Over the years I have heard rumours of Chinese purchase of large tracts of land along the American West Coast but have not paid much attention. Now, however, I wonder. Please let me know what you think of this analysis of world events. I found that there is a lot of information out there on conflicts being brewed over in the Orient and this article puts a new slant on things. The wars in Africa have been to a large extent proxy wars against China in regards to resources and power after all.
Ooops, this may damage my credibility, but it seems to me, about ten years ago, the infamous AJ was warning about a Chinese invasion.
Make no mistake about it ~China is fully under Zionist controland do ONLY do as they are told.
Remember, American factories and military technology did not just “accidentally” make its way to China; the transfer of power from the U.S. to China has been a long standing program headed by the likes of Henry Kissinger.
Ultimately, it’s a win, win, win, for the Zionists for they get to kill off their political opposition (U.S. military, patriots, gun owners, conservatives, etc.),get rich off war contracts,and their crimes against humanity will once again be hidden in the wake of terrifying nuclear attacks.
Although a Chinese attack on America could come at any time, a “Live TV” cyber-hijack and nuclear detonation will most likely occur on July 4th, 2013, America’s 237th birthday. Prior to a high-profile nuclear detonation on the 4th of July, the American public must be psychologically prepared to accept that this is in fact possible.
As witnessed prior to the 9/11 Attacks, 2011 Super Bowl Nuke Plot (4:12 in video) and the recent Boston Bombings, Hollywood foreshadowing aka predictive programming has become standard operating procedure; the “Live TV” cyber-hijack and nuclear attack is no different.
Prior to a high-profile Asian based Pacific coast attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines.
Due to the 30-60 second nature of a nuclear explosion, venues such as the NFL Super Bowl, FIFA World Cup, NBA Finals, MLB World Series and the Olympic Games are optimal targets for nuclear terror mainly due to the potentially hundreds of millions watching on “Live TV”.
Prior to a high-profile “Live TV” cyber-hijack and subsequent nuclear detonation, the public must be psychologically prepared to accept that this is in fact possible. Zionist media and Hollywood movie propaganda is a slick way of showing that yes, it can happen.
EMERGENCY “NUCLEAR TERROR” MEETINGS
Just 6 days prior to the planned nuclear attack at Super Bowl XLV, then U.S. Secretary of State Hillary Clinton called an historic first of its kind ambassadors meeting in Washington D.C., which lasted from January 31, 2011, until February 4, 2011. The meeting was so important to matters of state that ambassadors from all 260 U.S. embassies and consulates in more than 180 countries were ordered present.
Aside from giving government officials plausible deniability in the aftermath of a nuclear attack,these nuclear “prep” meetings are used by the Zionist establishmentto instruct their minions on the policies and procedures they will need to adhere toas the world officially enters the terrifying age of nuclear terrorism.
Despite the growing evidence that nuclear bombs are not exactly what they are cracked up to be, U.S. President Barack “O-bomb-a”, real name Barry Soetoro, is the anointed nuclear president.
Therefore, until Obama is ousted from public office,
the world will be under the threat
of state-sponsored nuclear terrorism.
1. February 6, 2011: Super Bowl XLV Nuclear Terror Plot (Dallas, Texas)
2. December 31, 2011: New Year’s Eve Times Square Dirty Bomb Plot (New York City, New York)
3. April 18, 2013: U.N. Dirty Bomb And U.S. Nuclear Reactor Attack Plot (New York City & Pennsylvania)
4. July ? 2013: “Live TV” Cyber-Hijack And Nuke Attack Plot (Unknown)
A “Live TV” cyber-hijack may be the moment when the world finds out that the government funded cyber-hacking terror group known as “Anonymous” is in fact the cover for a Chinese military hacking operation.
In order to get the most “bang for their buck”, no pun intended, a nuclear detonation must be photographed and videotaped from all different angles in order to be more vividly terrorizing. As seen just prior to the foiled Super Bowl XLV nuclear terror plot on February 6th, 2011, NASA’s “Discovery” shuttle took off on its last mission on February 3rd, 2011, to “document the event”.
The horrific smog currently engulfing Singapore and Indonesia is apparently a beta-test for the upcoming nuclear detonation and its subsequent fallout. A major beta-test is needed to see how people respond to a massive change in their environment.
After a nuclear detonation in Seattle, for example, expect to see Singapore-type smog all over the Pacific west coast due to “nuclear fallout”.
As witnessed just prior to the Super Bowl XLV nuclear terror plot on February 6th, 2011, both alleged STRATFOR intelligence operative Alex Jones and Texas Governor Rick Perry were caught acting quite suspicious in preparation for the “big event” and the bloody revolution that was slated to follow.
UPDATE:In the wake of this Truther.org terror warning, the opening day of the “hotly anticipated” special legislative session lasted only 30 minutes as the Texas Senate inexplicably voted to recess until July 9th, 2013. Curiously, Alex Jones was also a no-show on his radio program of July 1st, 2013.
1. November 29, 2012: Nuclear Christmas, False Flag In America To Blame On Iran (Press TV)
2. January 22, 2013: Indian Police Warn Kashmir Residents Of Possible Nuclear Attack (Fox News)
3. February 19, 2013: Fmr. CIA Official: Cyber War ‘More Sinister Than Nuclear Age’ (CNN)
4. February 25, 2013: Radiation Panic Grips Mumbai (WSJ)
5. March 15, 2013: Dirty Bomb Material Secured In Philadelphia (Fox News)
6. March 15, 2013: Feds Swarm Metro Train After Detecting Nuclear Risk (CBS News)
7. April 9, 2013: Russia Conducts Topol Nuclear ICBM Drills (RIAN)
8. April 13, 2013: DOE Finalizing Plans To Dump Uranium Out West (Fox News
9. April 16, 2013: Era Of Atomic Bombs Over: President Ahmadinejad (Press TV)
10. April 17, 2013: Zionists Warm Up To Wage Nuclear Wars Across Mideast (Press TV)
11. April 18, 2013: After Petition, Atomic Bomb Re-Enactment Dropped From Ohio Air Show (Fox News)
12. April 18, 2013: ‘Like A Nuclear Bomb’: Deadly Fertilizer Plant Blast Devastates Texas Town (CNN)
13. April 22, 2013: China: Cyber attacks Are Like Nuclear Bombs (WSJ)
14. June 3, 2013: China, India, Pakistan Boost Nuclear Arsenals (France 24)
15. June 24, 2013. World Worried About Nuclear Terrorism, But Little Action At Talks (Reuters)
16. June 25, 2013: From Benghazi To Nuclear Terrorism (WND)
17. June 29, 2013: Survivors Of World War II Atomic Bombings To Be Tested (Fox News)
Prior to a major “Live TV” cyber-hijack and subsequent nuke detonation, the public must be psychologically programed that this is in fact possible. Starting in February of 2013, there have been at least 3 major instances whereby media and government affiliated network computers were hacked and their security breached. Taken collectively, these events show an unmistakable trend which indicates that a major media cyber-hijack “event” is imminent.
2. April 14, 2013: ‘Belarusian MTV’ Possibly Hijacked, Ran Porn Videos In Daytime (Minsk, Belarus)
3. June 14, 2013: CBS News Anchorwoman Sharyl Attkisson’s Computer Hacked (New York, New York)
[Does not purport to be a complete list of events]
1.2: TV CUT-OFFS TRENDING
Prior to a numerous TV channels going offline or blank due to an alleged cyber-hijack, the public must be psychologically programmed that this is in fact possible. Starting in May of 2013, there have been at least 3 major instances whereby TV stations and providers have cut certain TV broadcasts and channels or the TV station was shut down altogether. Taken collectively, these events show an unmistakable trend which indicates that a future TV shutdown/blackout due to a cyber-hijack “event” is imminent.
2. May 27, 2013: Iran Pro-Reform Candidate Says State TV Cuts Off His Broadcast (Tehran, Iran)
3. June 14, 2013: EU Broadcast Chief: Turn Greek State TV Channel Back On (Geneva, Switzerland)
4. June 18, 2013: Greek TV Screens Still Blank As Political Dispute Continue (Athens, Greece)
1.3: MEDIA TERROR TRENDING
Prior to a major terror related attack on a media complex, television studio or TV channel, the public must first be psychologically programmed that this is in fact possible. Starting in January of 2012, there has been an unprecedented wave of media related terror attacks, hoaxes and threats which have occurred at in and around various media related entities worldwide. Taken collectively, these events show an unmistakable trend which indicates that a major media related terror “event” is imminent.
2. July 12, 2004: Bomb Threat on TBC Radio station (London, England)
3. September 28, 2004: Man Makes Radio Station Bomb Threat (Dallas, Texas)
4. December 8, 2007: Radio Station Gets Bomb Threat (North Cotabato, Philippines)
5. May 30, 2011: Man Threatens To Bomb TV Station (New York, New York)
6. January 26, 2012: Radio Station Receives Bomb Threat (Jakarta, Indonesia)
7. September 22, 2012: Riot Outside MTV Event In Madrid (Madrid, Spain)
8. September 25, 2012: Radio Stations Evacuated Over Beeping Package (Los Angeles, California)
9. September 30, 2012: Shots Fired In Parking Lot Of BET Awards (Atlanta, Georgia)
10. October 8, 2012: FBI Investigating Suspicious Package At CBS TV Studio (Los Angeles, California)
11. October 17, 2012: NatGeo Bombarded With Terror Threats (Washington D.C.)
12. November 2, 2012: Chemical Bomb Threat At CNN Center (Atlanta, Georgia)
13. November 30, 2012: CBS Radio Building Hit By Gunfire (Dallas, Texas)
14. February 12, 2013: Radio Station Bomb Threat Reported (Melbourne, Australia)
15. March 29, 2013: Man Arrested For Threat To Blow Up TV Station (Niigata, Japan)
16. March 30, 2013: Eiffel Tower Radio Tower Receives Bomb Threat (Paris, France)
17. April 14, 2013: ‘Belarusian MTV’ Possibly Hijacked, Ran Porn Videos In Daytime (Minsk, Belarus)
18. May 4, 2013: CNN Anchor Robbed On Piedmont Avenue (Atlanta, Georgia)
19. May 19, 2013: Man Threatens To Blow Up Studio With Grenade In Live TV Interview (Canes, France)
20. May 27, 2013: Ten NASCAR Fans Injured By Fallen TV Cable (Charlotte, North Carolina)
21. May 27, 2013: TV Correspondent Killed On TV While Covering War Near Lebanon (Dabaa, Syria)
22. June 5, 2013: TV Crew Attacked While Reporting On Shooting Story (Providence, Rhode Island)
23. June 11, 2013: Employees Seize Greek State TV And Radio HQ (Athens, Greece)
24. June 14, 2013: CBS News Anchor Sharyl Attkisson’s Computer Hacked (New York, New York)
25. June 14, 2013: Grenade Hurled At Libyan TV Station In Benghazi (Benghazi., Libya)
26. June 17, 2013: Government Terror Exercise Broadcast Live On TV (Bangalore, India)
27. June 25, 2013: Honduran TV Journalist Kidnapped By Armed Men (San Pedro SulaHonduras)
28. June 29, 2013: Heli TV News Helicopter Crashes, 4 Killed (Bellinzona, Switzerland)
In order to properly gage and predict public response in the wake of an unprecedented action such as a “Live TV” hijack and subsequent nuclear detonation, various beta-tests must be conducted prior to the “event” occurring in reality. These beta-tests set the precedent for a copy-cat attack as well as allow the real terrorists to work out any unforeseen problems that may arise. To date, at least three “live TV” beta-tests have been identified:
In what appears to be the first beta-test for a “Live TV” cyber-hijack to gage public reaction to the activation of the EAS, on February 12th, 2013, it was reported that a Montana TV network and the Emergency Alert System (EAS) had been hacked. The fake EAS warning was transmitted on KRTV during the Steve Wilkos Show in several Montana counties.
According to the report, the TV station quickly pulled the alert off air and apologized both on air and online, but not before the following statement was read on-air:The bodies of the dead are rising from their graves and attacking the living…Do not attempt to approach or apprehend these bodies as they are considered extremely dangerous…Follow the messages on screen that will be updated as information becomes available.”
In what appears to be the second beta-test for a “Live TV” cyber-hijack to gage social media reaction, on April 14th, 2013, it was reported that a Belarusian music TV channel had been hijacked and pornography had been broadcast. According to the report, on Saturday, April 13th, 2013, at about 3:45pm local time, “BelMuzTV”, which is reportedly seen in public places like shopping malls and restaurants, began airing explicit pornographic images featuring full nudity and sexual intercourse which lasted for approximately 10 to 20 minutes.
Reportedly thousands of people throughout the Belarusian capital of Minsk watched the broadcast and began to share their experience on various social networking sites. A rumor then was circulated that a “subversive operation” was executed by the channel’s studio engineer, who entered the control room, loaded the inappropriate content into rotation and then disappeared.In the aftermath of a global “Live TV” cyber-hijack, social networking sites worldwide will be buzzing about having no TV. Eventually, the TV will come back on and billions of people worldwide will collectively witness the nuke attack on “Live TV”.
In what appears to be the third beta-test for a “Live TV” cyber-hijack to gage public reaction to “Live” terrorism, on June 17th, 2013, it was reported that an state-sponsored terror drill was broadcast “Live TV” without the police, TV station or its viewers ever being informed that it was fake.
According to the report, the televised terror drill caused “scaremongering across the city” when four “terrorists” began hovering around their target, the Taj Vivanta Hotel. The terrorists sparked off a major alert which then tipped off TV reporters and by 11.25pm, multiple TV channels had begun flashing images of four terrorists on the loose in the city.
In an ominous warning sign that news related organizations may be hacked by cyber-terrorists in the near future, on April 23rd, 2013, it was reported that news organizations may have to revisit policies on retweeting breaking news and shore up the security of their social-media accounts due to the fallout from the hacking of the Associated Press’ Twitter account which stated that there had been an explosion at the White House. Stephen Ward, director of the Center for Journalism Ethics at the University of Wisconsin-Madison, stated that,
“In light of this, news organizations have to certainly increase security procedures so that they can’t be hacked so easily… (If it was phishing that led to this)…then that is not proper security. They’ve got to review security procedures.”According to Dominic Lasorsa, a journalism professor at the University of Texas, “This is the kind of stuff the media has to deal with today,” he says. “It’s difficult to stay ahead of the hacking community. But our reputation is all we’ve got going for us. News media organizations need to be more savvy about the [security] problem.”
In a case meant to set the precedent for cyber-hacks against TV stations, on June 14th, 2013, it was reported that CBS News correspondent Sharyl Attkisson’s computer, including her CBS News work computer, was hacked by “an unauthorized, external, unknown party on multiple occasions”, prompting CBS News to hire a firm to look into the hacking.
According to the report, CBS News spokeswoman Sonya McNair said that a cyber-security firm hired by CBS News “has determined through forensic analysis” that “evidence suggests this party performed all access remotely using Attkisson’s accounts. While no malicious code was found, forensic analysis revealed an intruder had executed commands that appeared to involve search and exfiltration of data.
Just as the international TV airwaves are about to suffer an unprecedented cyber-hijack, a June 21, 2013, report states that a new Israel-based 24-hour TV news channel broadcasting in English, French and Arabic will go “Live” on air starting on July 1, 2013.
According to the report, a new TV station based in Tel Aviv named “i24 News” has 150 journalists will be broadcasting Zionist propaganda around the clock in English and French as well as five hours a day in Arabic.
With the likes of BBC, CNN, and Fox News likely down due to the TV cyber-hijack, the new Israeli channel will likely be the only television station on the air, due of course to their ability to circumvent the cyber-hijack because of their new state-of-the-art security features.This scenario will allow “i24 News” to have an unabated worldwide audience as well as a timely opportunity to spin the nuclear attacks and the wars which will surly follow to their liking. Naturally, their timing couldn’t be more impeccable.
“Anchorman: The Legend of Ron Burgundy” (2004) is a film (see trailer) which was released in 2004 about an eccentric news anchor from San Diego, California. Roughly nine years later, the film is suddenly getting a long overdue sequel entitled, “Anchorman 2: The Legend Continues”.
Curiously, the movie trailer was officially released on June 18th, 2013, despite the fact that the film will not be released until December 19th, 2013. Exactly why a movie trailer for a low-budget SNL comedy is being released 6 months too early in the middle of summer is rather suspicious and begs the question: why now?Although it’s impossible to know for certain, it does appear that the Anchorman 2 trailer was released with the sole purpose of bringing as much as attention to television anchors as possible just prior to an unprecedented “Live TV” cyber-hijack.
Inflammatory war propaganda, rising diplomatic tensions between the U.S. and China along with unprecedented U.S. propaganda against China indicates that World War III scenario between the United States and China is on the horizon.
On June 4th, 2012, it was reported that the Australian government’s Defense White Paper published in 2009 contained a “secret chapter” that assessed “Australia’s ability to fight an air-sea battle alongside the United States against China”.A few weeks later on June 27th, 2012, Chinese Maj. Gen. Peng Guangqian stated that a future conflict with the United States is coming as a result of U.S. “containment” policy. Guangqian was then quoted as saying,“The United States has been exhausting all its resources to establish a strategic containment system specifically targeting China”and that
“The contradictions between China and the United States are structural, not to be changed by any individual, whether it is G.H.W. Bush, G.W. Bush or Barack Obama, it will not make a difference to these contradictions”.
Since June of 2012, numerous propaganda articles have stated that a cyber-terror doomsday is imminent and that when it happens, all hell will break loose in America. Headlines such as “‘End Of The World As We Know It’: Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of ‘Cyber 9/11′”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, “Defense Secretary Warns Of ‘Cyber-Pearl Harbor’”, “Threat Of ‘Spectacular’ Cyberattack Looms” and “U.S. Homeland Chief: Cyber 9/11 Could Happen “Imminently“, all indicate that an unprecedented act of state-sponsored cyber-terror upon the United States is imminent.
Exactly how a cyber-Doomsday will manifest itself is unknown, but a “Live-TV” cyber-hijack and subsequent nuke detonation appears to be the working plan at this given time.
As previously, reported, the nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. Based on recent news and events, China, more than any other nation, is sure to be scapegoated in the aftermath of a cataclysmic cyber-terror attack against the United States.
On October 5, 2011, U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two U.S. satellites on four separate occasions.A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyber espionage in areas such as pharmaceuticals, defense and manufacturing.In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security.In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta recently stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to clamp down on aggressive Chinese cyber-attacks against American companies and the U.S. government.On October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that“China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.
A Chinese attack highlighted by a massive cyber-attack will allegedly be in response to U.S. hacking and cyber-espionage by the Obama administration. As evidenced, these attacks will be used as the “motive” or justification for an unprovoked attack by China against the United States.
According to June 1st, 2013, report by the New York Times, Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons.Six days later on June 7, 2013, it was reported that Obama has ordered his senior national security and intelligence officials to draw up a list of potential overseas targets for US cyber-attacks, a list which China is surely on. The 18-page Presidential Policy Directive 20, issued in October of 2012 states that Offensive Cyber Effects Operations (OCEO) “can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging”.Three days later, a Foreign Policy report from the Council on Foreign Relations stated that “Deep within the National Security Agency, an elite, rarely discussed team of hackers and spies is targeting America’s enemies abroad”, again highlighting Obama’s offensive cyber-warfare just prior to a retaliatory attack from China.
Cyber-terror related attacks, which are occurring at an unprecedented rate with over 40 high-profilecyber-attacks in 2013 alone, are getting more and more diverse with each passing day. As evidenced, the notion that one can attack a jet, bank, stock market, water system, medical device or car via a computer has been floated by the media and brought to the attention of the public over the last few months.
2. April 23, 2013: Stocks Gyrate Wildly After Fake Terror Tweet (USA Today)
3. May 9, 2013: In Hours, Thieves Took $45 Million In A.T.M. Scheme (NYT)
4. May 9, 2013: Cyber-Attacks Behind Possibly Record-Breaking Bank Heist (CBS)
5. May 11, 2013: World Grapples With Rise In Cyber Crime (Fox News)
6. May 25, 2013: Hackers Tried To Access Haifa’s Water System In Failed Cyberattack (Fox News)
7. June 13, 2013: US Warns Of Cyber Attacks On Medical Devices (France 24)
8. June 25, 2013: Bush Advisor: Hastings Crash ‘Consistent With A Car Cyberattack’ (RT)
[Does not purport to be a complete list of headlines]
Prior to an unabated attack by China against U.S. military bases in the Pacific (i.e., Okinawa, Japan, Iwo Jima, Japan, and Pearl Harbor, Hawaii), the public must first be led to believe through propaganda and alleged whistleblowers that U.S. military equipment and weapons systems are vulnerable to Chinese cyber-related espionage.
That way, in the aftermath of a Chinese invasion whereby U.S. defense systems such as missiles, planes and radars are suddenly rendered useless, the narrative of a Chinese cyber-attack can be floated to the American public and military as the reason for the deadly attack which will surely take America to war.
If the following reports are to be believed, Chinese hackers have gained access to U.S. weapons secrets, stole blueprints from Australia’s intelligence agency, stole the latest U.S. weapons, hacked the NSA chairman’s accounts, targeted U.S. missile systems, hacked the Obama campaign, and hacked the head of the Nuclear Security Agency.
1. March 29, 2013: Report: China Gained U.S. Weapons Secrets Using Cyberespionage (CNN)
2. May 27, 2013: Chinese Hackers Steal Australian Security Intelligence Blueprints (News.com)
3. May 28, 2013: Pentagon: The Chinese Stole Our Newest Weapons (RT)
4. May 28, 2013: Chinese Infiltrated Top U.S. Weapons Systems, Confidential Report Claims (Fox News)
5. May 28, 2013: Obama Intelligence Agency Chairman Hacked By “Guccifer” (Smoking Gun)
6. May 28, 2013: Report Lists U.S. Weapons Compromised By Chinese Cyberspies (Washington Post)
7. May 29, 2013: Pentagon Aircraft, Missile Defense Programs Target Of China Cyber Threat (Fox News)
8. May 29, 2013: China To Hold Digital War Games (Guardian)
9. May 31, 2013: Hagel Says Chinese Cyberthreats Pose ‘Stealthy’ Danger To US (Fox News)
10. June 5, 2013: China Claims ‘Mountains Of Data’ On Cyber Attacks By US (FT)
11. June 6, 2013: Chinese Hacked Obama, McCain Campaigns, Took Internal Documents (NBC)
12. June 12, 2013: Head Of U.S. Nuclear Security Agency Is Hacked By “Guccifer” (Smoking Gun)
Based on the multiple reports, Chinese hackers have compromised numerous U.S. military weapons system ultimately making U.S. military personal and equipment vulnerable to Chinese attack. According to a May 28th, 2013, report by the Washington Post, the following is an “expanded partial list” of compromised DOD system designs and technologies:
Terminal High Altitude Area Defense, Patriot Advanced Capability-3, Extended Area Protection and Survivability System (EAPS), F-35, V-22, C-17, Hawklink, Advanced Harpoon Weapon Control System, Tanker Conversions, Long-term Mine Reconnaissance System, Global Hawk, Navy antenna mechanisms, Global Freight Management System, Micro Air Vehicle, Brigade Combat Team Modernization, Aegis Ballistic Missile Defense System, USMC Tracked Combat Vehicles, Warfighter Information Network-Tactical (WIN-T), T700 Family of Engines, Full Authority Digital Engine Controller (FADEC), UH-60 Black Hawk, AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile), Affordable Weapons System, Littoral Combat Ship, Navy Standard Missile (SM-2,3,6), P-8A/Multi-Mission Aircraft, F/A and EA-18, RC-135 Detect./Collect, and the Mk54 Light Weight Torpedo.
Directed Energy, UAV video system, Specific Emitter identification, Nanotechnology, Dual Use Avionics, Fuze/Munitions safety and development, Electronic Intelligence Processing, Tactical Data Links, Satellite Communications, Electronic Warfare, Advanced Signal Processing Technologies for Radars, Nano-structured Metal Matrix Composite for Light Weight Ballistic Armor, Vision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV), Space Surveillance Telescope, Materials/processing technologies, IR Search and Track systems, Electronic Warfare systems, Electromagnetic Aircraft Launch, Rail Gun, Side Scan sonar, Mode 5 IFF, Export Control, ITAR, Distribution Statement B,C,D Technical Information, CAD drawings, 3D models, schematics, Software code, Critical technology, Vendor/supply chain data, Technical manuals, PII (email addresses, SSN, credit card numbers, passwords, etc.), and attendee lists for program reviews and meetings.
The case of former National Security Agency (NSA) whistleblower Edward Snowden is fascinating for many reasons but mainly because of his role in an upcoming Chinese cyber-related attack. In the aftermath of a Chinese attack, Snowden will be scape-goated as a traitor for giving information to the Chinese which ultimately enables them to circumvent U.S. military programs and weapons systems.
This particular narrative first began to form on June 10th, 2013, when CIA officer Bob Baer stated on CNN that Obama officials are speculating that Snowden’s whistleblowing could be considered “potential Chinese espionage”.Four days later on June 14th, 2013, it was reported that a popular Communist Party-backed newspaper was urging China’s leadership to get more information from Snowden rather than send him back to the U.S., because his revelations about secret U.S. surveillance programs were in China’s national interest.Another June 14th, 2013, report stated that Snowden could offer intelligence that would help China update its understanding of cyberspace and improve its position in negotiations with Washington D.C.A week later, on June 21st, 2013, the Obama Administration reportedly charged NSA Whistleblower Snowden with espionage, theft and conversion of government property. These charges were levelled at Snowden in order to give the Obama administration the much needed plausible deniability in the aftermath of a Chinese attack on the U.S.Six day later on June 26th, 2013, it was reported that intelligence agencies in China and Russia had gained access to highly classified U.S. intelligence and military information contained on electronic media held by Snowden. According to the report, the exact compromise of the secret data held on Snowden’s laptop computers remains unknown but the biggest fear is that China gained access to new U.S. nuclear war plans.
In the wake of the Edward Snowden case, the Obama administration has presented yet another intelligence patsy who can be scape-goated in the aftermath of a Chinese attack based on U.S. cyber-intelligence failures.
On June 28th, 2013, it was reported that retired Marine Gen. James ‘Hoss’ Cartwright, a four-star general, is under a DOJ investigation over leaking details of a classified cyber-terror operation to the press. According to the report, Cartwright, who was deputy chairman of the Joint Chiefs of Staff between 2007 and 2011, was responsible for the ‘Olympic Games’, a massive attack on Iranian uranium enrichment facilities. He allegedly broke details of the top secret operation to the media,including collaboration with Israeli hackers in development of the Stuxnet computer worm.If indicted, Cartwright would join Bradley Manning, Edward Snowden and six others charged under the 1917 Espionage Act by the Obama administration.
The Japanese people are some of the most independent people on earth and therefore have been the focus of numerous wars, nuclear attacks (i.e., Hiroshima, Nagasaki, and Fukushima) tsunamis and earthquakes.
The Zionist backed Chinese would love nothing more than to invade and destroy their culture and way of life as much as possible.Unfortunately, as it currently stands, the country of Japan is America’s closest ally in the Pacific and therefore an attack on Japan by China would instantly be seen as an attack on America. The U.S. has numerous military bases in Japan including two very strategic locations in Okinawa, Japan, and Iwo Jima, Japan.In World War II, the Battle of Iwo Jima was made famous by a photo of U.S. soldiers hoisting an American flag atop the island, and therefore, the capture of this island by “Communist” China would undoubtedly serve as an American war cry for revenge.If China were to successfully capture these two islands along with Pearl Harbor, Hawaii, they would have almost conquered most of the Asian-Pacific region.
1. June 21, 2013: US, Japan Begin Naval Drills Near China (FT)
2. February 7, 2013: US, Japan, Australia Conduct Military Drills Over Pacific (Fox News)
3. April 5, 2013: Japan Will Join US Military Drill In California In June (Press TV)
4. June 9, 2013: Japan Sending Soldiers To US For First Time Amid Tensions With China (Fox News)
5. June 27, 2013: US-Japan War Games Off The California Coast Imitate Chinese Invasion (RT)
6. June 8, 2013: ‘US Army Chief In Japan Suspended’ (Press TV)
In a move which clears the way for an unabated Chinese attack on U.S. troops stationed Japan, it was reported on June 7th, 2013, that U.S. Army Major General Michael Harrison, the man directly responsible for responding to an attack on Japan, was suspended for allegedly failing to properly report or investigate a sexual assault complaint.
Harrison, who was stationed in Camp Zama, was in charge of U.S. Army-Japan and was suspended four days prior to his completion of his 32-month assignment. It’s no secret that sexual assault and the military are synonymous and therefore the timing of the suspension is highly suspicious to say the least.Harrison’s scheduled replacement is Major General James Boozer, the former deputy commanding general of the US Army in Europe. With Boozer at the helm, plausible deniability due to his greenness on the job and his name “Boozer”, meaning drinker or drunk, will be cited as the reasons he failed to properly respond to a Chinese sneak attack.
Prior to a Chinese invasion in which U.S. military aircraft fail to work properly, there must be an incident whereby U.S. planes can be “updated” with a virus or mechanical tweak so they are rendered useless.
On May 28th, 2013, it was reported that U.S. pilot flying an F-15 over the Pacific Ocean identified an unspecified problem which forced him to eject in mid-flight.
A day later on May 29th, 2013, it was reported that the U.S. Air Force had grounded its F-15 fighters on the southern Japan island of Okinawa for a safety review following a crash that forced the aforementioned pilot to eject over the Pacific Ocean. All F-15s attached to the 18th Wing on Okinawa’s Kadena Air Base were scheduled to undergo “inspections” during the reported stand down to ensure that they are “safe” to fly. Although it is not clear whether these planes are still grounded, the so called “inspections” may have allowed for the entire fleet of American planes to be sabotaged.
It’s no secret that Seattle, Washington, is one of the most liberal and progressive cities in the United States and therefore could be a target of Zionist terrorism. From marijuana legalization, animal rights, gay rights and recycling, Seattle is not just a city but rather a large community.
Curiously, Seattle has experienced an unprecedented wave of terror and death which has been prepping the city for its impending nuclear destruction. Coincidentally, “Red Dawn” (2012) is a film (see trailer) in which the Washington state is the victim of a red-dawn surprise attack by military aircraft from Asia. At exactly 0:33 seconds into the trailer, a massive, explosion is heard at the same time a snow globe with Seattle’s Space Needle is shown, potentially foreshadowing an upcoming attack on the city.
1. March 20, 2013: Seattle Airport Disrupted By Security Breach (Seattle, Washington)
2. March 25, 2013: Man Gets 18 Years In Seattle Terror Plot (Seattle, Washington)
3. April 1, 2013: 3 Killed After Seattle-Area Tavern Brawl Turns Into Gun Fight (Seattle, Washington)
4. April 8, 2013: Man In Seattle Terror Case Gets 17-Years For Terror Plot (Seattle, Washington)
5. April 12, 2013: Authorities Probe Death Of Man On Seattle Escalator (Seattle, Washington)
6. April 14, 2013: One Dead After Avalanches East Of Seattle (Snoqualmie Pass, Washington)
7. April 22, 2013: Domestic Dispute Starts Shootout That Kills 5 Near Seattle (Seattle, Washington)
8. June 25, 2013: FBI’s “Faces Of Global Terror” Ads Pulled Off Buses In Seattle (Seattle, Washington)
The San Francisco–Oakland Bay Bridge (known locally as the Bay Bridge) is a pair of bridges spanning San Francisco Bay of California, in the United States. Aside from being partially demolished in the 1989 Loma Prieta Earthquake, the Bay Bridge recently underwent an emergency “repair”.
On January 7th, 2013, it was reported that an oil tanker had struck a tower in the middle of the San Francisco-Oakland Bay Bridge. According to the report, the 752-foot tanker rammed the bridge tower as it headed out to sea damaging a 30 to 40 foot fender of steel on base of the bridge. Whether or not the suspicious ship accident and subsequent “repair” job will ultimately undermine the structural integrity of the bridge is not known, but the timely construction project could have theoretically provided cover for the installation of demolition explosives in and around the Bay Bridge. These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated nuclear terrorist attack.
In order for a nuclear attack to be even more psychologically terrorizing, a well-known landmark such as the Golden Gate Bridge must be destroyed in the attack to serve as life-long reminder of that horrific day. The Golden Gate Bridge is a suspension bridge spanning the Golden Gate, the opening of the San Francisco Bay into the Pacific Ocean.
On February 23rd, 2012, it was reported that the Golden Gate Bridge in San Francisco, California, would undergo a renovation project that will “take years to complete”. According to the report, the project involves repainting the two main suspension cables which are responsible for holding the bridge in place. Whether or not the suspicious “renovation” project will ultimately undermine the structural integrity of the bridge is not known, but the timely construction could have theoretically provided cover for the installation of demolition explosives in and around the Golden Gate Bridge.These explosives could then be detonated via remote control at a future date in a calculated attempt to give the appearance of a “natural disaster” event or a coordinated nuclear terrorist attack. Prior to a high-profile terror attack or “natural disaster” resulting in the demolition of the Golden Gate Bridge, the public must be psychologically prepared to accept that this is in fact possible.Hollywood movie propaganda and government propaganda is a slick way of showing that yes, it can happen.On June 2nd, 2009, the Onion ran a story which openly joked about a “horrific attack on San Francisco’s Golden Gate Bridge, which “left thousands missing and assumed dead”. Three years later, Hollywood released “Rise of the Planet of the Apes” (2012), a film (see trailer) in which a monkey literally destroys the Golden Gate Bridge.
Paris, France, is one of the most anti-government places in the world. They have absolutely no respect for authority or the political process, and are not shy to voice their anti-government sentiment. Therefore, should the U.S. be hit with a Chinese nuclear attack, depending on how Europe reacts, it’s possible that Paris could be subsequently targeted. In order for a nuclear attack to be even more psychologically terrorizing, a well-known landmark such as the Eiffel Tower must be destroyed in the attack to serve as life-long reminder of that horrific day. Coincidentally, some very suspicious events have occurred at the Eiffel Tower over the last few months. Whether or not any of these events provided cover for the installation of a nuclear weapon in or around the tower is not known, but the opportunity to do so was available.
2. June 18, 2013: Eiffel Tower Evacuated After Suicide Threat (Paris, France)
3. June 25, 2013: Armed Soldiers Guard Eiffel Tower After 6 Terrorists Arrested In Paris (Paris, France)
4. June 27, 2013: Eiffel Tower Reopens To Tourists After Rare 2-Day Strike
5. June 28, 2013: Eiffel Tower Fiasco A Lift For Thieves (Paris, France)
A cyber-attack by China against Wall Street would be seen as an act of war and would be a convenient way to both publically bankrupt America and take her to war at the same time. Wall Street is the financial district of New York City and the heart of America’s economy.
93 years ago, the Wall Street bombing occurred at 12:01 pm on September 16th, 1920, in the Financial District of New York City. The terrorist attack killed 38 and seriously injured 14. With the rise of the Occupy Wall Street movement and the ever increasing hatred of banks and their practice of usury, it is highly likely that Wall Street will once again be targeted for terror.On November 18th, 2008, it was reported that terror suspect Aafia Siddiqui was taken into custody following her capture in Afghanistan on charges of attempted murder following revelations of a “Mass Casualty Attack” that listed various landmarks in New York, including Wall Street.Prior to a high-profile terror attack against Wall Street, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen.
Prior to a major cyber-terror attack by China on the New York Stock Exchange (NYSE), one would expect there to be some stock-market related terror drills to prepare Wall Street insiders for the attack. Case in point:
On June 13th, 2013, it was reported that Wall Street executed “Quantum Dawn 2”, a cyber-terror war-game apparently meant to give insiders an opportunity to make financial moves before the market crashes, for good.According to the report, Cyber Strategies oversaw a terror exercise which included Citigroup, Bank of America, the Department of Homeland Security, the Treasury Department, the Federal Reserve, the Securities and Exchange Commission, as well as 40 other firms.The drill, which featured a hacker, possibly from China, operating from a fake trading platform, prompted a response in which the participants facilitated a conference call to “figure out what was going on”.In other words, the drill simulated a real-life scenario in which insider firms received the “heads up” about an impending cyber-attack and shared this information accordingly so that their bank accounts and those of their clients would not be affected.The same sort of thing occurred just prior to 9/11 when “put options” or bets were taken out on United Airlines and American Airlines, the two airline companies involved in the attacks. According to the “9/11 Commission Report”, “some unusual trading did in fact occur”, however, it claimed that, “each such trade proved to have an innocuous explanation”.
It’s imperative to remember that starting fights between different races, classes and religions is taken word for word from the 3RD PROTOCOL OF THE PROTOCOLS OF ZION.
David Chase Taylor, the editor-in-chief of Truther.org, is an American journalist living in Zürich, Switzerland where he has applied for political asylum since the release of The Nuclear Bible, a book credited with subverting a false-flag/state-sponsored nuclear terror attack upon America in Dallas, Texas on February 6, 2011. Taylor has since released The Bio-Terror Bible, a website exposing the coming global bio-terror pandemic likely planned for 2013. Taylor has also exposed numerous terror plots including the 2012 DNC Terror Plot, the “Twilight” Premier Terror Plot, as well as Alex Jones’ links to STRATFOR.