You are on page 1of 22

New evidence that the GLADIO Network is linked to attacks or other attacks from 2015 to 2018

(English version with comments from users and answers from the author!) To read the French version, click here.

Published by Laurent Freeman

May 14, 2018

https://stopmensonges.com/nouvelles-preuves-que-le-reseau-gladio-est-lie-aux-attentats-ou-autres-attaques-
de-2015-a-2018/

https://www.scribd.com/document/379787494/14-05-2018-New-evidence-that-the-GLADIO-Network-is-linked-
to-attacks-or-other-attacks-from-2015-to-2018

Or how did I become the recorder and messenger of these shadow terrorists?

(By Marc Delantre)

In 2008, I was a little computer scientist, but known to some, to accept complicated missions and technically
risky. I was then approached by European organized crime. Preferring to get out of this situation, I had been to
find the French authorities, who asked me to stay as informant under cover. I recorded this organization on MP3.

It was then that I realized that the one who pushed me to enter this environment was at the same time a very
high Belgian policeman, not Muslim, but that he had especially very terrorist ideas. He said he was very proud of
September 11, 2001. That was not my business.

In 2009, a man who said he belonged to Mossad, the Israeli secret service, contacted me to get out of this
situation. At that time, I did not ask myself a question. I was only happy, that an organization wants me out of
the rice fields. The Mossad, or at least what I believe to be the Mossad, repatriated me to Belgium, where they
settled me in a former bank, bought just on this occasion. It's something I'm sure of the agent still had the
paperwork in his hands.
In 2011, the senior officer tries to silence me. The alleged Mossad saves me from this situation and explains the
reasons for their protection. I record them on MP3. It's a protection against the senior officer, who for them is an
important international terrorist, but in exchange for that protection, they're asking me not to bring a complaint
against the senior officer, which could impede or terminate the alleged Mossad's investigation of the senior
officer. At least that is the explanation given to me and recorded.

However, since their role seemed ambiguous, I often asked myself the question; who between the officer and
me, was the most protected. This question has not really been answered.

According to Mossad, the specialty of the top police officer is Terrorist Intelligence, the provision of real forged
documents to terrorists and especially to have participated in the development of September 11, 2001, with a
well-known terrorist. Still according to the alleged Mossad, and that's important, he's very close to all organized
crime networks, terrorists, extremists and many other things. But at this point, this alleged Mossad could very
well have been on the side of the high officer as well. Moreover, this agent told me that I was serving them, but
what, I did not know.

In 2012, the officer responsible for my protection is murdered. My wife is also disappearing under the
intervention of a professional apparently linked to international organized crime. The latter could also have
belonged to one side or the other, or even a third. Let's say that a professional, driving in an armored car, with a
weapon in the glove compartment and Belgian false papers in his wallet, was appropriate for the context, but
that did not give him his membership.

In 2013, I find myself alone in front of an organization that stalks me, but I do not measure at all the importance
and whose name I do not know. They know I have MP3 recordings and they watch me very closely to find out
what I'm going to do with them. I am then subjected to multiple intrusions at home, sometimes in the middle of
the night, while I walk my dog. They go home and scan my computer, while my doors and my computer are
locked. Nothing stops them and they seek to know what I intend to do with the information I have and monitor
my relationship with counterterrorism and the Belgian secret services.

They take me on foot, as in a car, listen to my apartment, my car and my telephone lines. They follow me even
without visible spinning. That anguishes me. I do not understand, but that does not stop me. With other
witnesses, trustworthy, I meet the counter-terrorist police and the Belgian secret services. The anti-terrorist
police do not want to believe in my file, despite my evidence.

The secret services have the opposite attitude and they ask me to find additional evidence, which I do, risking my
life.

I meet other members of this alleged Mossad, which I record again on MP3. They confirm all the information
already received, but add many more. I understand that this alleged Mossad investigates and tracks the high
officer since the late 90's. They deliver me the code name of this operation and they show me the cache with the
records. Again, I record everything, but all of this information reported to the Belgian secret service does not
change anything. They do not receive, from the Belgian Justice, the right to conduct the investigation.

However, the Belgian secret services confirm that these pseudo Mossad agents are known to them for their
Israeli orientations and activities, but they were not aware that it was Mossad. However, according to them, that
could have been the case. In any case, they did not dispute my protection, which Belgium would never have had
the means to offer me. I cannot dispute this protection that has been triggered more than once and I cannot
deny that these pseudo Mossad agents are of Israeli origin. However, it is not impossible, and it seems to me
very likely that this pseudo-protection, is also a very big way to control me very closely. In any case, they did not
want me to touch close to the high officer, and all that, is obviously fishy.

Everyone knows the Mossad's means, but I did not have the impression that this cell had it, even if they had the
philosophy. I often wondered at this time, during these intrusions, whether the intruders were of Israeli origin or
of Belgian origin under the leadership of the high officer. Many facts have always led to the conclusion that they
were Belgians, but who did not work for the Belgian State.

Indeed, the secret services, my Internet provider and myself, had quickly identified that the perpetrators of these
intrusions, eavesdropping and spinning, were equipped with military radios or Belgian police. Nevertheless, the
official services confirm there it is for nothing. The Belgian Justice apparently knows who these intruders, these
spies and choose to close the file immediately.

At that time I was poisoned twice, not for the purpose of killing myself, but to prevent myself from standing for a
week. The first time was in the presence of this organized crime professional in 2012 and the second in 2013
when I was in close contact with the anti-terrorism and the Belgian secret services. As for the subsequent attacks
on my computer, I should have understood that the purpose of these poisonings was threefold:

 Makes me scared
 Make me understand the power of my enemies
 Prevent me from investigating or trying to understand.

This was already the case during the attempt to silence me in 2011, a situation that the alleged Mossad had
saved me immediately.

The Belgian secret services do not let go of the file and help me to open a new complaint with a new court.
However, I am forced, under pressure to leave the country.

2014 , I am sent to Madagascar, in Africa, where I am welcomed and financed by the family of one of the highest
magistrates of Belgium, very involved in my file since its beginnings. This family knows my relationship with the
alleged Mossad before I tell them about it. I wonder then who sent me to Madagascar; the Belgian justice, the
high officer, the presumed Mossad, or the three together?

September 16, 2014, I'm not aware, but in Belgium, a police commissioner apparently begins an investigation
into my open file with the secret services. Barely three hours after my stay near my old home, my computer in
Madagascar is rendered unusable and one of the main websites that I take care of and known to the high officer,
is completely destroyed, until the customer account at a Belgian national host. He begins by denying the
existence of this site 12 years old and which he cannot find any trace. For my part, I can only see the unlimited
firepower of people who attack me, without being aware of the visit of this Commissioner to my former home.

These attacks will last a fortnight. Then, they end. Three days later, the commissioner whose visit to my former
home provoked these attacks, contacted me and asked me if I was ready to return to Belgium. He says that
justice wants to hear me, but he says especially want to take my computer equipment, without which, I do not
know how to work. I ask him if he is ready to protect me and he refuses. I put weeks to think about what I will do
and finally, I give up. I do not want to take that risk. The examining magistrate in charge of the file, therefore
closes immediately this one.

January 2015, it is then in Europe, the attacks can begin;

 Charlie Hebdo, in Paris, several journalists are murdered. Among the terrorists, witnesses note that there
are hooded men who look more like soldiers or police officers than terrorists. We'll never talk again, but
they were there. On the other hand, the pseudo Islamists leave well in evidence their identity card.
 The hyper kosher, in Paris, hostage with several deaths. There too, surveillance cameras reveal the
existence within the hostages of people who do not look like hostages, nor that of terrorists, but rather
agents in charge of the organization.
 The descent into a cache of terrorists in Verviers in Belgium. The Franco-Belgian police, find there
equipment and police equipment. The authorities explain this by the intention of the terrorists to attack
the police. It has happened several times since then, but strictly never using police equipment.
 The attacks of Paris, organized since Brussels, make 130 dead. The high officer chosen, in the aftermath
of these attacks, a new avatar whose meaning is "slave of evil".
 The Brussels attacks, on March 22, 2016, are in the same vein as those of Paris.

All this leads me to think that I am directly linked to these attacks without finding solid links. The first three have
a link with police officers, or at least the same style of professionals as for my intrusions in 2013. The last two are
linked to Belgium in an obvious way and cause the senior officer to change avatar in link with the slaves of evil. It
will then occur 3 apparently related events:

 On 13 July 2016, I filed a new terrorism complaint with the Commission on the Brussels attacks. Indeed, I
am convinced that my file is related to all these attacks and I note that one of the experts on this
Commission on the attacks is one of my counter-terrorism experts in 2014.
 27 hours later, the 14th of July, the most bloody attack on European soil, the attack in Nice, 80 dead at
the crossing of a 20-ton truck that runs on the pedestrian facing the fire. artifice.
 27 hours later, again, this attack will be claimed by the agency Amaq Daesh, yet the terrorist has no
connection with Daesh.

In fact, these three events above are related, but I will not understand it until 2018. In fact, since 2014, just
before my departure for Madagascar, my main computer, as well as my phone, had been completely hacked, for
to follow the slightest of my movements and to follow everything that was happening on my computer and all
my movements.

In September 2016, the Commission on the attacks in Brussels returned from vacation and then really looks into
my file. It will be born then the most important Internet weapon in the world, Mirai botnet. This one is in fact the
result of a previous evolution also linked to my file:

 September 2012, when the Mossad agent was murdered and my wife disappeared, the hackers who
were going to be at the base of Mirai botnet, started their activities unofficially on the Internet, under the
name of v-DOS in Israel. It must be very seriously noted that the origin of V-DOS is Israeli, as well as this
cell of the pseudo Mossad. It is a fact verified and yet on the ground, it is difficult to see this link. They
offer, in fact, DDoS attacks of industrial power, among the largest in the world and therefore intended to
attack corporate or state servers to make them inaccessible.
 September 2014, while a terrorism investigation has just started in Belgium, following my open file with
the Belgian secret services, v-DOS officially begins its activities on the Internet and even invoices its attack
services DDoS, always from Israel. These have become even more powerful than before and are also
helping to put pressure on me, so that I do not return to Belgium at the request of Justice. I also see that
the origin of these Internet attacks is of Israeli origin.
 September 2016, v-DOS disappears and gives way to Mirai botnet by starting its first attack against the
company Krebson Security in the USA, which is at the origin of the complaint leading to the
disappearance of the company v-DOS. Indeed, Israel, at the request of the FBI, briefly arrested 2 hackers
at the head of v-DOS, but upon their release, Mirai botnet attack Krebson Security, September 21, 2016,
Belgian time, while the Commission on the attacks on Brussels will make this day its official return.

It happens then over 7 months, several events directly related to the birth of this Internet weapon, Mirai botnet.
Indeed, this organization never does anything without planning it well in advance and Mirai botnet was actually
intended, despite being the world's largest Internet weapon, only for communication. This terrorist organization
wanted to establish with me.
But to sum up: I was apparently protected by the pseudo Mossad (Israel), from 2009 to 2012. The Internet
weapon Mirai botnet has a certain Israeli origin and my record follows, from 2012 to 2016, that of this Israeli
Internet weapon. And so far, in 2018, Mirai botnet is a constant link between me and this global terrorist
organization headquartered in Belgium. And all this is absolutely certain and proves easily, since I am in the
middle.

 October 19, 2016, I receive a letter from the Belgian police headquarters, which says that my file is being
followed.
 3 hours later, my Internet server, which is in the fold of the Dyn DNS company in Manchester USA, is
destroyed by hackers high-flying. But, in fact, those hackers who still belong to this same organization
knew very well that I had another server in preparation, since they controlled my computer remotely.
They knew that there was in fact no danger for my activity.
 October 20, I immediately restart my new server on the one I was preparing in the Netherlands. I'm
happy to believe that I managed to counter my attackers, while I was only manipulated, and I start
insulting a group of people, including the senior officer, about these hackers.
 October 21, Mirai botnet, begins to attack the company Dyn DNS in Manchester USA, where my server
was. This gigantic attack is the largest in the world and paralyzes all major US sites, including social
networks. President Obama must give a lecture to calm the people. Me, I just think it was strange that my
server was there 48 hours ago, but I do not make other reports with me at the moment. This attack was
in fact intended to make the world understand that a new ruthless weapon had been born and had to
make me understand, later, that I was intimately related to Mirai botnet, to this attack and to the
organization who had provoked it.
 November 1, 2016, my computer, my new server in the Netherlands and the GSM of my companion are
the subject of several small simultaneous attacks. They come from Belgium and I feel something personal,
since they take place at the moment, where my partner and I are shopping and we are not connected,
which is not frequent. We realize this when we return home and I solve all the attacks, but again without
understanding, what I had to understand.
 November 9, 2016, exceptional moment, necessary to help me understand. My girlfriend is in town in the
Philippines, and she is docked by a couple of strangers who tells him of a procedure to find an unknown
user on a mobile phone. Once back home, she tells me about this strange meeting, which I immediately
understand, like agents apartment to this powerful organization in connection with these attacks. We
follow the procedure received and we find indeed an unknown user. This one has for image, the avatar of
the high Belgian officer and a pseudonym, in two parts, the first part is the anagram of his first name, the
second one makes a link with Mirai botnet! We cannot erase this unknown user, but I'm starting to make
the links that seem so extraordinary. All this is so orchestrated as if it were a movie and it was just
beginning.
 November 10, 2016, we are therefore obliged to go to a store to remove this user. The technician informs
us that this GSM is quite enslaved spy tool, camera, microphone, GPS and applications. I have everything
deleted. He added that the GSM had to be borrowed discreetly from my companion because it is
impossible to add this user without the GSM in hand. Here we are, completely certain to be under the
control of a huge organization with unlimited means, in connection with the attacks and Mirai botnet.
 At the end of December 2016, Mirai botnet started to connect to my new server in the manner of a
frequency, a continuous and relatively stable signal. I contact the FBI. We exchange 450 emails, of which
150 received. The FBI confirms the seriousness of the situation, but they find nothing on my server. I
stress that they probably have to look in my past and not, on my server, but it's a track that does not
seem to interest them.

For my part, I realize immediately control tools that allow me to graphically display the number of connections
Mirai botnet on my server. These applications show me, on one of my screens and so continuously a red line,
which goes up or down very visually, depending on the number of connections received per hour by my server.
The average number of connections is between 150 and 250 per hour.
 January and February 2017, my partner and I are in the middle of swamps, visiting another island in the
Philippines. We are not connected. In the morning, I still want to find a way to connect, to know how
Mirai behaves on my server.

When I succeed, I see that the red line of the number of connections shows very strong peaks of activity that I do
not take long to understand. This organization shows me via Mirai botnet that not only they completely control
Mirai botnet, but that especially they monitor us, since the frequency of Mirai on my server depends on our
activity in the middle of nowhere and especially without Internet! I contact the FBI, who simply tells me that they
know we are being watched... with what? A satellite?

 May 22, 2017, I see that Mirai botnet suddenly returned to high activity on my server, more than 1000
connections per hour while its normal level, at that date is +/- 150 connections per hour. This high activity
is maintained for 4:30 and I try to understand. When it falls back to its normal level, I look at what I could
have done to provoke the discontent of this organization, but I cannot find anything.

Then, I see the news. Donald Trump has been welcomed in Israel by Benjamin Netanyahu. Their meeting took
place at 11:02 in the morning, Belgian time ... and Mirai also went into high activity at 11:02 am!

I understand that Mirai may be warning me of an impending terrorist attack. I contact the Belgian center of the
terrorist threat, which asks me for a report. This one asks me hours and soon after its sending, it is the attack in
Manchester in England, in the Arena. Many deaths including children. Later, the CIA will say that the terrorist
who blew himself up, was trained in Belgium.

In addition, this organization that leaves nothing to chance had just committed a fourth attack on 22 of the
month, including that of Brussels, but especially it had just taken place in Manchester UK while Mirai had
"celebrated" his birth by his gigantic attack on the USA on the company Dyn DNS, in Manchester US! Twice
Manchester that did not know to be a coincidence.

And this attack was also not a coincidence since 50 others were going to follow and all were going to be signed in
the same way, by Mirai botnet on my server. Here is the list:

First series of attacks

 Manchester (UK), bombing. The terrorist was trained in Belgium.


 London, signed 2h30 before the attack, then new identical signature in the claim. Fake explosive belts and
ceramic knives.
 Paris, foolish attack and missed against a police car.
 Brussels, failed attack and idiot. An incendiary bomb in a station.
 Halamish (Israel), knife attack, by a Palestinian. Signed 1:40 before.
 Hamburg (Germany), knife attack, by a Palestinian. Signed 1h before.
 Levallois-Perret (Paris), bombing the car ram against the military. Signed the same day.
 Barcelona (Spain), attacks on 3 days, explosion, knife and car ram. Terrorists wear fake explosive belts.
Attacks signed shortly before the first explosion. A terrorist received a call from the police 2 hours before
the attack on the car ram.
 Brussels and London, two failed attacks and idiots against police.
 Edmonton (Canada), knife attack and car ram. Signed to the minute.
 Basel (Switzerland), knife attack. Signed to the minute.
 Gare de Marseille (France), knife attack. Signed to the minute.
 Las Vegas (USA), mass killing with automatic weapon. Signed to the minute, three times in different time
zones. Claimed by ISIS, not related to ISIS. The killer commits suicide.
 London (UK), incendiary bomb. Signed in real time.

The identification of the terrorist organization

It is in mid-October 2017, in Belgium, we talk again, by chance (?), The case of the Killers of Brabant and I then 2
major strokes at 2 hours apart; one unofficial with a Belgian Federal Justice Officer; the other with a former
agent of this organization. From these two phone calls recorded on MP3, it appears that the organization against
which, I fight for nearly 9 years bears the name of GLADIO.

GLADIO is an offshoot of NATO and the CIA and whose vocation (Wikipedia) first was to defend Europe against
the USSR. It finds its personnel, most often without leaving them the choice, within the army, the police, the
information, but also, the bandits, the terrorists, the unbalanced ones and the extremists of all edges, and thus
"simply known From the police and therefore identified. Very easy targets of GLADIO.

But in the 70s and 80s, with the end of the Cold War, GLADIO turned to terrorist operations, all over Europe,
including the Killers of Brabant in Belgium. It is therefore in October 2017, that the Belgian population discovers
that the Killers of Brabant were former Belgian Special Forces, which the Belgian Justice will quickly try to hide,
which again demonstrates the total unconsciousness of Belgium in the face of terrorism that GLADIO generates
around the world.
In the 90s, Europe was asking for the dissolution of GLADIO, but these two calls inform me that GLADIO has
never been dissolved, which is also confirmed by many international experts. GLADIO is in the 90s, become much
more discreet and they have spread across all NATO countries, to become the most secretive and powerful force
in the world with unlimited access intelligence, espionage, surveillance of NATO, CIA and MOSSAD.

The high officer then takes his real function. It is more than likely the leader, since the alleged Mossad told me
that the high officer was already linked to September 11, 2001, which certainly allowed him to gain importance
within GLADIO. Moreover, its position and power even within the Belgian police, allow him to be in the best
place to recruit, even by force, new members of Gladio. Moreover, the one who is at the base of this whole story
and who seems to have extraordinary means, is still the high officer. Finally, for having chosen me, so to record
all the operations of Gladio, without having to account to anyone, is still the high officer, who can only be at the
head of Gladio, impression which is also confirmed to me, on the telephone, by the former member of Gladio.

Second series of attacks

 Malta, assassination of the Maltese journalist, Daphne Caruana Galizia. Signed in real time on my server.
The journalist was murdered because she was on the Gladio track, dixit, Gladio's expert, Sibel Edmonds.
And so, that I, who is Gladio's pawn, on the chessboard of terror, I'm still alive, which confirms once
again, that for having chosen me for this role, it really has to be the chief of Gladio, who chose him so.
 Manhattan (USA), bombing the car ram and fakes weapons (toy). Signed in real time.
 Texas, Church (USA), mass killing with automatic weapon. Signed in real time. The killer, a former soldier,
commits suicide.
 Blagnac (France), bombing the car ram. Signed in real time. The terrorist's brother works for the police.
 Argentina, the disappeared submarine ... which has not disappeared, but which would have been hacked.
Signed in real time over a week.
 St. Petersburg (Russia), incendiary bomb explosion. Signed in real time.
 Kabul (Afghanistan), Attack on the Intercontinental Hotel
 ... Another chip because started with one of my actions.
 Gent (Belgium), an idiot bombing by an Afghan, against police. Signed in real time. This attack was carried
out exactly 1 hour after I warned the authorities of a significant threat on my screen that had started a
few hours earlier. It was the first time that following an alert on my part, it was exactly one hour later an
attack, even missed. I had noticed it and pointed out to my correspondents, without understanding that it
would henceforth be the case, for all the other attacks that were to follow.

However, this immense activity of Mirai on my screen and which had given rise to my email, was intended to
draw my attention to everything else. This important activity of Mirai began at the very moment of the opening
of a conference against chemical weapons in Paris and it will also mark the beginning of the chemical attacks.
In fact, I do not quite realize it, but Gladio has just completely changed strategy with me and with himself. It had
been six months since Gladio recorded his attacks on my server, first, shortly before they occur, and then when
they occurred. Now, Gladio would choose to set me as the trigger for all attacks, choosing one of my attempts to
alert the world, as the starting point of a new attack, even if sometimes these had been planned by them
previously.

I understand this change of position, as having become the only way in their eyes to make my emails even more
convincing. They make me go from simple recorder of their attacks, to a status of Messenger.

I have no direct contact with Gladio except through Mirai botnet with which they communicate with me and with
the rest of the world, to the extent that I systematically transmit what I see. I must, however, add my personal
decoding, to what Mirai tells me, as far as I am the only one who can do it. And that is what would transform me
more into Messenger of Gladio.

 Kabul, Afghanistan, bombing of the trapped ambulance. Signed in real time. More than 100 dead.

 Leicester (England), explosion. Signed in real time, started when publishing my story.
 Washington (USA), chemical attack by poisoned letter to a US military base. Signed in real time, started
when sending an email to Edward Snowden. An American base because Snowden is American.
 Kabul (Afghanistan), car bomb attack on an Australian convoy. Signed in real time, started when sending
an email to Julian Assange. This operation hid the operation on Skripal. Australian convoy because
Assange is Australian.
 Vienna (Austria), double knife attack. Signed in real time, started at the launch of a petition and a
participatory fund.
 Salsbury (England) Skripal case + murder of his friend. Chemical attack. Signed in real time over 15 days
and started when sending an email to Julian Assange.
 Tihanges (Belgium) 30 Cars torched at a nuclear power station. Attack signed in real time and following
my call to RT television.
 Carcassonne / Trèbes (France). Deadly hostage taking. Signed in real time because I wrote that police and
military were rarely killed. This operation concealed that of Kemerovo in Russia.
 Kemerovo (Russia) Fire of a shopping center. Signed in real time because I called RT Television. Operation
to connect to the cars burned in Belgium and the last tweet of Julian Assange on the timing related to this
fire.
 Munster (Germany). Attack on the car ram, started while I wrote to the president of this region. Signed in
real time.
 Syria. Chemical attacks, in fact following chemical attacks against the US base and against the Skripal and
already planned at the conference against chemical weapons of Paris! Signed in real time.
 Algeria. Explosion of an airplane engine. Attack started when sending an email to a large number of
authorities. 257 dead! Signed in real time.
 Mali. Attack of a UN center. Attack started when sending an email to the Secretary-General of the UN.
Signed in real time.
 USA. Explosion of a second aircraft engine. Attack started when sending a second email to the UN
Secretary-General. Signed in real time.
 Afghanistan. Double attack started during the launch of my first video. Signed in real time.
 Toronto (Canada). Attack to the car ram, started when sending an email about the double bombing and
sent to the Embassy of Afghanistan in Ottawa (which is why Canada). The attack corresponds in all
respects to the scenario of attack described in my video. Signed in real time.
 Shaanxi (China). Important knife attack on children. Signed in real time.

On April 20th, I send my first video on the Internet https://vimeo.com/265741563 and this has the following
consequence:

 April 20 , the murder of DJ Avicii (I am a former DJ, but I do not see the link with Gladio)
 April 22, double bombing in Kabul, which I am warned from 21.
 April 23, the attack in Toronto, caused when sending my email to the Afghan Embassy in Ottawa, Canada,
7 hours before the attack, and about the attacks in Kabul. The scenario of the attack in Toronto is the one
described, for example, minute by minute, in my video. I warn the Toronto authorities right away, but
they hide the truth from the public. Gladio makes a difference between disasters (false disasters, actually
provoked) and attacks. To provoke the first, they do not need the agreement of NATO, but for the
attacks, they must have this agreement. I was responsible for the timing of this bombing in Toronto, but
not for the decision that had been made following PM Trudeau's categorical refusal to participate in the
strike against Syria, with Canada probably feeling something in the chronology of events since the Skripal
affair. But for NATO, not to participate in a strike is rebellion and the agreement for the attack was given.
Gladio's Head then organized it to match my email.
 April 27, the massive knife attack tells about twenty children in China. I do not see either link, but I have
the registration, like other attacks.
 April 29, the crash of a military cargo plane in Libya, following an email sent.
 April 30, triple bombing in Kabul whose primary target is the journalists, because a video reporter from
Toronto had fixed a meeting, which she then canceled, afraid of the file. GLADIO really did not like and
executed one of the worst attacks against journalists, killed by a video reporter wearing an explosive belt!
 May 2, (Chart 2) I warned a fourth time the United Nations (the first caused the crash of the plane in
Algeria, 257 dead, the second a massive terrorist attack against a UN base in Mali. The third, the
explosion of an engine of SouthWest Airlines. Overall, there is no doubt with the timeline of my mails.)
This new mail to the UN causes:
o May 2 10-11am, a massive bombing in Tripoli.
o 17:30, a new C-130 crashes after takeoff.
o 23:30, a police plane crashes in Colombia.
o 23:30, a strange explosion in a Jewish holiday in England.
o May 3, 8:45, a Russian plane crashes after takeoff.
o 16:30, new incident identical to the Southwest airlines.

 May 4th, my server returns to maximum alert again, but the origin (IP) of this alert is Toronto. Obviously
GLADIO remains determined to attack Toronto again and I warn them. Only, obviously, GLADIO does not
get the authorization to hit Canada again. They still leave the alert level to the maximum. They will turn to
a target where they really have a blank check, Kabul, but again, they want to link this new attack to one of
my exchanges.
 May 7, I have an "expert" in terrorism, quite unpleasant in his answers and seem to doubt everything. It
does not take more for GLADIO, who reads me permanently (including now) to get angry. For GLADIO, to
doubt me is to doubt GLADIO. So they started the attack they wanted to do in Toronto, but in Kabul.
 May 9, double simultaneous attack in Kabul at 2 police stations. Indeed, GLADIO does not like the police
who participate to tell anything to the population. I had warned the Toronto police to tell the truth to the
public. The officer who had taken note of all my statements and reports about the circumstances of the
Toronto bombing, was really pleased with my testimony, covering me with thanks. But I told him that
usually, this kind of version is quickly, stored in a closed drawer. No NATO member state can conduct an
investigation against GLADIO. GLADIO is a kind of mafia, shadow army, devil's hand for NATO.
 10 (04h) -11 May (15h), rest day, I have to leave my office and my island for 24h. Only GLADIO is working
to track me so that I do not escape in nature or that nobody takes the opportunity to jump on me.
THE FACTS OF MAY 11 & 12, 2018

 May 11, 3:38 pm, I have a long telephone interview with a real investigative journalist from TheStar.ca. It
seems a lot like GLADIO.
 May 11, 16-17h, in response to this call, I prepare an email with a presentation of the file.
 May 11, 22:56, RT Television sends me emails.
 May 12, I prepare in English, a new summary of the Toronto bombing, with the link on the decision of
Canada not to participate in the strikes.
 May 12th, 12:32 pm, I have a new answer, a little unpleasant, from another expert in Intelligence. I am
used to it.
 May 12, 12:58 and 14:19, I answer him, and I tell him that if he continues to doubt my function, for
GLADIO, they could launch an attack.
 May 12, 14:30, GLADIO has just decided to launch a new attack.
 May 12, 8:45 pm, Paris attack with a knife. Obviously, this decision was taken against France, because she
had just taken a stand against the US in the nuclear issue with Iran. France is even the mastermind of the
rescue of the Iranian agreement. Attempt therefore granted and executed according to my timing.

Nearly 1500 dead and thousands of other victims in almost 50 attacks and attacks in 11 months, all organized
by Gladio, and all signed, in the same way, on my Internet server ...
... To which, we must add at least all the attacks since early 2015, made by Gladio and to which some alerts and
other attacks refer...

... to which, we must add, all chemical attacks and other (fake) disasters since 2015 and those in 2017, that I have
not yet detected in the signatures since the beginning of the recordings.

The purpose of all this

Before clarifying the purpose behind all this, I need to clarify the context again. To carry out all these events and
attacks; for the preparation that it requires and sometimes in a few hours or minutes; for my continuous
surveillance and that of Mirai; to follow the news; to be present and invisible in all countries requires a real army.
And it is not too much to say that it uses gigantic means and that it is so secret that nobody in the world knows it
while it is obvious, this file brings the proof that it really exists.

However, the speed of the decisions, in other words the reactivity to the events seems to come from a single
man, commanding his army, which I remember, does not roll under any flag. They are not Islamists, nor radicals,
but they seem united for the same religion, terrorism on command. Many of them were forcibly recruited. I'm
not talking about the terrorists on the ground, who too have been enlisted and / or manipulated, but who unlike
the others, do not realize it, or have been drugged for the time necessary to carry out the attack and to forget
those who pushed them to realize it.

But then, one man at the head of all this is what the facts and responsiveness of this organization seem to
demonstrate.

This man, I think I know him. Let's say that it is a quasi conviction, since it never confirmed me black on white or
verbally to be at the head of GLADIO. On the other hand, playing with the facts, he would have demonstrated to
me more than once, but legally, each of these facts, as each of these signatures of attack would form no
evidence. It is the set of events that constitutes the proof and no, only one of these events, taken in isolation.

Just to imagine that, you need a super-brain, because in one year, after a terrorist attack, an event after an
event, whether it's an attack, or a personal event, between him and me, he has managed to constitute the proof
the existence of GLADIO and place it on my only person and on my Internet server. Again, both are inseparable
for proof to exist.

But to have arrived at such a situation; for having placed my trust in me; to be certain that I will never give up
whatever events I will be the only witness, the man at the head of GLADIO must and must know me better than
anyone. He must also be able to take me back to the path he is the only one to know in case I deviate from it.

To be certain of this, he must have experienced it on me in the past and almost to have accustomed me to this
kind of situation. This is only possible through a single person that I know very well indeed and who was also for
more than 20 years, the only target of this cell of this alleged Mossad having ensured my protection. It is also the
same person who forced me in 2008 to enter the organized crime, which is nothing other than GLADIO.

So, if the head of GLADIO knows me in such a way, it is also true in the opposite direction. I know him very well,
even if I am the pawn and he is the master. And so I guess his motivation and purpose.

He has indeed, everything from the super brain. He is a strategist and he loves this kind of scenario. He also
conceived this story as a film and I recognize it there. He is able to assume a number of distinct roles, without
both of them realizing it. He has all the perfect agent, being able to work as much for the ones as for the others,
without raising suspicions and even to dismiss those whom me, by my accusations, could raise. He is a
professional in every role he plays.

But all to an end and I think he decided to end it. I think he wants to destroy GLADIO who never had the vocation
to enrich its members either. I think he wants to stop GLADIO before massive chemical attacks are required. He is
getting old and he probably does not intend to leave this world without a huge boost. He chose a new target in
addition to his traditional targets. He probably wants to destroy both GLADIO, but also and especially those who
have used GLADIO and who continues to do so.

He is the sword, what GLADIO means in Italian, but this time, he wants to give him a 360 ° movement, to
eliminate those, who behind him, the command for 20 years and all this before turning against him- even. I think
it's his intentions.

Anyway, since he has planned everything in this story, like a super-brain or a great chess player, he had to plan a
final that will be terrible, but I have no idea of what will compose it.

Finally, currently, the layout of Mirai botnet on my screens has become very interactive, in both directions. I
understand what they are trying to tell me. For their part, they read my letters as I write them. They are
therefore aware of the interpretation of the graphics that I give to my interlocutors. They are therefore careful to
follow this interpretation in the evolution of the graph. As a result, the graph becomes almost as clear as an
email. It reads very clearly the stages related to the attacks, the press, my activity and the changes of country.

At the time of writing, I would write, as they read to me, that we are still in a situation of alert, at 400
connections of Mirai per hour, but that I am waiting for the acquisition of a new target. No target or country is
defined at the moment, at least on the graph, but it can change from one minute to the next.

This obviously means that we are talking about a terrible organization that on the one hand reads, listens,
follows me constantly and that adjusts the level of Mirai according to what I do and what they do , or what they
decided to do.

It's pretty diabolical and the word is well chosen, it's the finger of Satan, GLADIO, who apparently wants to turn
into a vigilante, but in the manner of Satan.

Source: Marc Delantre

Source :

https://stopmensonges.com/nouvelles-preuves-que-le-reseau-gladio-est-lie-aux-attentats-ou-autres-attaques-
de-2015-a-2018/

https://www.scribd.com/document/379214105/14-05-2018-Nouvelles-Preuves-Que-Le-Reseau-GLADIO-est-Lie-
Aux-Attentats-Ou-Autres-Attaques-de-2015-a-2018

http://signal21.net/
Comments from users published under the article Stopmensonges Blog (Permanent update)

Utoro
We can not know the origin of a computer attack, the network has become too complex. The rest is a beautiful
story I do not believe for a second.

We can not know the origin of a computer attack, the network has become too complex. The rest is a beautiful
story I do not believe for a second.

Member
Marc Delantre
It's not about computer attacks, but about a signal. You should believe it because my story, see video, is the best
explanation and the best proof.

guest
miles
the signals are not they due to the fact that the gladio network uses your servers for their communications and
the mirai to be invisible... your servers would be a horse of three to conceal data?

Member
Marc Delantre
Yes, I thought of this, at first, that my server was a proper interface to the Gladio network. But it does not hold,
because the "signal" also responds to what I do personally. 2 days ago, I had to fly for a round trip, the signal
followed me and it's not at all the first time. The signal followed our activity, to the minute, whether I'm on the
Internet or not. I even asked them sometimes, putting a question (yes / no) on my screen, in front of the graph
(as they read my screens) and ... Read more »

Member
gizmo-land
Of course, if networked professionals are able to know any type of attack on the net, there are many tools to
know how botnets intervene to increase the traffic of a site, to take remote control computer, to modify the
connection sockets, to make IP spoofing, etc. There are many solutions, but, it's a real job and these people are
at the top of computer intelligence, they are the ones who develop Connection light, routers with backdoors,
which hold the intercontinental backbones and have their inputs everywhere by these famous ... Read more »
Member
Marc Delantre
Like, I said elsewhere, my server is not attacked. On the other hand, they chose to communicate with me,
through a formidable Internet weapon (a botnet), which hides their origin that I know yet (Belgium). On the
other hand, yes, these people use with me what they can use with everyone, depending on their suspicions. I am
monitored 24/7 in a humane way and by all means possible, but this does not know to be the case for everyone,
especially because we do not know how to put a team on everyone either. I ... Read more »

guest
miles
https://www.youtube.com/watch?v=PeNzwQmWlzk

Member
Marc Delantre
It's also a very good story, but the facts they talk about - also discussed in the moon file and my video - are 40
years old. Since then, this organization has greatly expanded.

guest
johan
All this can be very good news ... a person at the controls of one of the most sophisticated espionage tools in the
world (the first being by far facebook and its intrusive applications) ... wanting to make heads fall to the
scoundrels ... and who would have access to a whole bunch of compromising documents. Towards a new
paradise papers?

Is making our friend a messenger a way to make him believable? Like the documents would be deposited on his
server and he already have all the contacts to be credited and react quickly?

Member
Marc Delantre
No, I only have records of operations and my story to justify my position. I can prove everything that I relate and
my server is there, but I have nothing more for the moment. By "global" justice, it would already be exploitable
as such, but there must be one. It is not "credible" that you would like to give me, but that I bring more evidence.
The problem is not there. Justice could act, but it means attacking Gladio, which no country will do, even with
more evidence. On the other hand, the public ... Read more »
guest
the mother deni
the record of the criminal war business on behalf of the oligarchs of the finance host and other natural resources
zeokulators begins to become heavy with myon victims in countries at war and even to a much lesser extent by
oxidizing mixed blood the victims of colonial looting with that of soldiers Special services of mercenaries and
victims of state terrorism these z'flures at the ulcan destroy as zealous agents all alternative or strategic web
networks disturbing the self-destructive calendar of their master bankers and action of industrial monopolies
https://www.egaliteetreconciliation.fr/Daniel-Schneidermann-victim-of-a-canular-of-hacker-sioniste-Gregory-
Chelli-33517.htmlhtml https://www.egaliteetreconciliation.fr/Ulcan -Gregory-Chelli-s-takes-a-new-to-the-family-
of-Alain-Soral-his-wife-his-aunt-sa-28093.html ... Read more »

Member
Joule
In addition:
Financial killers, debt and economic wars
according to
The Economic Killers - John Perkins [2004 Confessions of an Economic Hit Man]

On the subject, Michel Collon's lecture


https://www.youtube.com/watch?time_continue=150&v=cqcxC0HJZDA

guest
Bob
Is it James Bond or a computer scientist?
I know one who was a hacker and went to a bank to test the security of the system but that's a bit much for a
computer scientist, this does not mean that governments do not use a secret network to create anti-insurgency
events!

Member
Marc Delantre
Basically, I am really a "little" computer scientist. But for 10 years, and especially since a year, I became the
center of the world of terror. It's well said, but it's about right, and it does not bring me anything. I did not do
anything for it. Being the voice of Satan, frankly, that's not amusing either. I do not speak of governments,
because in my eyes, our politicians are too ephemeral to be informed. They are sometimes heads of a country
and their respective armies, but that stops there. Gladio, is older than them and ... Read more »
Member
gizmo-land

Hello,

do you use which program to retrieve login data on your server?


A program under mysql?
or possibly a program like Wireshark?

Member
Marc Delantre

Good question. The FBI had asked me in late 2016 to install Wireshark, since they were also trying to understand
where the signal came from. Then, they immediately asked me to remove it, because too "visible". No, it's pretty
simple actually. The botnet is trying to connect. The Firewall blocks and logs the connection attempt (very
classic). A program of my own analyzes the logs of the firewall permanently and transcribes them in a mysql
database. It is the content of this database that is used to display the graphics, the signal, which is millions of
connections. So, it's really ... Read more »

guest
speedwell

Money being the nerve and Rothschild being his body ... it was the grandmother who spoke best of their
international union of organized crime.

"If my sons want war there is war".


Gutle Schnapper, wife of Amschel Mayer dit Rothschild.

guest
Itching powder

psychopaths

https://stopmensonges.com/nouvelles-preuves-que-le-reseau-gladio-est-lie-aux-attentats-ou-autres-attaques-
de-2015-a-2018/

https://www.scribd.com/document/379214105/14-05-2018-Nouvelles-Preuves-Que-Le-Reseau-GLADIO-est-Lie-
Aux-Attentats-Ou-Autres-Attaques-de-2015-a-2018

http://signal21.net/

You might also like