Brussels Attack: Another Chapter in NATO’s Gladio Strategy?
By Wayne MADSEN – Strategic Culture Foundation – 27.03.2016
Europe has experienced another Islamic State of Iraq and the Levant (ISIL) terrorist attack. This time terrorists set off bombs at Brussels International Airport in Zaventem, a stone’s throw away from NATO headquarters, and the Maelbeek Metro station, in the heart of the European Union’s Brussels office building complex.
The Brussels attack was linked to the November 13, 2015 attacks in Paris, which targeted the Bataclan concert hall and restaurants and cafés in the heart of the city, as well as the Stade de France football stadium.
In almost a replay of the Paris attacks, the news media began reporting that the Brussels attack was carried out by two brothers – Ibrahim and Khalid el-Bakraoui – who were linked to the November 13 attacks in Paris. The November 13 attacks were, in turn, linked to the January 7, 2015 ISIL attacks on the Paris offices of the satirical magazine Charlie Hebdo and a kosher supermarket in the Paris suburbs. The January 7 attacks also involved two brothers – Cherif and Said Kouachi. Since all the sibling attackers died in suicide attacks, the media is bound to believe what law enforcement reports to them about the Paris I, Paris II, and Brussels attacks. One of the suicide bombers at Brussels airport was reportedly ISIL’s chief bomb maker in Western Europe, Najim Laachraoui, who is said to have made the suicide bomb-laden vests used in the Paris II attacks.
Just prior to the Brussels bombings, Belgian police swooped in on the person they said was the mastermind of the Paris II attacks, Salah Abdeslam. Abdeslam was captured in the largely Muslim-populated neighborhood of Molenbeek in Brussels, an area believed to have spawned a number of ISIL terrorists and guerrillas who have fought in Syria and Iraq.
There was some media speculation that Abdeslam began passing to the police details of ISIL’s plans for future terrorist attacks. Nevertheless, Turkish President Recep Tayyip Erdogan, who, himself has suspicious connections to ISIL fighters in Syria, claimed that one of the Brussels terrorist brothers, Ibrahim el-Bakraoui, had been deported by Turkey to the Netherlands in July 2015, some four months before Abdeslam’s cell carried out the Paris attacks. Erdogan said that Turkey deported Ibrahim el-Bakraoui because he was a militant foreign fighter in Syria. Turkey has aided and abetted other militant foreign fighters, including terrorists, traveling to and from Syria, so why Erdogan singled out el-Bakraoui is a mystery. It also stands to reason that if Turkey was such a valued member of NATO, why did it deport a security threat to the Netherlands, also a NATO member?
And just as with previous terrorist attacks, the media reported that the Brussels attackers were previously known to European law enforcement and intelligence services. So, why were they able to carry out three successful major terrorist attacks in a year-and-a-half time period?
Pre-attack knowledge by the authorities of an alleged terrorist perpetrator was certainly the case in the Merah affair in March 2012. Mohammed Merah, a French national, was killed by French police after he was accused of killing three French paratroopers in Montauban and three students and a teacher at a Jewish school in Toulouse. It was later discovered that not only did the French Central Directorate of Internal Intelligence (DCRI) have a dossier on Merah but that it tried to recruit him as an agent. Merah traveled with ease to Afghanistan and Pakistan with the foreknowledge of French intelligence. The then-governing conservatives of President Nicolas Sarkozy and the opposition, now ruling, Socialist Party, conspired to cover up Merah’s links to French intelligence.
The deadly 1980 attack on the Bologna train station in Italy began, in earnest, the modern era of using false flag attacks in waging asymmetric warfare. Although the Italian government and media originally blamed the bombing on leftist radical Italian guerrillas, it was, in fact, carried out by an underground fascist cell that obtained the bomb materials from hidden caches belonging to the secret NATO “stay behind” paramilitary network known generically as “Gladio”.
By blaming leftist guerillas for various terrorist attacks in Europe, NATO was able to convince its members to host US offensive cruise missile systems and keep NATO tightly-bound as an agent for US foreign policy goals, including facing down the Soviet Union. Today, with Islamist terrorists replacing leftist guerrillas as NATO’s chief raison d’être, policymakers on both sides of the Atlantic have used the terrorist attacks in Brussels and Paris to call for an end to Belgium’s unruly federal system of two states – Flanders and Wallonia – within one. Belgium, the neoconservative-slanted policy wonks believe, would be better off with a strong central government and strong centralized intelligence and security forces. That NATO message is not merely for the attention of Flanders and Wallonia but also for separatists in Catalonia, Scotland, Corsica, Wales, Veneto, and other independence-minded regions within NATO borders.
NATO, on behalf of a personal data-hungry United States, also wants to see unfettered access by European and American intelligence and security services to databases on air travelers in Europe. European data protection officials have been reticent about sharing such personal data with the United States, particularly after the Edward Snowden revelations about how the US National Security Agency abuses such data.
The question must be asked: If Western European intelligence had advance knowledge of Paris I, Paris II, and Brussels, why was preventive action not taken? If governments ‘let it happen on purpose’ (LIHOP) meaning, allow planned terrorist events to occur without disruption, those governments can rush their counter-terrorism ‘wish list’ of massive surveillance and larger security and defense budgets into quickly-passed legislation amid the resulting climate of fear. No politician wants to be seen as weak on security, particularly after major terrorist attacks.
One such tell-tale sign of a false flag operation is the convenient discovery by police of evidence linking attacks to the perpetrators, be they unknowing double agents or patsies who believe in whatever cause has been dangled before them.
One sign of a false flag operation is that ‘evidence’ linking the intended perpetrators to the crime scene is always conveniently discovered after the event. French police claim they were able to pin the Paris I attack on two Franco-Algerian brothers, Cherif and Said Kouachi, because Said, the eldest brother, left his French identification card in a black Citroen used as a getaway car. Police would not say whose identification card they found. Some French security experts warned that the ID card may have been purposely planted in the car to confuse the police. Police also conveniently found Molotov cocktails and Islamist jihadist flags inside the getaway car.
In the case of Brussels, a taxi driver who said he believed he picked up the Bakraoui brothers and Laachraoui in the Schaerbeek neighborhood of Brussels and drove them to Zaventem, contacted the police after the explosions. The cab driver recalled that it was suspicious that the three passengers did not want him to help them with their extremely heavy luggage. When the police raided the pick-up address, they found bomb-making chemicals, detonators, and a suitcase packed with nails and screws. Also discovered was the signature black and white ISIL flag. But there was another convenient clue found in a trash dumpster near the terrorist apartment: a computer with the last testament of Ibrahim el Bakraoui. The terrorist, who Erdogan insists was expelled from Turkey for his radical views, wrote that he “is in a rush, not knowing what to do, being looked for everywhere, not feeling safe and if this goes on, he risks ending up in a cell”.
If Brussels goes according to script, the European Union will soon implement a draconian surveillance regime throughout Europe. Europeans will find their freedom of movement throughout the European space to be restricted while Europe continues to take in more migrants from the Middle East and North Africa. And among these migrants will be jihadists looking at carrying out more Paris- and Brussels-like attacks. And the European population will find themselves powerless in the face of such a vicious cycle of terrorist events and more migrants.
Share this:
Related
March 27, 2016 - Posted by aletho | Civil Liberties, Deception, False Flag Terrorism, Timeless or most popular | European Union, ISIL, NATO
No comments yet.
This site uses Akismet to reduce spam. Learn how your comment data is processed.
Featured Video
I might get killed for posting this
or go to
Aletho News Archives – Video-Images
From the Archives
The Infrastructure of Impunity
Lies are Unbekoming | February 6, 2026
Jeffrey Epstein is back in the news. Names are circulating, documents are being released, and the public is once again asking questions that were never adequately answered. This essay exists because Whitney Webb already answered many of them—but her two-volume work One Nation Under Blackmail (Trine Day, 2022), totaling over 900 pages of densely documented investigation, is long enough that few will ever read it. What follows is intended as a surgical extraction of the essence of both volumes: the core argument, the key evidence, and the framework that makes sense of what would otherwise appear to be isolated scandals.
Webb’s research relies on court documents, congressional testimony, declassified files, and contemporaneous reporting from outlets including the New York Times, Washington Post, Washington Times, and Wall Street Journal. Readers seeking full documentation are directed to her work.
Webb does not identify a singular “they” controlling these operations. Her framework documents intersecting networks—intelligence agencies, organized crime syndicates, financial institutions, billionaire philanthropic circles—that converge around specific operations and individuals. The structure she describes is not a pyramid with a hidden apex but a web of mutual interests, where different nodes serve different functions and no single actor exercises total control. This analytical approach distinguishes her work from cruder conspiracy narratives that posit a unified secret group. The infrastructure persists not because someone commands it but because all participants benefit from its continuation.
This essay synthesizes her documented evidence into a narrative argument about sexual blackmail as a technology of political control—one that has operated continuously, adapted technologically, and survived repeated partial exposure. … continue
Blog Roll
-
Join 2,405 other subscribers
Visits Since December 2009
- 7,332,270 hits
Looking for something?
Archives
Calendar
Categories
Aletho News Civil Liberties Corruption Deception Economics Environmentalism Ethnic Cleansing, Racism, Zionism Fake News False Flag Terrorism Full Spectrum Dominance Illegal Occupation Mainstream Media, Warmongering Malthusian Ideology, Phony Scarcity Militarism Progressive Hypocrite Russophobia Science and Pseudo-Science Solidarity and Activism Subjugation - Torture Supremacism, Social Darwinism Timeless or most popular Video War Crimes Wars for IsraelTags
9/11 Afghanistan Africa al-Qaeda Australia BBC Benjamin Netanyahu Brazil Canada CDC Central Intelligence Agency China CIA CNN Covid-19 COVID-19 Vaccine Donald Trump Egypt European Union Facebook FBI FDA France Gaza Germany Google Hamas Hebron Hezbollah Hillary Clinton Human rights Hungary India Iran Iraq ISIS Israel Israeli settlement Japan Jerusalem Joe Biden Korea Latin America Lebanon Libya Middle East National Security Agency NATO New York Times North Korea NSA Obama Pakistan Palestine Poland Qatar Russia Sanctions against Iran Saudi Arabia Syria The Guardian Turkey Twitter UAE UK Ukraine United Nations United States USA Venezuela Washington Post West Bank WHO Yemen ZionismRecent Comments
eddieb on I might get killed for posting… Bill Francis on I might get killed for posting… loongtip on Beijing cancels Panama deals a… loongtip on Showdown loongtip on New York Bans Israel-Linked Te… loongtip on Trump tells India to stop purc… eddieb on The Old Testament and the Geno… papasha408 on Trump’s war posturing against… Coronistan on This is How We Should Have Res… Coronistan on NO MANDATES, NO PROFITS: MODER… Lutz Barz on Russia Vows to Protect Its Oil… loongtip on Russia Vows to Protect Its Oil…
Aletho News- Ten elected West Bank lawmakers held in Israeli prisons
- The Gaza Ceasefire Has No Phase Two, Only a Permanent Limbo
- DOJ records show Jeffrey Epstein donated thousands to Israeli army, Jewish National Fund
- Is Canada Really Warming?
- Climate Scientist Who Predicted End Of “Heavy Frost And Snow” Now Refuses Media Inquiries
- The reality of Trump’s cartoonish $1.5 trillion DOD budget proposal
- NATO’s ‘Agent Rutte’ in blatant sabotage of Ukraine peace negotiations
- ‘Fact-checking’ as a disinformation scheme: The Brazilian case of Agência Lupa
- I might get killed for posting this
- The EV Car Crash
If Americans Knew- An error has occurred; the feed is probably down. Try again later.
No Tricks Zone- Germany’s Natural Gas Storage Level Dwindles To Just 28%… Increasingly Critical
- New Study Rebuts The Assumption That Anthropogenic CO2 Molecules Have ‘Special’ Properties
- Climate Scientist Who Predicted End Of “Heavy Frost And Snow” Now Refuses Media Inquiries
- Polar Bear Numbers Rising And Health Improving In Areas With The Most Rapid Sea Ice Decline
- One Reason Only For Germany’s Heating Gas Crisis: Its Hardcore-Dumbass Energy Policy
- 130 Years Later: The CO2 Greenhouse Effect Is Still Only An Imaginary-World Thought Experiment
- New Study Affirms Rising CO2’s Greening Impact Across India – A Region With No Net Warming In 75 Years
- Germany’s Natural Gas Crisis Escalates … One Storage Site Near Empty …Government Silent
- Polar Colding…Antarctica Saw Its Coldest October In 44 Years!
- New Study: Sea Levels Rose 20 Times The Modern Rate During The Roman Warm Period
Contact:
atheonews (at) gmail.com
Disclaimer
This site is provided as a research and reference tool. Although we make every reasonable effort to ensure that the information and data provided at this site are useful, accurate, and current, we cannot guarantee that the information and data provided here will be error-free. By using this site, you assume all responsibility for and risk arising from your use of and reliance upon the contents of this site.
This site and the information available through it do not, and are not intended to constitute legal advice. Should you require legal advice, you should consult your own attorney.
Nothing within this site or linked to by this site constitutes investment advice or medical advice.
Materials accessible from or added to this site by third parties, such as comments posted, are strictly the responsibility of the third party who added such materials or made them accessible and we neither endorse nor undertake to control, monitor, edit or assume responsibility for any such third-party material.
The posting of stories, commentaries, reports, documents and links (embedded or otherwise) on this site does not in any way, shape or form, implied or otherwise, necessarily express or suggest endorsement or support of any of such posted material or parts therein.
The word “alleged” is deemed to occur before the word “fraud.” Since the rule of law still applies. To peasants, at least.
Fair Use
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more info go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
DMCA Contact
This is information for anyone that wishes to challenge our “fair use” of copyrighted material.
If you are a legal copyright holder or a designated agent for such and you believe that content residing on or accessible through our website infringes a copyright and falls outside the boundaries of “Fair Use”, please send a notice of infringement by contacting atheonews@gmail.com.
We will respond and take necessary action immediately.
If notice is given of an alleged copyright violation we will act expeditiously to remove or disable access to the material(s) in question.
All 3rd party material posted on this website is copyright the respective owners / authors. Aletho News makes no claim of copyright on such material.

Leave a comment