres and/or suicide bombings may be imminent.

In order to foreshadow an attack on Italy and/or Vatican City, it was reported on November 18, 2015, that even Vatican City is searching nuns after the Paris Terror Attacks. Consequently, an ISIS-inspired attacks in Italy, Sardinia, Sicily, and/or Vatican City is likely in order.

In order to provide a timely motive for false-flag attacks on asylum seekers and refugees in Europe, the Associate Press (AP) published a report back on November 5, 2015, entitled “EU Predicts 3 Million Migrants Could Arrive by End 2016”.

Lastly, in order to foreshadow Islamic terror in Europe just prior to its fruition in reality, it was also reported on November 12, 2015, that 17 people were arrested in Europe as part of a “jihadist network”, just hours before the Paris Terror Attacks were executed by the CIA.

ISIS Terror in Italy
The notion that ISIS is now targeting Italy was first identified back on March 15, 2015, when an ISIS assassination plot targeting Pope Francis was allegedly foiled. In response to this state-sponsored terror plot, Francis reportedly stated, “please make it painless”. Roughly a month later on April 24, 2015, it was reported that Islamic terrorists from Pakistan planned a terror attack on Vatican City. According to reports, attack on the Vatican was planned for 2010, setting a timely precedent for an ISIS-related attack on the Italy. Four days later on April 28, 2015, ISIS supporters claimed via Twitter pics that they were in Italy’s streets, a report designed to show that Italian security has now been breached. Roughly 3-weeks later on May 17, 2015, ISIS reportedly posted photos of famous Italian landmarks warning of a countdown ’till the zero hour’, an apparent reference to when the impending attacks will take place. Less than 24-hours later on May 18, 2015: ISIS reportedly announced Caliphate plans for Italy by posting chilling images on social media. Roughly a month later on June 4, 2015, it was reported that a gladiator school will be restored in Rome with a donation from Kuwait. The timely report was evidently designed to foreshadow beheading–like attacks in Italy by Islamic terrorists. Lastly, 2-days later on June 6, 2015, an ‘ISIS video’ reportedly called for jihad in the Balkans ahead of Pope’s visit. The propaganda report was designed to associate ISIS with the Pope (and thereby Italy) just prior to ISIS-related attacks in Italy.

bombs-620801.jpg

European Bio-Attack Imminent
Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is plotting a wave of bio-terror attacks in Europe which will predictably be blamed on the state-sponsored terror group known as ISIS. As depicted in the May 25, 2015, Truther.org report entitled “ISIS ENDGAME: How and Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks”, ISIS was specifically created in order to turn the world upside down in the aftermath of revelations that Switzerland is home to the CIA. Therefore, the impending bio-chemical attacks will be executed in part in order to revoke the Dublin Regulation which governs asylum law in Europe, namely Switzerland. Consequently, some of the alleged bio-terrorists will predictably be asylum seekers and/or refugees from the Middle East. As foretold in the Bio-Terror Bible, the genesis of the 2015 bio-terror pandemic will be a “made-for-TV event”whereby millions will witness the bio-terror outbreak in person or on live television. Consequently, bright orange, red, green or yellow colored gas will be used in the bio-attack. The staged bio-terror “event” will likely occur when the agents known as anthrax (Bacillus anthracis) and/or smallpox (Variola major) are allegedly released by terrorists into a controlled environment such as subway, train, or train station. That being said, the CIA may stage a 9/11-style bio-terror attack in Europe via Malaysian Airlines Flight MH370 which was specifically hijacked by CIA on March 8, 2014, in order to execute a surprise WMD attack. Consequently, skyscrapers, sporting events and landmarks may suffer a bio-terror attack. The notion that the CIA is plotting a bio-chemical attack in Europe was first identified back on June 26, 2015, when a man was reportedly beheaded at a gas factory in France. The incident was staged in order to associate “gas” with Islamic terrorists just prior to an ISIS-inspired bio-chemical attack in Europe. Roughly 5-months later on November 19, 2015, it was reported that an ISIS terror branch is now seeking to produce chemical weapons. The timely report from U.S. and Iraqi intelligence was designed sell the notion that ISIS is planning a far more deadly attack, namely in Europe. Coincidentally, a day later on November 20, 2015, French Prime Minister Manuel Valls warned that ISIS could be planning a bio-terror attack, stating that “We must not rule anything out…But we know and bear in mind that there is also a risk of chemical or bacteriological weapons“. Translation: the CIA is now plotting state-sponsored bio-chemical terror attacks in France which will be executed under the ongoing state of emergency which was declared in the aftermath of the state-sponsored Paris Terror Attacks on November 13, 2015. Coincidentally, a day later on November 21, 2015, it was reported that chemicals and explosives found in terror raid in Brussels, Belgium, confirming, albeit in a de facto manner, that a state-sponsored bio-terror attack in Europe is now imminent. In what appears to be pre-French bio-terror attack programming, it was reported on November 23, 2015, that protective bio-hazard suits were stolen from a hospital in Paris. Post-bio-terror attack, it will predictably be said that the suits were stolen by Islamic terrorists in order to produced and handle bio-chemical weapons. In order to psychologically prepare Europe for the impending bio-attack, it was reported on November 26, 2015, that white powder which was found at a Brussels mosque turned out to be flour. Needless to say, the anthrax scare was orchestrated by the CIA in order to foreshadow an Islamic bio-terror attack in Europe. In the aftermath of an unprecedented ISIS-inspired bio-terror attack and subsequent pandemic that culls tens of millions, it will said that the bio-chemical weapons emanated from Syria. Said weapons will have been transported out of Syria by ISIS who is openly being funded by the Obama administrationunder the guise of the Syrian Rebels. Lastly, on December 14, 2015, it was reported that 2 Syrian terrorists were arrested in Geneva on suspicion of the “manufacture, concealment and transport of explosives or toxic gases, as well as on suspicion of violating the prohibition of groups such as al Qaida, ISIS and similar organizations”. Consequently, it can be deduced that bio-attacks in Switzerland and/or Europe are imminent.

ISIS Vatican City

Vatican Attack
Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is plotting an attack in Italy, namely Vatican City. Said attack will likely end with the assassination of Pope Francis who’s been rumored to have a brain tumor since returning from America unscathed. Exactly what type of terror is planned for Vatican City and Pope Francis is not known, but a future terror scenario in which Islamic terrorists storm the gates of Vatican City and hold Francis and other clergy members hostage is the most likely terror scenarios. In time, Francis will likely be beheaded on live TV. Back on January 13, 2015, Patheos published a report entitled “Is Pope Francis Safe from Terrorists?” which revealed that Francis has spoken out against ISIS, namely their “unjust aggression” and “deviant forms of religion”. The comments were designed to provide a timely motive for an ISIS-inspired revenge attack on the Pope. The notion that ISIS is targeting Pope Francis was further confirmed on March 15, 2015, when an ISIS assassination plot targeting Francis was allegedly foiled. In response to the state-sponsored terror plot, Francis reportedly stated, “Please make it painless”.A month later on April 24, 2015, it was revealed that Islamic terrorists from Pakistan planned a terror attack on Vatican City. Although the attack was allegedly planned for 2010, its highly suspicious disclosure in 2015 was evidently designed to set the precedent for an Islamic terror attack on the Vatican this year. Roughly 3-months later on June 6, 2015, an ISIS video reportedly called for jihad in the Balkans ahead of the Pope Francis’ visit. Consequently, a state-sponsored Islamic terror attack on the Pope and/or his residence in Vatican City may now be in order. Roughly 3-months later on September 13, 2015, the U.S. government reportedly thwarted a terror plot involving an attack on Francis. The incident was fabricated in order to set the precedent for a real-world attack on the Francis and/or Vatican City. The notion that Vatican City is being targeted for attack was witnessed on October 31, 2015, when hackers targeted a Vatican accountant’s computer. Needless to say, the hack was fabricated by the CIA in order to set the precedent for a real-world attack on Vatican City. Two days later on November 2, 2015, it was reported that the Vatican arrested 2 people accused of leaking documents. The document leak was likely fabricated or staged by the CIA in order to show that the Vatican security is weak and vulnerable to attack just prior to a horrific false-flag attack. In order to draw unprecedented global media attention to the aforementioned leak, the Vatican reportedly arrested a senior priest and adviser over the alleged leaks on November 2, 2015. Since the Vatican is charged with policing itself, it can be deduced that the arrests were staged for public consumption. A day later on November 3, 2015, Yahoo New published a report entitled “Exclusive: Vatican Inspectors Suspect Key Office was Used for Money Laundering”. Needless to say, the shocking report was designed to make the Vatican appear criminal in nature just prior to a state-sponsored terror attack. Lastly, on November 4, 2015, it was reported that Trevi Fountain in Rome was once again functional after undergoing a 17-month $2.2 million renovation. The Trevi Fountain is located roughly 1.86 miles (3 kilometers) from the gates of Vatican City. Whether the timely renovation of Trevi Fountain provided the necessary cover for the installation of weapons and/or explosives around the iconic fountain is not known, but it’s highly likely. Said weapons and/or explosives could be utilized at a later date in a coordinated state-sponsored terror attack.

Flight MH370

Flight MH370 Attack on UK
Based on breaking news and events, it appears that the CIA in Switzerland is plotting an attack via Malaysian Airlines Flight MH370 which was specifically hijacked by CIA on March 8, 2014, in order to execute a surprise WMD attack. According to a report dated July 29, 2015, debris found in the Indian Ocean is now being checked to see if it emanated from Flight MH370. The report was evidently designed to draw unprecedented media attention to the hijacked plane just prior to a 9/11-style attack and/or terrorist invasion. Although a USA Today report from August 2, 2015, stated that the debris found on Reunion Island was not from Flight 370, an August 5, 2015, report from Reuters broke the story that Malaysia Airlines has confirmed that airplane parts found on Reunion Island are in fact from Flight MH370. Whether this discovery will stand the test of time is not known, but it’s highly unlikely as it appears to be a hoax. Consequently, a 9/11-style attack and/or an ISIS-related terrorist invasion via Flight MH370 now appears imminent.

David Chase Taylor Swiss Asylum

Motive for Attack
Although any country in Europe could theoretically be targeted, countries bordering Switzerland (i.e., Austria, Germany, France and Italy) are the most likely to suffer an attack. Said attacks are designed to provide a timely motive for draconian changes to European asylum policy, namely in Switzerland. Considering that I, David Chase Taylor officially applied for political asylum in Switzerland on July 17, 2015 and have yet to receive one appointment (a violation of the Dublin Regulation), it now appears that the refugee crisis is being orchestrated by the CIA in order to drastically change Swiss asylum law. In other words, the CIA is flooding Europe with tens of thousands of asylum seekers and refugees as political cover so that they can execute horrific attacks in order to provide a timely motive to revoke the Dublin Regulation so that my pending case for political asylum in Switzerland will never be heard.

Refugee Asylum Attack

Asylum-Related Riot & Fire Attack
Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is plotting a wave of horrific riots that will result in the death of hundreds of asylum seekers and refuges in Europe, most likely due to an arson-related fire. Said riots will be used as political cover to repeal the Dublin Regulation which governs asylum law in Europe, namely Switzerland. Prior to a high-profile and deadly riot and subsequent fire, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, riot and fire-related refugee-related violence is now at an all-time high which suggests that a state-sponsored riot involving asylum seekers and refugees is imminent.

Asylum-Related Riots & Fire Headlines:

1. September 28, 2015: Sixty hurt in mass brawl over food at German refugee camp
2. October 1, 2015: A refugee riot puts a German town on edge
3. October 22, 2015: UK Migrants torch tents and take selfies of carnage in protest
4. November 2, 2015: Neo-Nazis terrorize asylum seekers with firebombs in chilling attack
5. November 6, 2015: Hundreds launch hunger strike at immigrant detention center in Adelanto, Calif.
6. November 9, 2015: Riots at Christmas Island detention center after escaped refugee dies
7. November 9, 2015: German Town: Migrants Riot in Church, Steal From Stores, Defecate on Gardens

[Does not purport to be a complete list of asylum-related riot and fire headlines]

Attack on Asylum Seekers & Refugees
Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is plotting a horrific attack on asylum seekers and refuges in Europe. Said attacks will be used as political cover to repeal the Dublin Regulation which governs asylum law in Europe, namely Switzerland. Prior to a high-profile asylum-related terror attacks, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, asylum and refugee-related attacks are now at an all-time high which suggests that a state-sponsored terror attack on asylum seekers and refugees is imminent.

Asylum-Related Attacks in Europe:

1. July 15, 2015: Red Cross staff attacked when setting set up tent camp in Dresden
2. August 16, 2015:
Suspected Right-wing arsonists strike asylum apartment building
3. August 22, 2015:
Protesters in Germany attack refugee buses shouting ‘foreigners out’
4. September 20, 2015: Arson attack destroys future German migration center
5. September 28, 2015: Sixty hurt in mass brawl over food at German refugee camp
6. October 1, 2015: A refugee riot puts a German town on edge
7. October 15, 2015:
Open Borders Activist Brutally Stabbed by Migrant Gang in Germany
8. October 17, 2015:
German mayoral candidate stabbed in the neck ‘over her refugee policy’
9. November 2, 2015: Neo-Nazis terrorize asylum seekers with firebombs in chilling attack in Germany

[Does not purport to be a complete list of asylum-related attacks]

Asyum Seeker Refugee ISIS

Refugee-Related Terror Attack
Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is plotting a wave of Islamic terror attacks in Europe which will be blamed on asylum seekers and refuges in Europe. Said attacks will be used as political cover to repeal the Dublin Regulation which governs asylum law in Europe, namely Switzerland. In what appears to be pre-refugee terror propaganda for Europe, it was reported on September 1, 2015, that ISIS terrorists were caught at a European border crossing posing as refugees. According to reports, 5 men posing as refugees attempted to cross the Bulgarian-Macedonian border with ISIS beheading propaganda on their cell phones. Coincidentally, less than a week prior on August 25, 2015, it was reported that 160 U.S. Marines arrived in Bulgaria for so-called regular training with NATO allies. Although only conjecture, it’s highly likely that the so-called 5 ISIS terrorists were in fact U.S. Marines posing as terrorists. Consequently, the remaining 155 U.S. Marines will likely be responsible for executing ISIS-inspired and/or Neo-Nazi attacks, most likely against asylum seeker and refugees. Said Marines may also travel via train to other parts of Europe in order to execute terror attacks, namely in Germany.

Refugee-Related Terror Imminent

Prior to high-profile Islamic refugee-related terror attacks, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced headlines associating refugees with terrorism is now at an all-time high which suggests that a state-sponsored Islamic terror attacks allegedly committed by asylum seekers and/or refugees is imminent.

Refugee-Terror Headlines:

1. September 1, 2015: Islamic State Terrorists Caught Crossing Into Europe Posing As Refugees
2. September 10, 2015: French Security Detects ISIS Terrorist in Refugee Camp
3. September 12, 2015: Europe Flooded With Reports Of “ISIS Terrorists” Posing As Refugees
4. September 18, 2015: Radical Islamists Recruit Refugees in Germany
5. September 21, 2015: Syrian refugee in Germany tells other migrants that he killed for ISIS
6. September 22, 2015:
German intelligence ‘concerned’ Islamists recruiting refugees
7. September 26, 2015: 1 in 3 ‘Syrian’ refugees have fake IDs, German authorities admit
8. September 29, 2015: Obama Gave Over 1,500 Terrorists Asylum in US, Documents Reveal
9. October 1, 2015:
U.S. Refugee Chief Didn’t Know Boston Bombers Were Refugees
10. October 21, 2015: Security officials acknowledge ‘risk’ in admitting Syrian refugees into US
11. October 30, 2015: Thousands of Muslim migrants ‘disappear’ from camps in Germany

[Does not purport to be a complete list of asylum-related terror incidents]

Neo-Nazi

Neo-Nazi Terror
Prior to a horrific Neo-Nazi-related terror attack on asylum seekers and/or refugees in Europe, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. The impending attacks will most likely be executed by Special Forces (i.e., professional terrorists) dressed up like Neo-Nazis. In what appears to be pre-Nazi terror attack programming, Fox News published a report back on July 15, 2015, entitled “‘Accountant of Auschwitz’, 94, Convicted of 300,000 Counts of Accessory to Murder”. The report was designed to raise the profile of Nazis just prior to Nazi-based atrocities in Germany. Three days later on July 18, 2015, CNN published a report entitled “UK Newspaper Publishes Footage of Queen Giving Nazi Salute as Child”. The report was evidently designed to raise the profile of European Nazis just prior to a Neo-Nazi attack. Nine days later on 2015, the Mirror published a report entitled “Most Wanted: Nazi Hunters Name Top Five War Criminals who are Still Alive”, further raising the profiles of Nazis just prior to a state-sponsored Neo-Nazi attack. The report was also designed to make the likelihood of a Nazi-related terror attack seem all the more plausible. That same day, July 27, 2015, Forward published a report entitled “Son of Nazi War Criminal Defaced Jewish Cemetery”, foreshadowing that relatives of former Nazis may be implicated in upcoming terror attacks. In order to link Neo-Nazis with refugees just prior to a state-sponsored Neo-Nazi attack, it was reported on September 8, 2015, that a German punk rock band’s anti-Nazi/pro-refugee song has reached the top of the charts. Four days later on September 12, 2015, Russia Today published a report entitled “Former Nazi Concentration Camp Buchenwald Becomes Home to…Refugees?”, further associating Nazis with refugees just prior to a false-flag attack. Roughly 2-weeks later on October 1, 2015, it was reported that attacks on Jews in Germany has now rises to a 5-year high, more than any country in Europe. The timely propaganda report was designed to highlight Neo-Nazis just prior to a state-sponsored terror attack on asylum seekers and refugees. Needless to say, these headlines, taken collectively, suggest that a state-sponsored Neo-Nazi attack on asylum seekers, immigrants and/or refugees in Europe is imminent.

Nazi Asylum Seeker-Refugee Timeline:

1. September 8, 2015: Punk band’s anti-Nazi song reaches top of German charts
2. September 12, 2015: Former Nazi concentration camp Buchenwald becomes home to… refugees?
3. October 21, 2015: Neo-Nazis infiltrate German refugee shelters amid far-Right resurgence
4. November 2, 2015: Neo-Nazis terrorize asylum seekers with firebombs in chilling attack
5. November 9, 2015: Residents who criticize behavior of asylum seekers labeled “Nazis”

[Does not purport to be a complete list of asylum-related Nazi headlines]

About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.

READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland

Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

0001 SAFDCT
customLogo.gif
truther-rss