Profile image
By MILLENNIUM Reporter
Contributor profile | More stories
Story Views

Now:
Last Hour:
Last 24 Hours:
Total:

Gladio Code Broken! G-10 Shatters NATO Terror Matrix!

Saturday, July 7, 2018 6:05
% of readers think this story is Fact. Add your two cents.

 

THE MILLENNIUM REPORT: Reporting the Most Important News in the World Today

 

 

The GLADIO CODE
Has Been Broken,
NATO’s Terror Network
Shattered

 

 

G-10 reveals what no one has ever disclosed before

TMR Editor’s Note: The following intelligence report on NATO’s Operation Gladio was filed by former French undercover agent and computer scientist Marc Delantre.

The purpose of this report is to familiarize the reader with the super-secret “signal” that was actually created by the operational head of Gladio (now known as G-10) to communicate with M. Delantre.  As difficult as this might be to comprehend, the hard digital evidence provided by G-10 proves conclusively that this ongoing signaling initiative has been taking place throughout most of 2018.

Only by reading this extraordinary exposé can anyone begin to see the direct connection between Gladio and a growing number of terrorist operations perpetrated around the world.  Were one to dig deeper into each attack, it would become quickly apparent that they each have a unique set of specific objectives as well as serve to advance an underlying global agenda (i.e. New World Order).

What is critical to understand is that both The Millennium Report and State of the Nationhad previously labeled many of the concerned terror attacks conducted domestically and internationally as classic Gladio operations.  This Gladio branding by TMR and SOTN was done completely independent of and without  foreknowledge of Delantre’s accurate analysis posted below.

Once the scientific evaluation of the digital data began to support the existence of a pervasive paradigm of Gladio terror, it became clear that a massive terrorist network has been in place globally over many decades.  In fact, virtually every terror attack anywhere in the world today is carried out under the rubric of NATO’s Operation Gladio.  This is precisely why NATO has been renamed by the Alt Media as the North Atlantic Terrorist Organization.

There are very good reasons why both NATO and Operation Gladio headquarters are both located in Brussels, Belgium.  Although it has been officially stated that Gladio was dissolved a number of years ago, it was not.  In point of fact, Gladio is more active than it has ever been as seen by the never-ending and ever-intensifying reign of terror across the planet.  The fake ‘War on Terror’ was in reality initiated to provide cover and justification for Gladio operations executed around the globe.

The terrorist attacks of September 11th were a classic Gladio black operation which was coordinated with several intelligence agencies (e.g. the entire U.S. Intelligence Community) and secret services (e.g. MOSSAD) around the world.  Prior to 9/11, there were numerous terror operations such as the 1993 World Trade Center bombing that were also perpetrated under the Gladio umbrella.

So far-reaching is Gladio’s influence worldwide that they are the only over-arching organization (along with full C.I.A. support) that can pull off so many terror attacks and never be exposed…until now.  What is revealed below is the back story which describes how every Gladio-sponsored attack is now telegraphed via a digital “signal” that contain revealing signatures as they are sent in real-time.

It’s crucial for every resident of planet Earth to understand that Gladio terrorism can show up anywhere, anytime and in any way.  So complete is their command and control of this realm that no one is immune to their false flag terror attacks.  Hence, everyone ought to have an interest in exposing their game plan once it becomes known.  After all, who does not want to prevent the death and destruction that always occur during and after Gladio black ops.

Truly, there are no NIMBYS where it concerns NATO’s Gladio-coordinated terrorism.  These state-sponsored terrorist cells operate wherever, whenever and however they so choose to.  Given this stark reality, every inhabitant of the planetary civilization ought to pay attention to the messages delivered by G-10.

Just who is G-10?  And from where does he issue forth the most radioactive information and ultra-classified data in the world?


TERROR IN RUSSIA: Moscow and Sochi car-rammings are GLADIO operations

GLADIO: “The SWORD” Used By The North Atlantic Terrorist Organization Worldwide

GLADIO False Flag Terrorism 2018: Spate Of European Arson Fires Are All Connected On Purpose

ANNAPOLIS NEWSPAPER MASSACRE: Another Gladio-style False Flag Terrorist Attack


Conclusion

The “Gladio Code” has finally been broken.   Hence, the global terror matrix has been “shattered” because Gladio’s secret strategy and signature MO have been revealed like never before.  Once an insider chose to expose the underbelly of NATO’s Operation Gladio, it has become apparent that virtually all terrorism is state-sponsored and overseen by the Brussels headquarters.

Why Brussels?  Because it’s also the Pedogate capital of the world.  Not only is the Belgium government completely controlled by the Pedogate control mechanism, so is the NATO leadership and Gladio hierarchy.  In this manner, federal governments around the globe are likewise coerced into supporting the worldwide regime of terror that currently afflicts humanity.

Henceforth, the North Atlantic Terrorist Organization will be held responsible for the incessant terrorist attacks.  Gladio false flag operations will now be seen as the state-sponsored terrorism that they truly are.  Eventually, this grim reality will catch up with those government officials and political leaders who have taken advantage of this fake “War on Terror” to promote the perpetual war economy for the Military-Industrial Complex.

The Millennium Report
July 5, 2018

N.B. What follows is Marc Delantre’s extraordinary work that exposes Gladio as the killing machine and fear-generating entity it has always been.


Gladio created a signal to communicate with his Messenger, Marc Delantre

Submitted by Marc Delantre

This signal has been created by Gladio to communicate with me, their Messenger, but what is this signal?

Even if I did not know yet, I was dealing with Gladio since the summer 2008. Indeed, without knowing it, I was very close of the mastermind of Gladio and he tried to hire me for my computer skills. The French authorities asked me to be their undercover man within this organized crime organization. I did not know at that time that I was facing Gladio. The Mossad exfiltrated me from this situation in 2009 and used me till 2012. In 2013, I tried to denounce everything in Belgium and I had to face Gladio in my home. I have been poisoned two times, but not with the goal of killing me. The head of Gladio did not want to kill me, but only to control me and to push me out of their main area, Belgium. And, indeed, I left my country in 2014 to go in Madagascar.

On September 16, 2014, when I was in Madagascar, the judge in Belgium in charge of my complaint opened by the Belgian Secret Service asked a police commissioner to investigate on my case. Three hours later my computer in Madagascar was seriously attacked and one of my web servers completely disappeared. These destructive Internet attacks lasted 3 weeks and finally that commissioner asked me if I will come back to get an audition for this case. Since they did not want to protect me, I refused, and the judge closed the file at the end of 2014.

The terror attacks in Europe would begin in the first days of 2015.

But Gladio decided at the same time to use me to denounce their activities, but in their way, not in my way. To reach this goal, they needed a very discrete way to communicate with me.

An Internet DDoS weapon to communicate with me

Gladio also specializes in the cyber-attacks and Internet weapons. We call this cyber-terrorism. My own story has some links with the birth and the evolution of the most powerful cyber-weapon in the world. In 2012, when the leader of the Mossad agents was taking care of me in Belgium, he died in strange circumstances and then my wife disappeared at the same time.  A cyber-terrorist team v-DOS also began their activity in Israel. This team had the specialty to launch DDoS attacks against web servers.

A DDoS attack consists of sending a large volume of data and connections to the same server to take it down. In 2014, the best way to launch a DDoS attack was to use dozens, hundreds or thousands of computers, and to command to these computers to send massive amounts of data and to connect at the same time to a same target. The hackers take the control of these computers through a virus. Everybody has experienced that their favorite site cannot be reachable from time to time. The reason for this can be a DDoS attack.

I don’t know why but in 2014, when Gladio succeeded in closing the complaint opened with the Belgian Service, this v-DOS team began officially to sell and to launch DDoS attacks on demand, for their customers. When the Belgian authority asked me if I was ready to come back in Belgium, I also received very small DDoS attacks on my web server. They did not attack me, but I understood that these small attacks were a threat, if I planned to enter Belgium.

It was the first time that any organization used a DDoS cyber-weapon to send me a message and I understood its purpose of course. I knew that these very small attacks, without any effects, could also be very destructive if they used their DDoS weapon at a normal level. So, it was already very strange to me that they used a powerful DDoS weapon to message me. Or, that the DDoS attack is fully active and destructive, or that there is no attack at all. So, such level of attack, was not an attack at all; rather, it was a way to communicate with me through a specific type of signal.

It was also in 2014 when the flight MH17 had been shot down over the Ukraine that I got the first DDoS “warning” attack for something where I was not involved. I was very surprised, since this DDoS warning was coming from the area of the crash. I made the link and I wrote it. I did not know it at the time, but Gladio saw on my screens that I understood it. So, they probably decided to continue in this way to communicate with me.

In 2015, when I was disconnected sometimes from the Internet for traveling or visiting or because I did not have Internet connection for a while, I again received these DDoS “warnings“. I was not surprised.

In 2016, after the terror attack in Brussels, I decided to send my file to the Belgian Commission for the terror attacks in Brussels. On October 19, I received an email from the office of the top Belgian chief police in Belgium to tell me that they took care of my file sent to this Commission. Again, three hours later, my other web server then disappeared from the web.

I immediately launched another server in the Netherlands and on October 20 my server was already running. On October 21, the USA fell victim to the most powerful cyber-attack ever and the impact point was exactly where my web server was located on October 19 before to be destroyed; the DYN DNS company in Manchester, New Hampshire, U.S.

This was the most powerful attack ever; something like a 9/11 on the Internet. The whole USA was impacted, and the White House was compelled to give a special news conference. Many major US websites went down. The world discovered a new style of DDoS weapon. The target is not attacked by some thousands of infected computers spread over the world, but by 100,000 internet devices spread over the world.  These objects are, above all, cameras (CCTV) connected to the Internet and very easy to infect because their access codes are standard. When such a number of infected objects or infected computers are involved this way, it’s called a botnet. The particular virus that was used to infect these Internet devices, especially the CCTV is called Mirai. So, this botnet attacking the USA on October 21, took the name of Mirai botnet.

On December 2016, I saw on my web server in the Netherlands that I received, hundreds of connections per hour, non-stop over several days. I called the FBI and other experts and they confirmed, these connections are coming from Mirai botnet. However, like in 2014, Mirai botnet doesn’t attack me. Thousands of Internet objects of Mirai botnet are connecting on my server every hour, every minute, 24/7. The FBI confirms that my server is not involved in any cyber-terrorism process. My server is definitively not a hub for the Mirai botnet, and they don’t find the reason for these strange connections. I didn’t know yet that it was Gladio, and that they just created with Mirai botnet a frequency on my server to function as a signal. Immediately, I created some Internet applications to follow the changing level of these connections coming from the most powerful Internet weapon in the world.

The signal from Mirai botnet warns me the first terror attack.

On January and February 2017, I see that the level of Mirai botnet connections changes according to what I’m doing and where I’m doing it, even if I don’t have Internet. So Gladio was showing me that they were monitoring me 24/7, even if I didn’t know it was Gladio. I email the FBI, which answers only what they know that my partner and I are being 24/7 monitored. Terrifying it was even though I did not know yet that I was being monitored by Gladio.

On May 22, 2017, I see that the Mirai botnet suddenly reaches a high-level activity on my server, at more than 1000 connections per hour while its normal level during May 2017 was +/-150 connections per hour. This high activity continues for 4h30 and I try to understand. When it goes back to its normal level, I look to see if I did something wrong to provoke this sudden high level of connections to my server. I did not find anything.

Then I see the news that Donald Trump has just been welcomed to Israel by Benjamin Netanyahu. The Air Force One arrived at 11h02 in the morning, Belgian time, at the airport… and Mirai also reached this high-level activity on my server at 11H02 in the morning!

I understand that Mirai botnet may be warning me of an imminent terrorist attack. I contact the Belgian Terrorist Threat Center, which asks me for a report. I take several hours to write it and shortly after it’s dispatch there is the attack in Manchester in the UK at the Arena. There were many deaths including children. Later, the CIA will say that the terrorist who blew himself up was trained in Belgium. I did not know yet that it was really Gladio, but they just warned me of a first terror attack.

Moreover, Gladio leaves nothing to chance and had just launched the 4th terror attack on the 22nd of the month, including the one in Brussels. I see also that this attack occurred in Manchester, UK while Mirai had “celebrated” its birth by its massive attack in the USA on DYN DNS Company, in Manchester, U.S.! Twice, Manchester was hit, so this was not coincidence.

Evolution

This attack that signed on my server on May 22, 2017 was also not a coincidence since 50 other attacks would follow and all of them were signed in the same way—by a Mirai botnet on my server.

Progressively, Gladio showed me more and more about their activities through Mirai botnet. At the beginning, they warned me of attacks, 1 or 2h just before they occurred; but quickly, they “signed” the attacks in the real-time. The principle remained the same; when the signal goes up, it means that an operation is ongoing. An operation, an attack, or car-ramming can last some minutes, like when they start a fire in a building. It can last also some hours or some days, especially when the operation requires more work.  Or when they want to show me better that I’m linked with this operation, or to allow me to link it with an event in the news.

So, many of these signatures have the shape of a wave, paralleling with the beginning and the end of the operation. It’s easy for me to find the event in the news matching with such signature. But if there are many signatures I don’t get waves, but only the peaks of connections.

Moreover, they have also created some sub-signals. These sub-signals are a part of the main signal and can show also the peaks and waves matching with attacks. However, they can give more information on sub-signals about my own activities or if some events have a special link with me.

Conclusion

It is through this signal coming from Mirai botnet, that I discover all the activities of Gladio and their locations. They occur all over the world in the form of terror and false flag attacks, chemical attacks, murders, fires, planes crashes, and so on. Currently, when I see the events in the news, I’m almost able, before to see the signal, to say that an event is a Gladio operation or not.  Most often, my feeling is right as I get a signal at the same time of the event, which is a signature for the attack.

You must understand also that everything about this signal coming from Gladio and Mirai botnet depends on human decisions. There is no automation. A team must receive — 24/7 — a list of ongoing operations and this team must change the Gladio level on my web server according the information that they receive. I don’t think that I receive a signature on the signal for all their operations. It would be impossible. They probably take the most significant operations for me and those that I could find myself later in the news.

If an operation occurs in the middle of the jungle to prepare the arrival of a helicopter, there is no interest for me and I will not get any signature for this. If they must launch a terror attack in Europe, I will get it. Currently, I cannot count anymore the large number of operations that I got already. The goal is to show me, or to record on my server, the most important for the humanity to be aware of. Indeed, when Gladio organized on demand from an authority, a political crime, a plane crash, or a terror attack, that authority will never say the truth. The Gladio signal is there to tell the truth, since the operation is recorded on my web server.

This signal is not really a code between Gladio and me. However, this signal does not mean anything if you do not see what it corresponds to. It is the same if you see a cardiac monitor in the hospital and you don’t see the bed with the patient.  It’s the same with the signal from Gladio. I know how to read it, because:

  • ·         I know the origin of this signal, Mirai botnet, a powerful cyber-weapon. This is already very unusual that such a weapon communicates with my server.
  •  
  • ·         I know who controls this signal; Gladio and I know that I have a relationship with this organization for over 10 years.
  •  
  • ·         As described above, they taught me how to read the signal by increasing progressively the number of signatures.
  •  
  • ·         At the beginning, the signal was used for one attack a day, and the timing matched at the very minute between the signal and the event. So, it was above all to convince me that this signal matched to a terrorist organization.
  •  
  • ·         When Gladio was sure that I understood this, they increased progressively the number of attacks signed on my server. At the same time, they checked on my screens to see if I understood them.

Of course, this decision to send me a signal about their activities comes from the operational head of Gladio, and he is operating in my home country, Belgium, near NATO. We have known each other for very long time. He is one of the most powerful police officers in Belgium and all complaints that I tried to open against him failed.

This explains also why each time that I tried to contact the Belgian police I got in some hours only the worst destructive attacks to my computers and servers. He did that because he doesn’t want me to denounce him, but I have to denounce Gladio. Since he saw how many times I tried to denounce him, he chose me to denounce Gladio but in his way and not in my way.

This signal can also be considered like a simple way to communicate between him, the head of Gladio, and me. Of course, he doesn’t do that himself, but he is the one who gives the orders. Gladio is like a “cloud” of the terror. Nothing is precise. There is no paper, no trace of their crimes that can be traced back to a command.  It’s why they created the signal.

Marc Delantre
www.gladio-activities.net

Very short resume:
56yo, computer scientist, webmaster (from always).
2008, undercover agent for DNEF Paris
2009-2012, protected agent for Mossad
2013-2018, informing agent for the Belgian Justice, Belgian/French Secret Service and Ministers
2017-2018, informing agent for other agencies including FBI (450 emails exchanged, including 150 received).
2014-2018, forced agent for Gladio.

___
http://themillenniumreport.com/2018/07/the-gladio-code-has-been-broken-natos-terror-matrix-shattered/


THE MILLENNIUM REPORT: Reporting the Most Important News in the World Today

 

 

We encourage you to Share our Reports, Analyses, Breaking News and Videos. Simply Click your Favorite Social Media Button and Share.

Report abuse

Comments

Your Comments
Question Razz Sad Evil Exclaim Smile Redface Biggrin Surprised Eek Confused Cool LOL Mad Twisted Rolleyes Wink Idea Arrow Neutral Cry Mr. Green

Total 4 comments
  • 2QIK4U

    The forced agent for Gladio is a stretch as he could of blocked it from from continuing on from his server’s but a good read finally on BINNED. Cheers millennium :-P

  • Man

    What messenger is this 77 year old Marc Delantre using? Because why do we need to get this information filtered by you?

    other than knowing that all your other artciles were Pure fantasy.

    Cause this reads as one person who uses his computer had a malware.

    The DDOS does nothing other than slowing down computers. That is the Best Nato can do? If it is Nato. how do you know it isn’t just a DDOS attack, if it is one… because the Signalcan also be HPLC graph as the numbers and names on it has no meaning.

    Seriously, if this was true…. this is the worst attack yet. If they could manage to organise 9/11, why couldn’t they stop 2 Mac Delantre and a socalled unnamed spy?

    • Marc Delantre

      Hello Man,
      I’m not 77Yo, but 56. It is not “DDoS attacks”. G-10 uses the most powerful DDoS weapon, but not to attack but to create a signal, which shows the ongoing operations. I’m not a spy, I receive this signal because I know G-10 and because he knows that I will understand the meaning of this signal and that I will communicate on it.
      You will find more info on gladio-activities(dot)net.
      Marc Delantre

  • LegalNameFraud

    I.D.’s Illegal
    It’s illegal to use a legal name.
    #BCCRSS
    https://BCCRSS.wordpress.com

    Inc.I.D. job WTC towers of concrete and steel to instil fear and distract from THE T’wins of reveal’LL’law’shuns Twins of Revelation; “I.D.s I77EGAL.” = Legal fact = Legal Fucked.
    Flight 77 on 911, church/court/state Robe’Boughts paedophilia; “the riddle of the sphinx” encoded in artwork, movie posters, etc.
    mineyebook.wordpress.com/2018/01/31/d-duck-tapes/

Top Stories
Recent Stories
 

Featured

Top Global

Top Alternative

Register

Newsletter

Email this story
Email this story

If you really want to ban this commenter, please write down the reason:

If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.