Go Back  

Trauma-based Mind Control? (or Torture-porn?) 

Current Rating:

Join NowJoin Now
 
  #31  
Old 10-13-2010, 01:46 PM
8esteve
Offline:
So Fucking Banned
Poster Rank:257
Join Date: Dec 2009
 
Mentioned: 0 Post(s)
Quoted: 0 Post(s)
Activity Longevity
0/20 14/20
Today Posts
0/11 sssss3294
Re: Trauma-based Mind Control? (or Torture-porn?)

The Science of Mind Manipulation by Psychological Programming Methods:
Behavior Modification, Psychological Motivation and NLP
One way to explain how the slaves are conditioned is to relate an episode where the two authors observed a Satanic family carrying out conditioning to reinforce their children’s mind control as their family "ate" at a restaurant. After relating this interesting incident, the chapter will cover the various psychological methods used to condition slaves.

Observations of a Satanic Family
Carrying Out Monarch Conditioning on Their Children
The husband of the family was about 28 and the wife was about 26. A young man (perhaps an uncle of the children) about 25 also sat at the table with them. The family had 5 children, ranging from about 1 1/2 years old to about 7 years old. During the entire time we watched them, which was over an hour, we never saw one act of love, not one act of nurturing on the part of the parents. Everything was programming, programming and more programming. The husband had an attitude of control over his children. He was a young somewhat wild cock-sure type. From piecing together things it was clear that he made a good salary and that he and his wife enjoyed profanity. His wife had the most dead looking eyes we have ever seen in a person. She looked every bit the part of a Satanic priestess of the worst type.

The young man of about 25 had a very large knife hidden on his back that we noticed only by close observation of his movements. Although it was 1 o’clock, the adults were calling their meal "breakfast."

The main male child was about 5 years old. He had an older sister and two younger sisters, and they all had a baby brother. During the entire time that the family was there, the children ate almost nothing. The 5 yr. boy munched on a watermelon rind, trying to draw some sustenance from it. Part of mind control is depriving the body of food. The poor children never once asked for anything; that is a clue that something wasn’t normal. During most of the time that the family was in the restaurant, the mother and father took turns shooting one question after another at the five year boy. The questions were like:

What is the capital of Florida? What is the 70th element on the periodical chart? What are the names of the first five presidents? What is the square root of 121? The boy would robotically answer each question successfully. The questions were not questions but programming and commands. The mother sternly said, "What make of car was that? That’s a question." (Actually what she was saying was a command.) Around this time they said, "Wake up, wake up, wake up." (hypnotic command.) A couple which was in the restaurant was watching how obedient the children were, and they were also overhearing how excellent this little boy could answer difficult rapid-fire questions. They were impressed and the lady came over to tell the parents how wonderful their family was. After oodling for 10 minutes over how great this family was the woman went on to other things. It was difficult for both of us watching to stomach the compliments this stranger was giving to these parents. The natural impulse was to get her to shut up her compliments. She naively made all these compliments little knowing, that these parents were practicing one of the most hideous if not the most hideous type of mind control invented.

Asking questions rapid fire is another mind-control technique. In fact, all of the elements of what Fritz watched at the table that day were practiced on Fritz, the co-author, when he was in Beast Barracks at West Point, USMA. The little girl was repeating her programming, "I don’t have anything inside me." She was actually singing it. One of the girls had different alters coming out and was having a conversation with herself between different alters (personalities). She placed her hand over her temple in scarecrow fashion (Wizard of Oz) programming. Her head movement was a dead giveaway to those of us familiar with Monarch programming.

The parents had chosen the spot to eat because of the large surreal picture above them on the wall with blue & red flowers, water and mountains. The picture was acting as a scrambling-scattering mechanism, when the boy studied the picture, which he did for the longest time in a trance. The middle girl was dropping crayons into a Styrofoam cup and saying "get into the fire." Then she would say "I’m purple." "I’m pink." "I understand you're purple." "I understand you’re pink." "Get out of here for a minute." What she was doing was giving the crayons personalities. In the Monarch programming, the person is totally dehumanized so that some alters think they are ribbons, some monkeys, some clowns, some dolls, some trees, some lions or tigers, etc. The sexual alters are often programmed to think of themselves as cats and butterflies.

While the girl was coloring, her father reached over the table without warning and took her colors, "You don’t deserve these colors and I should have taken them away before now. The girl had done nothing wrong. This is part of mind control. The person learns that there isn’t a right or wrong only that they must be obedient. The little girl did not even respond when her colors were yanked away. When the mom talked to them, she said "children"--she never once personalized things. The parents began another programming session and said something like, "I will spank you. If you don’t count then you can be spanked, we will count 20 times." The constant double messages were obviously breaking down the children to think as programmed rather than respond like normal people to the outside world. The woman turned to her little baby and said, "Tell daddy good-bye". When the child waved good-bye, the woman snapped, "You're not going anywhere." This serves to create confusion. Then she kissed him and said, "Baby, do you want a picture?"

We decided to say something to them, and we did so in the form of a compliment about their children. Neither parent showed any pride in the children when the earlier lady had gushedly complimented the children, nor when we complimented them with a sentence. Instead, when we complimented the children, the father began shooting off a series of difficult questions to the boy. This was simply more programming, but apparently he must have thought that we’d be impressed with the boy’s ability to answer difficult questions that seemed way beyond what many teenagers would know.

Two strange things happened during the course of our verbal interaction with this satanic family. First, the waitresses had given the family free ice cream coupons, but the parents gave them to us without the children even batting an eyelid. Second, I asked the father what the age of his children were and he didn’t know, or acted like he didn’t know. Then he blurted out, they are 1, 2, 3, 4, and 5 years old. His wife knew that that answer must have looked bogus to us, and she reprimanded him, "You don’t even know the age of your children." To which he replied, "Yes, they are 2, 3, 4, 5, and 6." His second answer was equally implausible, but his wife didn’t protest, and the poor mind controlled children were experiencing just one more element of Satanic mind control. They are not even allowed to realize how old they are. Dates, and times, and ages are kept very confused in the children’s minds for secrecy and control. Not only that, but by giving a hypnotic induction "1, 2, 3..." the father had lowered each of the alters which were holding the bodies of his children into a deeper trance. With these alters tranced, another word from the father could have easily pulled up other alters.

Other Items That Parents Do To Their Monarch Children
Double bind communication is commonly given multiples by all of their abusers. Some of these double binds are well thought out and some just occur due to the craziness of the entire thing. For instance, in ritual or programming, the child may have the option to stab or be stabbed. In fighting the programming, if an alter goes toward health, the programmers have set in a booby-trap. Which evil does the slave live with--the lies of the programming or the lies of the external world? How does one tell the truth to a therapist, when the therapist is not capable of hearing the truth, and yet still demands to be told the truth? Yes, double-binds abound.

Another trick is to alternate leniency with harshness. This trick is done in the military also, and has been worked with success by the Chinese government upon the people of Red China. When leniency is alternated with kindness, the effect is devastating and disconcerting because the person looses the ability to predict what is going to happen. Everyone likes to control his or her life. Predicting what is going to happen is part of a person’s mind gaining control over their environment. Even that control is stripped from a slave. They soon learn to quit trying to protect themselves, and they quit trying to think for themselves but docilely submit to whatever fate assigns them. The mind can’t figure life out, so it quits trying to understand life, and just fatally submits. Dr. Green (Mengele) was very gentle when drawing blood, and he was very gentle when giving the children X-rays. He would sweet talk them and give candy. But he was very sadistic when he’d follow this up with abuse.

The programmers have preferred to be inconsistent with the children like this. Soon the child doesn’t know what hate and love are anymore. The person, who claims he loves them, gives them torture or abandons them to be tortured by someone else. A third trick is to give the victim monotonous tasks, such as chanting or copying long amounts of written material. This helps prod the dissociation, and is a torture that doesn’t leave marks.

An Overview

All of the elements of mind control are incorporated into the Monarch program. If a person surveys what the everyday cult mind control which is NOT part of total Monarch mind-control looks like, you will find the same elements of everyday cult control also are employed at various places within the Monarch programming of a person’s alter system. (This didn’t happen by accident either, the Illuminati have examined all these lesser cults to see what they could borrow for their own mind control.) Some of the elements which the Monarch program shares with other typical types of cult mind control are:

1. The Needs Of Individuals Are Promised To Be Met, But Are Ignored For Group Goals. The Illuminati handler (master) will promise to meet individual needs of alters, but these needs are ignored for group goals. For instance, certain Monarch alters of a person’s system may be told they have no faces and no hearts. They are programmed not to see their faces and not to hear any heart beat. If a pulse monitoring machine is hooked up to the alter, the alter will go into a trance. For instance, the handler might promise faces and hearts but will never give them to the Monarch slave when he could. The promise is a control mechanism.

2. Isolation From The World, So That the Only Reality Is The Leader's Reality. The Illuminati isolates the slave so new ideas are available or allowed except their cult leader’s ideas. "Whatever the Papa Bear [master] says is reality." Each alter will only communicate with a few other alters. What this does is divide the person from their own parts. The will and mind is broken so that there is no organized resistance, nor any access to other alters who might know something. The slave will often be denied mother, grandmother, grandfather, aunts, sisters, children, grandchildren, & friends. They will be deprived of all naturally occurring relationships via the mind control. This doesn’t they mean exist in a vacuum, it means that the handlers will prevent natural relationships to develop. Isolation is very key and parts are made to feel like animals rather than people to isolate them from humanity. No ideas are allowed the slave to confront their programmer’s lies. They are programmed to hate Christ and the God of the Bible, so that they are isolated from the true God and His abundant spiritual resources.

3. The Person's Sense Of Identity Is Lost. The Monarch slave lose his/her sense of self to the cult and to the person’s master. No sense of where I begin & end, and where the Master begins and ends. The Monarch programming goes beyond what many cult have done, the alters are hypnotized to not see their faces, which is part of their identity.

4. Altered States and Hypnosis Is Used. The handlers/programmers use hypnotic techniques. They induce dissociation by songs, chanting, guilt inducing sessions, torture, isolation, as well as using songs, repeating triggers 3X, and lots of hypnosis.

5. A Sense Of Peace Is Induced, Especially When One Merges With Whoever Is Leading. The Head Of The Cult Will Take Credit For What The Slave Is. They induce a sense of peace leading to the fantasy of merging with leader, often suggested by leader. Then the victim has the abuser placed internally in them. For example, the master may say he was one with the slave and that he "created" the slave. The handler will claim to be God.

6. Out Of Body Experiences. Out of body experiences (O-B-E’s) are induced by the torture & Illuminati training, as well as splits.

7. Sensory Bombardment And Fatigue. Sensory bombardment used, such as prolonged sleep deprivation, environmental control, and love bombing. Cages, love bombing of certain alters, and a sterile nursery/toddler room are employed.

8. Critical Thinking And Disagreeing With The Leader Is Forbidden. The slave must suspend ability to think critically or disagree with leader. The slave must never question the Master (also called the handler), never get angry at the handler, or else the slave wants to be punished. The slave must always obey or pay with pain. The alters are splintered from others so can’t use their information for analysis.

9. The slave must reorganize reality through identification with aggressor (Illuminati master). Strong identification is created with the master. The slave is programmed to protect the master.

10. Individual sees locus (location) of control with the Master and the Illuminati rather than self. Programming overrules self.

11. Black and white thinking is created by the programming. Many of the Gnostic cults (see the Fritz’s Be Wise As Serpents book for an examination of what a Gnostic cult is) have employed these tactics. People in the Jehovah’s Witnesses and CUT, which are Gnostic cults, as well as members of many other groups, such as the CIA will recognize that these methods were used on them. (The CIA is in reality just another cult, and an Illuminati-controlled cult at that).

Isolation
For children who are being taken out of Day Care Centers and programmed without their parents knowledge, they will be isolated from their real parents. The abusers will tell the children that they are actually the "real parents" and that they intend to come and take the child away from its parents later. They will make the innocent child feel like it is cut off and rejected by everyone including the world at large. In a sense, this is true, because the child is expected to endure the most horrible abuse and yet has no one to talk to. Feelings of isolation and despair take control over the child’s mind. These ways of thinking are also spiritually enhanced by rituals to bring in demonic spirits that will help insure the child is dominated by feelings of hopelessness.

During the entire life of the slave, the handlers and programmers are always trying to sow distrust in the victim. The programming is often designed to sow distrust in everyone on the outside except the godlike figure the Master. Even the Master is not trusted so much as feared and obeyed by the slave.

The slave is also subjected to isolation as a child being placed into freezers, closets, dark rooms, boxes and isolation tanks. Sensory deprivation is a serious thing, that has been discovered to cause people to hallucinate. The brain goes into an altered state just from sensory deprivation. Polar explorers who see only white for days on end must deal with this danger.

Handwriting Modification
Psychology developed over the years a number of projective, objective and subjective tests of personality. Ludwig Klages (of Germany), H.J. Eysenck (of England), and M.N. Bunker (of the U.S.) are some of the notable researchers who took handwriting analysis out of the occult realm and into the scientific realm. (The co-author, Fritz, happens to be a certified Graph-analyst through IGAS, who has done Graph-analysis professionally. IGAS has strict standards not to allow members to do anything associated with the occult, but insists they keep their work on a scientific basis).

When a person writes, he will use about 200 separate muscles in the hand, arm, and body. The mind coordinates all these muscle movements. A good handwriting analyst has about 800 different things that he can look for in a sample of handwriting, such as how hard did the writer write with his instrument, how big, where did he start on the paper, how did he cross his "t" etc. In other words, the mind in order to write had to make hundreds of decisions within seconds. There are too many decisions to make them all the decisions consciously. This is why document examiners can authenticate signatures. Most of the many decisions as one writes are done subconsciously, and the decisions are influenced by state of mind, personality, the state of the physical body, and the environment.

The good handwriting analyst is able to work backwards. Why was the decision made to make the capital P look like an L? Why did the person start their writing half-way into the paper and waste half the piece of paper? Through scientific studies and observations, a vast wealth of understanding has developed by graphologists about why certain decisions are made. Some graphologists use a wholistic method, others like graph-analysts, analyze each stroke. Both methods will give the same results if the handwriting analyst is skilled at applying the principles of graphology.

Handwriting analysis has not gotten the credibility it deserves, in part, because it is such a powerful diagnostic tool, the intelligence agencies have wanted to keep it to themselves. However, the nation of Israel, uses handwriting analysis to hire with, and a high percentage of the businesses use it in hiring also. The nation of Israel has had a high rate of success with handwriting analysis.

How does handwriting analysis play a part in the mind control? Several ways. A number of the programmers are skilled in handwriting analysis. They are well aware that the abuse of their slaves will show in the handwriting. Through behavior modification (usually torture) the front alters are trained to write in a fashion that hides the abuse. The abuse will show in the handwriting of most of the alters, so many of them are programmed not to read or write. This is why some of the child alters will have older alters write for them.

The programmers were also aware of how the mind heals/changes itself via handwriting therapy. If the mind will place enough energy into writing a particular way, it will go ahead and put enough energy into becoming what it writes. In other words, if I am lazy, but I get determined enough to focus the brain so that it doesn’t make handwriting strokes that indicate laziness, then my brain will also change its lazy attitude in other ways. In other words, I can begin to change a personality trait by working on the handwriting decisions that stem from that trait. The programmers can and do help modify their slaves’ personalities this way. They of course will employ a number of personality changing techniques as a group package. The goal is to bring as much pressure to bear as possible to get the original trait modified. This will be done in accordance with the programming goals for the various alters within a system. Remember, some alters need to be outgoing and other reticent, some melancholic, and others sanguine or choleric. The programmers know what they want and how to modify what they have to get the temperament and personality traits they want.

Behavior Mod (Modification)
Behavior modification comes in various packages. One package has been called ELT (Electrolytic Trtmt) developed by H.C. Tien. One simple version of behavior mod is to find out what someone has done which is good, and praise and reinforce that behavior. Then state the goal. And then continue to reinforce promptly the good things the person is doing. The goal in mind must be measurable. An example of this, might be for a handler to praise his kitten and to purchase it nice things if a client is satisfied with the sexual service he got. The reinforcement needs to be soon, and appropriate. "Thinking behavior" is a term that behavior mod scientists use. "Adverse conditioning" is another.

Anectine, which paralyzes the body and makes one think they are suffocating, can be used for aversion conditioning. The victim is told not to do a particular behavior or else experience discomfort. When behavior modification is done in programming, you can be sure that there is paper work done to chart the progress. Rather than worry about what a person is thinking, the behaviorist charts a person’s behavior and then gives reinforcements of correct behavior (or the opposite adverse rewards of punishment) to modify it.

Victims are conditioned to carry out certain behaviors. If an alter does something wrong, there is an immediate consequence set up for it. Soon it is conditioned not to do what the programmer doesn’t want. The behavior mod scientists believe that creativity can be controllable. When a child creates a new form he is rewarded. Soon the child learns to create. Illuminati Delta-Beta alters will be trained in espionage. They will be trained to recognize a person’s physical identity instantly. One method of training which has been used is to teach people to remember reflexively rather than analytically. Thousands of faces or thousands of license plates, or whatever are flashed on a screen, and when a repeat is shown the person must press a button. If a mistake is made, the slave is treated to a nasty little shock. After a while a person develops the correct reflexes.

Slaves are being trained in recognition from the time they are small children, this is important so that they can build their internal worlds with mirror images and other confusing things. The following "deeper" programming is an example of classical conditioning. The child’s hand is cut so that the child goes into a trance of shock, and then each time they use the word "deeper" they cut deeper to enhance the shock/trance state. By pairing the word with this trauma, when they are through, the word "deeper- asleep" will throw some alters instantly into a very deep trance.

Psychological Motivation
When a person has been knocked down and degraded, traumatized by poor sleep and little food and water, he is more susceptible to suggestion. He can then be told that he himself is the cause for his own degradation. If he just behaves betters, his treatment will improve. When the person accepts his guilt for the bad situation he is in, then the programmers give a target for the blame--God, country, or whatever the person had depended upon. The programmer then aggravates these hostile feelings, and keeps nurturing them until the person is livid with anger toward the object of blame. The victim is coached to project their blame onto this target of blame. When this is accepted, the conditions for the victim improve.

Once the person has targeted their blame, then the Programmer becomes the friend to help one fight the evil target. Anything and everything is rationalized in this "All becomes fair in war." Enemies are easy to create. People readily accept them. The intelligence community has long played on people’s fears about communism.

People might be shocked to realize that this was one of Hitler’s favorite methods to recruit loyalty from people. It is why the Nazi’s secretly burned down the Reichstag, and then blamed the communists. The Illuminati are masters at making Christianity the fault for everything from homosexual suicide to the world wars.

Neuro-Linguistic Programming
NLP means Neuro-Linguistic Programming, which are practical communication skills. Programmers were using NLP before it became known as NLP in 1976. Some NLP techniques are obvious truths, and some are more subtle truths in dealing with human nature. NLP can be more of an art, than a science. One of the truths in NLP is "Everyone lives in their unique reality built from their sense impressions and individual experiences of life, and we act on the basis of what we perceive our model of the world." (O’Connor, Joseph & John Seymour. Introducing NLP. San Francisco, CA: Aquarian Press, 1993, p.4). That is why alters have their worlds created by their programmers, and then the occult alters are indoctrinated with satanic beliefs. ( Chap. 11 Part A deals with this indoctrination).

Let’s list some other "assumptions" that NLP practitioners believe in without explaining them:

* Almost all communication is non-verbal.

* Knowledge of content is not required to make behavioral changes.

* Our internal representation of the world is not the world but only our own feeble map of it. The map is not the territory.

* People will choose predicates which correspond to what representational system they are using, and which one they choose can be seen from eye accessing cues.

If one studies NLP, one will find that NLP books such as Basic Techniques Book II by Clifford Wright, teach people how to create dissociative states which are alternate personalities, and that they teach people how to develop different states of mind, and pseudo multiple personalities. It is difficult to express all the different cross-overs that NLP has with Monarch Programming, but at different times the concepts of NLP certainly would be helpful to the handlers. However, it must be stressed that NLP IS NOT Monarch Programming.

One of NLP’s suggestions is that a person assess their "present state" and their "desired state." This simply common sense suggestion is often carried out during programming. The Programmer will tell the victim WHAT KIND of alters they want produced and HOW MANY when they begin the torture. The motivation to do this is also suggested by NLP and is accomplished by the programmers threats to the person’s life, and by the person’s desire to be free of pain and torture. Milton Erickson’s work on altered states has been picked up by NLP. Likewise at least part of the programming hypnosis is based on Erickson’s ideas.

Clues For Observing A Victim
Lateral Eye Movement (LEM) can be a useful skill to the programmer. Monarch victims are sometimes programmed so that the real LEM is not done publicly by the victim, to prevent people from getting visual clues as to what is going on in their mind. A person who is thinking in visual images will generally speak more quickly and at a higher pitch than someone who is not. These types of clues help the Programmers be more skilled, but it isn’t a necessity.

Anchors
NLP researchers have noticed that people have emotional states in which the entire body will take up a posture in carrying it out. Memories can come into a person that causes the body to take up the negative states again. The NLP practitioners have developed language which includes such terms as Anchors, emotional states, and triggers. These words are used to describe ideas that have long been in use.

For instance, let’s say that when you heard a particular song at some point in your life you were having a good time (emotional state). Now that every time you receive a trigger to that memory, such as the song, you regain that good feeling that is attached to the memory of the song. Every time you hear the song, you feel good, which then in turn, continues to act as reinforcement of the association of a good feeling to the song.

A stimulus that is linked to and triggers a physiological state or emotional state is called an anchor. Our lives are filled with naturally occurring anchors, such as our favorite childhood smells, or the alarm clock. One of the Illuminati kingpins in Germany, a Krupp, liked the smell of manure, and built his house so he could smell horse manure all day. NLP is the art of building associations with an anchor. A past emotion can be linked to something today. If a person is afraid of public speaking, then a good feeling can be linked to giving talks. The skilled programmer will anchor an emotion with several sense cues--including auditory, visual, and touch. The person visualizes an emotional state from the past. When the state is reaching its peak, the anchor is placed in. The anchor needs to be unique, distinctive, & easy to repeat in the exact form that it was done.

Much of the trauma-based programming is actually setting anchors using extreme trauma. When the anchors are tested (fired), if the emotional state is pulled up, then the anchors have worked. Firing two separate anchors at once is called collapsing anchors. Two separate states can be fired at once. There is a methodology for collapsing anchors together.

Future Pacing
Future pacing can be used to help program a person toward his occupational objective which was charted for the victim when they were small. Future pacing is a mental rehearsal that is practiced in the imagination so that the person can deal with some future challenge. Expectations can often become self-fulfilling prophecies. NLP also is used to teach people how to learn. It teaches people to learn a variety of methods for a single skill. However, this type of self-help info is not freely given to the slave. It might be used if the programmers needed to develop the person hypnotically in a certain direction.

Pacing For Hypnosis
Because Milton Erickson stands out as a genius among those who have used hypnosis, and people are still trying to figure out fully what he did, it is appropriate to mention his work. We don’t know how these ideas of Milton Erickson’s are used by the Programmers. We do know that the CIA has paid close attention to his ideas, and that some of the Programmers have some of the smoothest tongues. If there is some way to utilize Erickson’s work to help control Mind-controlled slaves, then the Intelligence agencies have no doubt found it.

On the flip side, several deprogrammers used Ericksonian methods to unlock the programming of the people they want to help. What we describe in this section is just a small sampling of Erickson’s methods.

Another type of NLP pacing besides the one just previously mentioned was developed by Milton Erickson. He would gain rapport with anyone by describing to them what they were feeling, hearing and seeing. He would induce a peaceful state by speaking slowly, using a soft tonality, and pacing his speech to the person’s breath. Gradually hypnotic suggestions are introduced to lead them into what is called "downtime." He would gently encourage people with gentle suggestions such as, "It’s easy to close your eyes whenever you wish to feel more comfortable..."

But you may wonder how can anyone know what someone else is thinking? Erickson developed language that was vague enough for people to match their own thinking to what he described. He would use smooth transitional words such as "while", "and", and "as". The type of vague sentences he would say are "It is well known that people can read books and make changes." Milton Erickson learned to distract the dominant brain hemisphere, and also speak in a complex way that all seven (plus or minus two parts of the conscious mind) would get engaged in trying to figure out what his ambiguous statements meant. Milton found that he could say anything if he set it up in the context of someone else saying it. He also found that the unconscious mind does not process the linguistic negative. Rather than tell a child "Don’t fall" tell it "Be careful."

Reframing With Metaphors
Metaphors, some from Druidism or from some other occult teachings, are used by the Programmers. For instance, the seasonal changes that leaves on trees make is an example of a programming metaphor.

For those readers who don’t know what refraining is, the following in the book Refraining, Neuro-Linguistic Programming and the Transformation of Meaning by Bandler and Grinder (Moab, UT: Real People Press, 1982) is an excellent story to explain it.

"A very old Chinese Taoist story describes a farmer in a poor country village. He was considered very well-to-do, because he owned a horse which he used for plowing and for transportation. One day his horse ran away. All his neighbors exclaimed how terrible this was, but the farmer simply said ‘Maybe’. "A few days later the horse returned and brought two wild horses with it. The neighbors all rejoiced at his good fortune, but the farmer just said ‘Maybe’. "The next day the farmer’s son tried to ride one of the wild horses; the horse threw him and broke the leg. The neighbors all offered their sympathy for his misfortune, but the farmer again said ‘Maybe’. "The next week the conscription officers came to the village to take young men for the army. They rejected the farmer’s son because of his broken leg. When the neighbors told him how lucky he was, the farmer replied, ‘Maybe’."

The meaning of an event depends upon the FRAME we place upon it. Those frames are perceptions. Occult fairy tales are great for refraining events. A frog turns into a prince. Rudolf's embarrassing red nose becomes a guiding light to bring happiness to people. Many of the common things in our everyday life are refrained by the Programmers to have hidden mind-control meanings. The Teddy Bear the child is given by her Daddy is to remind her how helpless she is to prevent him from raping her. The carousel toy is to remind the child of dissociation and the internal carousel built into the mind. Many of the things that parents, who are intentionally raising a programmed child, do, look nice on the outside unless one can reframe what they are doing in the context of total-mind-control based on trauma and fear. Refraining can be done by collapsing anchors. For instance, the sober part of an alcoholic and the drunk state of the alcoholic are given the same anchor and then these are collapsed together to get the drunk to stay sober. The two states are taken in a process of integration for the refraining to occur. Refraining someone with MPD is almost impossible without integration, but refraining a particular alter with metaphors is not out of reach. The programmers have much more chance to reframe while they program than the therapist, because the programmers set in defensive programs to prevent other’s from reframing.

Power Words, Reversals And Puns

In NLP, 7 senses are taken into consideration. First we see, then we hear, and finally we have the senses of internal kinetics and our emotions. The Programmer also takes into consideration what are called "power words". Those are words which have specific meaning for the person. The programmers also love to use reversals and puns, for instance in Disney’s Ducktales the character says, "I stole ‘em fair and square." Other typical reversals are "Life is death, and death is life", "Pain is love, and love is pain." Another example is one used on Cathy O’Brien, where the words "Service Entrance" were used to mean "Serve us. En-Trance." Naming an alter "Allison Wonderland" - a pun on Alice in Wonderland -is another example of a programming pun. The programmers love to use these types of things.

The Mind's Natural Alarm Clock
The programmer’s have made use of the mind’s natural ability to wake itself up like an alarm clock' if it wants. Slaves may be given the coded message that the draconian enforcer will come by to pick them up at 1 a.m. The slave will automatically wake up in the middle of the night, and in a trance like a sleep walking, a deep LGP alter will take the slave out to the street to be picked up. Many slaves are being used at night without their families suspecting anything. Sleeping patterns are also related to personality. REM sleep is believed to help restore the effectiveness of certain brain pathways in which norepinephrine is a transmitter substance. By programming different alters to have certain sleep patterns, their personalities can be adjusted. Of course this is done in conjunction with many other aspects of mind control.

The Right Brain And The Unconscious

The Programmers are also aware that right-handed people use their left brain hemisphere for highly conscious processes which require good attention, focus and intentional decisions; while their right brain will tend to work on the unconscious and automatic chores. Split brain programming takes this contrast into account.

Reply With Quote
  #32  
Old 10-13-2010, 01:49 PM
8esteve
Offline:
So Fucking Banned
Poster Rank:257
Join Date: Dec 2009
 
Mentioned: 0 Post(s)
Quoted: 0 Post(s)
Activity Longevity
0/20 14/20
Today Posts
0/11 sssss3294
Re: Trauma-based Mind Control? (or Torture-porn?)

The 10th Science - Using Spiritual Things To Control A Person
THE SPIRITUAL FOUNDATION FOR PROGRAMMING LAID BY THE PROGRAMMERS ARE THE GENERATIONAL SPIRITS WHICH ARE LAID IN THE WOMB & INTRODUCED TO THE CHILD WHEN VERBAL AS THE CHILD’S "FRIEND" & "SPIRIT GUIDE".² A CLAN’S GUIDING SPIRIT IS ALSO CALLED A TOTEM.

THE KEEPERS OR GUARDIANS PROTECT THE SPIRITS WITHIN AN ILLUMINATI SYSTEM. THERE WILL BE ONE ALTER WHICH KNOWS ALL THE DEMONS WHICH HAVE BEEN LAYERED IN. FROM THE AGE OF FIVE, THE CHILDS CULT PARTS WILL BE TAUGHT THE² GENEALOGICAL HISTORIES OF THEIR SPIRIT GUIDES. AT THE AGE OF 12, SOME CANDIDATES FOR AMER. TRIBAL CHIEFS HAD TO WAIT IN THE WILD FOR THEIR TOTEM TO GUIDE THEM. THEY MUST REMAIN IN THE FOREST UNTIL THEIR GUIDING SPIRIT APPEARS. THIS IS WHY THE ILLUMINATI STUDY THE XIBALIAN MYSTERIES WRITTEN IN THE POPOL VUH [THE MAYAN BOOK OF THE DEAD, WHOSE INITIATIONS USED PSILOCYBAN MUSHROOMS].

²

Saving this chapter for last (of the mind, body, spirit chapters) is like saving the best wine for last. The authors know first hand that the Illuminati fears more than any other information getting out, that the spiritual aspects of programming would be revealed. This chapter has been organized into the following parts:

A. Using spiritual principles against a person

B. How the Monarch program miniaturizes what is done on a larger scale

C. Dehumanization

D. Fear

E. The use of guilt, shame & ridicule & anger

F. Teaching that the master is God

G. Portals, focal points

H. Vows & Oaths

I. The use of demon possession, layering, etc.

J. The use of angel alters

K. The use of Scriptures In Programming

L. Theta programming

The 10th science includes some of the most secret elements of the Monarch programming, and certainly some of the most controversial. Psychologists and psychiatrists are an unlikely group to delve into demonology, although there have been a number of studies done in this area. Six examples of such studies:

* ¸ Braude, S.E. (1988). "Mediumship and multiple personality." Journal of the Society for Psychical Research, 55, 177-195.

* ¸ Krippner, 5. (1987). "Cross-cultural approaches to multiple personality disorder: Practices in Brazilian spiritism." Ethos, 15, 273-295.

* ¸ Rodgers, R.L. (1991). "Multiple personality and channeling." Jefferson Journal of Psychiatry, 9, 3-13.

* ¸ Rogo, D.S. (1987). "The spiritual side of multiple personality." In D.S. Rogo, The infantile boundary: A psychic look at spirit Possession, madness, and multiple personality (pp. 243-246). New York: Dodd, Mead, and Co.

* ¸ Ronquillo, E.B. (1991). "The influence of ‘Espiritismo’ on a case of multiple personality disorder." Dissociation, 4, 39-45.

* ¸ Smith, RD. (1981). "Hypnosis, multiple personality, and magic: A case study." Voices: the Art and Science of Psycho-therapy, 17, 20-23.

The Gamma programming is the secret layering in of demons. However one wants to describe these demons--the victim has to deal with their "reality". The ceremonies to demonize the victim occur even before they are born. Generational spirits are very important to determine how the Programmers program a person. But this 10th science goes way beyond just demonology, because it deals with the fundamental issues that effect our views of God, our fellowship with Almighty God, and our view of the occult sciences of astral projection, ESP, telepathy, etc.

²

Part A.
The Use Of Spiritual Principles To Isolate The System From God
In the course of deprogramming Monarchs, and rubbing shoulders with programmers, it became clear that the programmers of the Monarch program are fully aware of the spiritual principles which are in operation for everyone. In 1930, a leader of one of the groups which today carries out trauma-based mind-control, wrote that the occult masters are not interested in uplifting the souls of men, but that "These Masters. .. have in reality no interest in soul or astral development, except as a means of forming passive illuminized tools, completely controlled in mind and actions."

The Monarch victims of today are the tail end of centuries of efforts by the Kaballists, Freemasons, and the Illuminati adepts to completely control other human beings.

The following quote comes from a communist manual on how to brainwash a nation. It could just have well been written by Monarch Mind-Control Programmers.

"The first thing to be degraded in any nation is the state of Man, himself. Nations which have high ethical tone are difficult to conquer. Their loyalties are hard to shake, their allegiance to their leaders is fanatical, and what they usually call their spiritual integrity cannot be violated by duress. It is not efficient to attack a nation in such a frame of mind. It is the basic purpose of [mind-control] to reduce that state of mind to a point where it can be ordered and enslaved. Thus, the first target is Man, himself. He must be degraded from a spiritual being to an animalistic reaction pattern. He must think of himself as an animal, capable only of animalistic reactions. He must no longer think of himself, or of his fellows, as capable of ‘spiritual endurance’ or nobility... "

As it seems in foreign nations that the church is the most ennobling influence, each and every branch and activity of each and every church, must, one way, or another, be discredited. Religion must become unfashionable by demonstrating broadly, through pyscho-political indoctrination, that the soul is non-existent, and that Man is an animal. Later this chapter will describe how a person is dehumanized.

One spiritual principle is that if you can get a person angry at God, you can get that person to commit any sin. Great effort is taken, via staged events to make the victim being programmed certain that God has rejected them. For instance, some victims had someone play God and walk away from them when they needed help in a life & death situation. The 1980 Hollywood movie Altered States, which is about a university professor in the 1960s who experiments with mind-altering drugs and sensory deprivation tanks, shows some scenes where God turns into a goat. Some of the religious scenes in this movie, match some of the anti-God/religious programming of some Monarch slaves.

The Monarch slaves are repeatedly warned that God is cruel and judgmental, and that He wants to destroy them for the wicked things they have done. Bible verses that tell of the wrath of God & God’s anger are read to the victim.

An example of how the slave is programmed to hate God will now be given.

A hypnotic drug will be given the victim when they are about 6 years of age. This will relax the person and allow the programmers to take the child into the deepest trance, so that the programming will be sure to enter into the very fiber of the child’s being. After several hours of being in a deep trance, as the drug begins to wear off, the child will be strapped very secure into a tight fitting coffin. A man with long white hair, and a long robe, with sandals, staff and a white robe will present himself before the child, and announce that he is "God the great I AM". Then "God" will look in a big book and announce he cannot find the person’s name so he will have to send the person to hell for being bad. The coffin will then be lowered into a deep pit, like a mine shaft, and the victim will be told that when they can no longer hear God’s voice that they will be a cat and not human. God can’t find them in the book because they have no soul, and are a cat. Deeper and deeper the child is lowered. They are told this is the penalty for having tried to pray to God.

The programmers make sure that the slave is implicated in many gross sins, such as the murder of innocent children, in order to insure that the person is sure that God hates them. Then the victim is told that God is a consuming wrath who hates them. The injustice of God creating a world of suffering is also taught to the slave. All this is to insure that the victim hates God. That hatred toward God will express itself in the victim’s system’s willingness to do any sin, without conscience.

Part B
The Monarch Programming Is A Miniaturization Of What Was Being Done To Entire Peoples Or Cities
Demons are attracted by the "scent" of people. We are made in the image of God, and we are attractive prey to those who hate God Almighty. Cities are magnets for demons. When demons target a person or people, a common tactic is to make trouble for the person. When a person’s problems reach a crescendo, they will be in a state of mind to grab any solution that is passing by. People then make pacts with demonic forces. They sell their souls hoping for relief from their problems.

All this is clear as a bell to the spiritually enlightened, but the demonic forces are able to dull the senses of their victims to the point they no longer have the slightest realization that they have sold their souls. People make a choice to accept the falsehood offered by the demons for their relief, rather than stick with the truth which seems to hurt. The demonic lies may be that colds and flues are caused by evil spirits--when in reality they are caused by viruses and bacteria. Or the opposite type of lie may be given, that demonic forces have no influence over disease, that only viruses and bacteria exist.

In Africa, modern medicine is often viewed as White Man’s magic, because they fight disease with incantations which the demons have taught them to use to cure their problems. Authority to demons is transferred to them by festivals, ceremonies and pilgrimages.

Strong demonic manifestations usually occur around festivals, ceremonies, rituals and pilgrimages which are being done everyday around the world. These ceremonies and rituals are welcome mats for demonic forces giving them the right to rule. Every area of the world has them. And often demonic signs and wonders occur at these rituals and ceremonies. The power of a lie has to be preserved and fueled by tradition, which is manifested via rituals. Without tradition the power of the lie would die out. If the tradition is being rejected by a people, the demons often augment it with "new" deceptions. The first lie doesn’t stand a chance.

The pre-existing bondage then is strengthened by new deceptions that seem more appropriate. If you were asked now, "HOW DOES SATAN ENSLAVE PEOPLE?" you should know the answer because it was just given it to you. The answer is Satan’s control is trauma-based. A trauma is applied to the lives of people. They reach out for some type of answer to the trauma, and the demons offer some type of answer--so many Hail Marys, or so many sacrificed cats, or pray to some idol which is a disguised demon. The lies are turned into myths which the people believe. The myths are a blurring of reality which the people on one level may know are false, but their minds can’t break loose of the power of the lie. The power of the myths are fueled by tradition and demonic manifestations and demonic attacks.

Anyone who steps outside of the demonic lie is attacked. The people feel they are being personally attacked when their traditions are ignored. Because a people has willingly sacrificed the truth for the falsehood in their need for relief from their trauma, they have chosen to be deceived. This choice to be deceived has a great deal of spiritual power to it. They are no longer truth-lovers. It is not enough to come to these people with the truth. They have rejected the truth. They must at some point will to seek the truth again. These people can have all the proof shown to them about the truth, and they will continue to reject it. Their demonic bondage needs to be broken somehow.

This bondage can be broken in a number of ways. Pointing out the inadequacies of the lies is sometimes sufficient to break the demonic spell over people. But after the lies are broken, they need to be followed by the truth--and the love of truth. The Monarch Mind Control programming is simply the sophisticated application of what has been done to humanity on a large scale being scaled down and applied to a single human body.

Trauma and lies are used in the same way. The different alters sell their souls to the lies in return for their safety. A basic ingredient to the programming of a group of people (or a group of alters) is the same--trauma and fear. The Land of Oz was ruled by a shadow-leader, the Wizard of Oz.

Most countries are ruled by unseen people and unseen powers. The Wizard of Oz story is so representative of how life is for Satan’s world. No wonder it is the programming base for so many Monarch mind-controlled slaves. The solution to Satan’s control, was that the disciples of Christ would be so united in love that the world would see the solution. "That they all may be one.. .that the world may believe."

For the Monarch slaves, the therapists have wanted integration. For the world, Christ wanted integration. But there are formidable spiritual strongholds which divide us. These spiritual strongholds are far stronger than most Christians can imagine.

The heartbeat of the Body of Christ is to bring all humanity to their Creator God. This can be done by breaking down all the lies and programming that separate the parts of the Body of Christ so that those of Christ are so well integrated in love and spirit that the world believes on the power of Christ. Each of the programming acts has a spiritual, mental, and physical side to it.

The slave has his or her will stripped from them so it becomes unnecessary to think in terms of their guilt, they are slaves who no longer have the freedom of choice. If they kill, or steal, or tell an untruth (lie), they have not done it intentionally. Still the Programmers know that there are spirits involved to spiritually prepare the slave to do these acts. For instance, they implant Spirits of Greed and lust into the victim.

An Illuminati value system is drilled into the victim. Any person who is not taught to dedicate personal rights and possessions to God, will end up with all types of surface forces such as insecurity, worry, anger, envy, jealousy and tension. This goes for multiples or non-multiples. These surface forces will in turn cause all types of surface weaknesses such as lying, stealing, cheating, and arguing. If these surface weaknesses are displayed by anyone, they are evidence that a deeper spiritual problem exists. However, the slave is not being set up to display these vulnerabilities as they will, but ONLY as they are programmed. An Illuminati Beta model can have sex only with who her master allows her to have sex with. Nor is she granted the privilege of refusing to sexually service someone.

If the slave is allowed free will, they often will reject the life style programmed into them. The reason they can reject the Spirits of Seduction & Lust that have been layered in to insure that these moral weaknesses exist, is because the will of the alter being programmed was being coerced. There was duress involved. Satan has some claim, but not the stronghold that comes from those whose active will is involved in a sin. That doesn’t mean that some slaves don’t develop a taste for their perversion. The point is that the ability to have these personality weaknesses, should the programmers want them, can be spiritually set into the slave by teaching the slave to resist the grace and love of God. It may be shocking to realize that the slaves are specifically programmed to resist God’s grace and love, and to hate Him. This is not left to chance, and is accomplished by a number of events in the slave’s life.

Another spiritual area that is tampered with is the self-image of the person. They are not allowed to think of themselves as made in the image of God (unless they are front alters created or allowed to be Christian). Instead of allowing the victim to learn about Jesus, the victim is consistently belittled and compared to others. This is in violation of a spiritual principle found in 2 Corinthians 10:12, "For we dare not make ourselves of the number, or compare ourselves with some that commend themselves; but they measuring themselves by themselves, and comparing themselves among themselves, are not wise."

John 5:44 and 2 Cor. 10:17,18 teach how it is to be done correctly. Fritz, co-author, knows of one programmer who is still programming who is fully aware of these scriptures and how they apply spiritually. When people are not allowed to accept themselves, they end up resisting the will of God. The wrong attitudes are built into the slave, so that they will always resist the will of God.

Again if the programmers want a Christian front, they may program the correct thinking into the front alter. To do this doesn’t threaten their hold on the system in the least. To have Satanic alters and Christian alters which are diametrically opposed to each other’s thinking only insures that if they would discover each other in the mind, that they would reject wanting to learn about the other part, and would go into denial of the part’s existence. The programming and mind-control is being linked to a belief system.

Taking this one step further, we can also say that the programming is also a conflict between two faiths, the faith that the alters place when they visualize and create their occult-system, that is their faith in demonism and magic, versus the faith of those who follow the God of the Bible. The method of creating hard-core Satanic alters from traumatized Christian alters is an obvious example of this. Some secular therapists have been slow to admit this conflict.

If we look at the Illuminati’s brand of Druidism, we will notice that the Book of Pheryllt which is a Druidic book for rituals gives four symbols which can be made to evoke the four elemental forces also called the four basic portals. Visualization is said to be the key to the occult, and to opening portals with these four signs. As the deeper parts of a slave are drawn into such activity, they are in reality placing their faith in that belief system. How can you take something away, without giving something in return? An alternative faith in a God and belief system that is not connected to mind-control is an important therapeutic aid.

You can not hate something passionately if you are unaware of it. When two groups are very similar, in order to high light their individual identity they will have a high level of animosity toward each other. In order to create strong Satanic alters who hate God, the Illuminati actually encourage the young two year old victim to understand and accept the love of God. Upon this faith in a loving God will be built the rejection and trauma to create wounded alters, who hate God because they feel rejected.

Rejection is a tool of Satan across the board in the world. Rejection creates a sine wave of hills and valleys. (The way of the Lord is made straight leveling these hills and valleys.) When a person (or nation) is rejected they will often shift to one of two extremes: either they try to perform to meet up to expectations or they will retaliate against rejection. Both are extremes (the hills and valleys of the shadow of death) of the what resembles a sine way.

Both rejection and retaliation are tools of bondage. The enemy will work a person to get them to feel either rejected or angry. If either side of the sine wave is latched onto by a person (or nation) they will set in motion a dynamic where they will end up with the other side of the curve. This is because the human mind has an inbred desire to balance things out. If we feel rejection, then we may retaliate or try extra hard to perform. This sets up a BONDAGE LOOP.

The Cabalistic Tree of Life is the knowledge of good and evil--performance. The programmer by repeatedly REJECTING the slave, build into the slave a high level of performance. The slave is not allowed to get angry at the programmer, which is the opposite peak of the sine wave. The human mind will naturally try to balance the performance peak with increasing the anger/retaliation peak to match it in opposite intensity.

Because the slave can not get angry at their programmer, they turn this anger inward and upward toward themselves and God. The performance of the slave for the master is a form of false love. Performance love is false love. "If you do this for me, then I’ll love you."

Christ loved us when we were yet sinners and unlovable. This is the type of godly true love described by Paul in 1 COR 13 which seeks not its own. Self-preservation is a tool of death. That is one reason Christ did not preserve himself - even though he could have called angels - he wanted to show the world true love.

Fear gets its root in death. The threat of death of a spouse, of oneself, of one’s dreams, of one’s identity, or of one’s fleshly body creates fear. Death comes from Satan. Life from Yahweh God. Fear is built on a threat of some kind of death. Self-preservation then is actually based upon fear which is in turn based on death.

This is why Christ said one must lose their life to gain it. To escape the satanic bondage loop of self-preservation built on fear, we must reach out for the love of God. Self-justification is not normally seen by people as a bondage loop, but it often is. Only the sureness that Almighty God loves us gives us the strength not to get caught in the self-preservation tactic of self-justification.

There is a place for defending the truth, but it must be done in love. Christ and his disciples taught that we are justified by faith in God, not by self-justification. Self-justification can easily be related to the self-preservation bondage loop.

We simply have to have an inner knowing that we are made in the image of God, and that He is working in each of our lives. Since we are His work, He will justify us. All of the Monarch slaves, are a work of God. The cult has simply refashioned what God created. The slave needs to recapture the loving view God has of what He created. God doesn’t make mistakes. He has placed lots of beauty and value in each person. Each person is His handiwork, isn’t the human body fearfully and wonderfully made?

After someone has been made to participate in crimes against humanity, the Programmers intuitively have created a situation where the person may fall into self-justification, for example, "They deserved to die." This is a subtle, but dangerous tool of bondage. Much of the trauma-based mind-control is based on simple fundamental spiritual life-spiritual death issues. The Spirit of the Lord does not give fear. It comes from the enemy.

Abductees, who claim to have met aliens, claim that the aliens feed off of human fear. Fear brings spiritual death. To show this dynamic in another way, let’s describe a common thought for alters of Monarch slaves. This thought is "If I stay with the programming I’m safe." This is the same thought that society in general is taught via fear of self-preservation. "If I stay with the crowd, if I stay with the system, then I will be safe." This is why peer pressure, which seems safe, can lead many young people into death.

All this fear of self-preservation by remaining in the programming (whether individual or societal) will be transferred to loyalty of the Anti-Christ, that is the plan. The Truth shall set you free. Anytime we reject the truth for safety and peace because of our fear for self-preservation, we accept a lie. If the truth sets a person free, then by definition, slavery means to "not to have truth." All lies lead to bondage. They create strongholds.

Many religious groups are built upon a collection of truths and lies. The truths are used as the enticing attractive front, the lies are used as the enslaving bondage. This is why there is almost no end to all the lies used to program Monarch-type trauma-based total Mind-controlled slaves.

An important mind-control programming dynamic is the creation of images. This will take some explaining. One spiritual dimension of humans is that we like to behold our God. This was built into us. Archeologists have noticed that ancient man has always worshipped. It is built into man to worship, and we like to behold whatever we worship, whether that is God, ourselves, or some other image. In other words, worship is image oriented. This is the power of images. One of the most ignored commandments of God, of which Fritz wrote a book about in 1977, was the commandment God gave

"thou shalt not...make any likeness of any thing that is heaven above, or that is in the earth beneath, or that is in the water under the earth." EX 20:4

Students of God’s Word are warned to "examine everything carefully; hold fast to that which is good." 1 THES 5:2 1.

What is significant is that God’s commandments in Ex. 20, which were a distillation of His laws, could have simply stated "Thou shallt not make any graven image", but instead went on to make a big issue in that same passage about any image of God’s creatures (the word translated "things" has historically been understood as "living things"). In DT 4:15 "pasal" images, that is images formed out of any material with a tool (ax, chisel, or engraving tool) and the "likeness of male or female" and "similitude of any figure" are forbidden.

Next, it again forbids the likenesses of living creatures. The word "image" occurs about 100 times in the Bible, and is usually accompanied by judgments such as "I will cut down. ..destroy...break down...smote." In a number of verses (EC 7:20, PS 106:29, 39), the scriptures speak about how man is always seeking inventions that provoke God to anger.

The creation of images of many varieties was a big part of Egyptian magic, and still is. Because the creation of images is so esteemed today, a balanced view/discussion of the spiritual ramifications of images (& their creation) is a rare subject.

"For the invisible things of Him, from the creation of the world are clearly seen, being understood by the things that are made, even His eternal power and Godhead, so that they are without excuse." RM 1:20. (cf. ISA 6:3).

One ex-Programmer has talked at length, that part of the motivation for the many programming images, is so that they can establish a world built by Satan, because they want to insure that there is no testimony about God’s power. (By the way, some deliverance ministries are having success in helping heal victims by pointing out that Satanic programmers only build from elements God has already created.) Mirrors, and lots of them, are important in occult programming because they make images. They create so many internal images one doesn’t know which way to go. Images are lies. We often create false images of the people we want to love. Do we love them or their image?

Movie stars are loved for their image, and rarely for who they really are. Some of them have acknowledged that they don’t feel loved by their fans, because their fans are only worshipping an image. Again, we must remember THE TRUTH SHALL SET US FREE. What is our real identity? Who are we really in God’s eyes? Why did He allow us to be born? What was His real purpose for us? These real questions which are so hard for so many of us, are the reality that we need in our lives. The bondage of images has yet to be understood.

The word "duplicity" is based on the word duplicate. Machiavelli taught the elite how to rule through duplicity--that is to rule via imitation images. This is nothing more than one of the operational principles of mirror images placed within the Monarch Mind-controlled slaves. Whatever gives life is duplicated in a mirror image by Satan. Life swallows up death, as the Kingdom of God’s genuine light gets progressively brighter. The copy of this is that performance must get progressively better, i.e. technology must change to get better if we are to have life.

The Amish show that society’s penchant for technological progression, does not improve life. The Amish have a very successful life-style free from divorce and crime.

Missionaries to Africa have come back at times wondering if the primitive tribe they spent time with didn’t have many things which our technologically advanced society had lost. This doesn’t mean that an invention won’t help mankind, it is that mankind will not get life from technology. Technology must be understood in the entire context of life.

If a person catches onto the lie of technology or performance, they may try the opposite lie--plat forming. Many troubled people reach out to God, receive help, and then platform by saying, "Thanks for the help God, but I’m O.K. now." God’s love is not performance-based, but we still need to continue to press toward the mark of the high calling of God, transforming and renewing our mind, ever growing spiritually.

Things which do not grow are labeled dead. How do we grow without being performance oriented? That is the message that Christ tried to bring people. The programmers get their slaves caught in a performance loop. The slaves are not going to get freedom, if a minister of some church traps them into some religious group that is performance-based, rather than unconditional godly-love based.

It is sad to see victims of mind-control free themselves at great cost, only to run from one controlling group to another. If we neglect to look at the spiritual dimensions of mind-control slavery, we then are neglecting to see some of the elements of total mind-control slavery.

In Summary, Some Of The First Things Attacked
What is often the first thing which is attacked in individuals and nations in order to control them? It is their sense of identity as a spiritual moral being. Both individuals and nations are targeted to destroy their ethical self-respect. The individual and the nation must be brought to think of themselves as animals.

Another primary tactic or tool is to traumatize the victim who is to be controlled, and then provide relief when a demonic lie is accepted.

Rejection is an important trauma, because it creates a desire for performance and retaliation, and gets people trapped in a bondage loop.

Lies put people into bondage. Images are a type of lie, that lead to bondage. This is why so many images and lies are placed into the Mind-controlled slave. These images and lies are inherently bondage-makers.

Fear and self-preservation are grounded in death. To preserve ourselves, we will allow ourselves to be enslaved. (Eventually, Mind-controlled slaves and society in general in order for peace, safety and self-preservation will transfer their allegiance to the master programmer, the Illuminati’s Anti Christ).

²

Part C
The Dehumanization Process
The dehumanizing of a multiple - that is of a fragmented personality - is done to most of the alters, but the front alters are allowed to be human. Because alters take on the characteristics of what they were created from, the front alters have to be some of the first splits so that they have a sense of family and that they are human. That does not mean that the first series of splits can’t be dehumanized later--they are, they are turned into gems (crystals).

How do you make an alter into an animal alter? It may not be quite as difficult as some may imagine, because they can create alters with "clean slates"--that is they are the plain tablets that Dr. White (Dr. D. Ewin Cameron) prided himself that he was able to make out of adult minds. When a part of the mind has no reality to reference, and is tortured and told lies, then it will accept what the programmer says is real. When an alter is created via torture, if you want a cat alter, they will have the child tortured in a cage surrounded by cats of some type. The new alters will be told they are cats.

Their programmers will actually kill a little child in the worst way in front of these alters and tell them that that is what happens to little girls and boys. Do they want to be a little girl? No. After watching the horrible things that happen to little girls, they do not want to be little girls or little boys (as the case may be). They want to be a cat, because as a cat they will not be killed and tortured like the children. The alters are forced to eat like cats with cats. They are repeatedly shamed and degraded and repeatedly told they are cats. Lie detector Instruments are hooked up to the child to determine if the alters actually believe they are cats. When the alter can actually state, "I’m a kitten." or "I’m a tiger." and pass the lie detector test, then the programmers know they have succeeded.

But what if the mind resists being told it is a cat? As long as the child is a girl it is given feces to eat. But the cats are fed wholesome meals in front of the victim. The little girls in the other cages are dirty and tortured and ill fed. Do you want to be a little girl? A great deal of simple torture is applied to make sure that the correct answers are given. If your life depended upon saying you were a cat, you’d be a cat too. Further, children have a vivid imagination. Normal children can easily role play, and they can easily imagine they are something they aren’t, because their personalities and egos have not solidified.

Again nothing is left to chance. A fake blood transfusion of cat blood may be given the child. Very often high speed films of kittens playing and having fun are shown in one eye, while the other eye is forced to few little girls having to undergo the worst of tortures. This viewing is forced upon the child, as its eyes are held open and the child is strapped into a viewing chair.

The dehumanization process will make alters into various types of birds, cats, dogs, aliens, horses, earth elements, gemstones, rocks, and countless other items. They will then place in back up programming to insure that the alters continue to believe they are not human. The ingenuity of the back up programming to ensure that they continue to believe the lies are extensive and ingenious. A great deal of hypnosis, and drug induced states, and drug-hypnosis is used to carry out the dehumanization process. The programming will be reinforced by a cat alter’s environment, because the alter’s handlers will always refer to them as kittens or other types of cats.

The painful rape of a child with its legs held in a butterfly configuration is used to get butterfly alters. To get a puppet, the body is given a drug which paralyzes the child. Then electro-shock is applied to certain muscles upon the command of the programmer. The effect is that the child has no control over his body, and the programmer can make the child’s body parts jerk and move by electro-shocking the muscles. The child actually becomes the puppet of the programmer. This is a very powerful program.

One of the names connected with Monarch programming is Marionette Programming. The child literally becomes a Marionette. This concept appears to have been cooked up by the Germans under Hitler. An alter System as a child is physically shown that they are a marionette puppet. Their muscles are electro-shocked in such a way as to take advantage of the natural reflexes. When electro-shocked that way, the victim’s body parts jerk out of our control at the whim of the programmer to prove to the victim that they are a puppet. At this time, the rules are given and rule number 8 is that the alters are their puppet. Illuminati programmer Dr. Mengele, used puppets in a dollhouse as he programmed. He did skits with his puppets. "Dance Marionette dance," he’d say in his thick German accent. Pinocho’s story was used to name the spirit guide Jimney Cricket. Along with rule no. 8, he taught the following rules at this point:

1. Listen to your instructions

2. There is no room for error

3. "The Game Timer", these were the specifics of how to move, the melted mirror, etc.

4. There is a chain of command, the King’s men

5. Your Master would chart your course

6. You will receive orders, what to do, a memorized script to follow and fulfill

7. The Creator and Master would always own you into infinity

8. You are puppets on a string. "Dance Marionette dance. You are to speak only those words told to you, and to only speak those words when your string is pulled

9. There is no room for questions

10. The controller always plays the role of the White Rabbit. Dark side alters of a System are taught to know these rules as part of their being

Dr. Joseph Mengele (known as Dr. Green) carried a violin, which was used during programming. He programmed slaves to respond to the key word "Fiddler". During programming, the victim will be made to believe that all their insides have been removed and tape recorders placed into them and surgically hooked up. To the child being programmed this is real. This is part of the dehumanization process to protect them from spiritual growth and freedom. The programmers’ dehumanization parallels what is done in the army when the drill sergeant yells at the new recruits names such as "maggot" and "worm".

Porcelain Face Programming
The Porcelain Face Programming was already touched on earlier in chapters 2 & 7 when the fire tortures and Gatekeeper alters were written about. Fire torture and melted wax is used to make the child victim believe their face has been burned. Then the programmer generously gives the traumatized alters a porcelain mask. The alter getting the Porcelain face may be given a "gem" hypnotically like Jade and that becomes their secret name.

There are several different methods that are available to lay in the porcelain face programming. There has been a great deal of porcelain casts made of people’s faces and then masks made of them. In fact, when a handler dies, at least in one case the replacement handler wore a mask to look like the previous handler. Human baby skin is used to construct a mask from the victim’s facial cast. A mask is worn by the Illuminati victim when they are married to the Anti-Christ.

The Porcelain Masks are often part of the Camelot & Shakespeare programming.

Another use of porcelain masks which was only experimented with was to place masks on Pawn alters which were used as alters who would guard things by scaring other alters with their fearful porcelain countenances. This programming has spiritual ramifications, because it is one of the programming methods to steal alters of their faces. The alters getting porcelain face programming will only see a porcelain face in the mirror until the programming is taken down. As long as the computer on their level is operating the programming to that alter will be intact.

Hearts Of Stone
The programmers leave no stone unturned when they strip the alters of a system of any vestige of humanity they might have. The programmers make the alters believe that the programmers have surgically removed their hearts & replaced them with a stone. To reinforce this programming the victim is hypnotized to fall into a deep trance if at any time the victim’s deeper alters are hooked up to anything monitoring the heart. If and when someone tried to prove that these alters have a heart by taking their pulse, they may be surprised when these alters trance deep enough that the machine doesn’t even read. This is how the programming keeps the lies safe from exposure.

The Programmers will hypnotically take the hearts for a number of reasons. One is blackmail. They will promise to return the hearts, if the victim obeys, returns home to the cult when needed, and is present when the Anti-Christ needs the victim. It is doubtful these alters would get their hearts back by their cult considering all the false promises that are typically made.

The Programmers will give the hearts to a queen mother alter for safekeeping. They may be hidden somewhere like in the Temple of Molech [MLK, ZDK is the dual play of the illusionary game].

The Temple of Molech in some survivors is used as a depository for memories of child sacrifices. It is not a place any alter could or would want to go in the internal world. In return, the Programmers give the victim stones, yes, hearts of stone. Stone-like protectors will stand guard in the background. Their voodoo doll appearance reflects the voodoo images that are built into Monarch Internal Worlds. By removing the victim’s hearts, it removes any chance that dark alters would have a soft warm spot in their heart for anyone. They will be told that they are incapable of having friends or of loving others.

This is quite effective in separating these alters from others. That isolation is a part of the mind control. Because the alters believe they have no life source within themselves, that is no heart, they have to look to their master. If the master places his hand upon the victim’s chest they may feel alive. Because people need a heart to feel, alters are programmed to believe that they are incapable of feeling and have no feelings. They can not cry during their own suffering, and are encouraged to feel incapable of caring for the suffering of others.

In spite of all the brutality and isolation of the programming, the alter’s humanity will lay in the background, but whether alters will ever acknowledge that humanity is a big question. If people ask these heartless alters to give their hearts to Jesus, they may be told that they don’t have one.

In all covenants, something is given to the cult. In this case the victim’s hearts are (hypnotically) given to the satanic Master. There is a Keeper of the Seals who keeps the items given when a vow or covenant is made. If a person is a traitor to a vow, then the cult has an object to carry out voodoo or magic upon to punish the person. Monarch Mind-controlled slaves know their orders, and are locked into obedience.

Hypnotic Surgery
After the Programmers steal the deeper alters’ hearts, their identities, their free will, their real families, and their faces and their humanity, they are kind enough to sew back into the victim’s chest via hypnotic surgery black stones. They do all this surgery by hypnosis. Via hypnosis, the Programmers can heal the victim’s wounds after they torture the victim. They can basically make or remake reality to be what they want.

Back to Index

Reply With Quote
  #33  
Old 10-13-2010, 01:53 PM
8esteve
Offline:
So Fucking Banned
Poster Rank:257
Join Date: Dec 2009
 
Mentioned: 0 Post(s)
Quoted: 0 Post(s)
Activity Longevity
0/20 14/20
Today Posts
0/11 sssss3294
Re: Trauma-based Mind Control? (or Torture-porn?)

Science No. 11--Internal Controls
A. Teaching Occult Philosophies
B. Internal Computers--Perfect Delegation; Internal Computers Which Auto-Control A Slave

C. Internal Hierarchies

A. Teaching Occult Philosophies

Learning plays an important part in perception. The Programmers try to get their victims to subscribe to philosophies and ideas that will make it hard for them to rebel against their controllers. This is what is termed indoctrination. The same methods of teaching that others find useful are employed. Ways of thinking are incorporated by the slave via handlers, programmers, and the cult they belong to. Everyone tries in their own way to make sense of life. This is a natural brain function, so that the human mind can understand how to deal with the future. The mind takes raw data, and then applies some type of logic, and comes to conclusions. Once accepted these conclusions can be as hard as nails, and they will defy any attempt to change them, even in the light of new evidence. If the Programmer is smart enough, he can get an alter to logically believe anything.

Once the belief is embedded, it will remain there tenaciously. In the Illuminati, "great" masters and adepts teach "hidden mysteries". The slave feels the authority that emanates from this teacher with special gifts and abilities. The slave is hardly in a position to question the teachings being given from on high. Circular reasoning, lies, and other tricks are used to convince the person that the occult world is true. For instance, "God abandoned you, therefore you need to cling to us, the only ones who would see any use in you." (The truth is that the cult staged a crisis where their actor playing God abandoned the child to the cult’s abusiveness. The whole event was simply cult abuse--with God taking the blame).

"We are trying to fashion a better man, a man with far more capabilities than before, with better genetics. Those who oppose us, are trying to keep humankind back in the dark ages."

This is circular reasoning and outright lies. (They are not interested in helping mankind, only destroying it). To make occult philosophies more palatable, the occult world attacks the character of anyone whose life would dispute their false claims. They also use a great deal of rationalization, where the end justifies the means. Many slaves have had to sit and listen to their masters rationalize their brutality.

Within the Illuminati, ranks are achieved with much learning and ritual. Within the Temple of Set, a member is required to read certain books. Fritz, the co-author has a list of books a Temple of Set member is asked to read, with the comments attached by the Temple of Set to each suggested title.

In their suggested/required reading Category 19 entitled "The Metamind" is Metropolis by Thea von Harbou. Their comments are "An Expressionistic portrait of a negative utopia in which humans are controlled by machines.. .the basis for many electronic/audio-visual ritual techniques employed by the Church of Satan and further developed by the Temple of Set." (p. C21-2).

Another is Physical Control of the Mind: Towards a Psycho-civilized Society by Jose M.R. Delgado. Their comments, "Delgado, Professor of Physiology at Yale University, is one of the most distinguished authorities in the field of Electrical/chemical Stimulation of the Brain (ESB). This book is necessarily dated, but it is so well-written that it deserves to be perused as a preface to more recent works on the subject." (p.C-16?-2).

The Psychology of Anomalous Experience by Graham Reed. Their comments, "This book addresses unusual, irregular, and puzzling experiences- dejí vu, illusions, delusions, hallucinations, etc.-in terms of the mind’s normal psychological processes of gathering, monitoring, processing, and storing information." (ibid).

This is just a brief look to illustrate to the reader that leaders of groups like the Temple of Set are avid students of mind-control. (An almost complete membership list of this group at one point in time, is provided in Appendix A). The librarian of the Multnomah County Detention Ctr. shared with co-author Fritz that Sheila, formerly second-in-command of the Bhagwan Shree Rajneesh’s commune at Antelope, OR studied, via jail/prison interlibrary loan, books on Hitler’s mind-control techniques. Many other examples could be given of how mind-control is being studied and taught by these groups.

One more book on the Temple of Set’s reading list would be worthy to point out, The Psychology of Man’s Possible Evolution by Peter D. Ouspensky. Their comments, "Should be read especially by those members whose magical ability is hampered by flaws in their balance factor....A series of lectures which explain the Gurdjieff approach to the concept better than G. himself was able to do." There is an important link between Gurdjieff, mind-control, MPD, etc. but the subject is big and needs to be further investigated. Co-author Fritz has been investigating this link, including talking with leaders of the most successful Gurdjieff commune. As with so many groups, what you see, is not what you get.

Teaching The Ideologies Of War
One of the ways to control a person is to get them angry and then channel that hate. Wars have been used for centuries by the oligarchies that run things to control their people. Right now, the New World Order is carrying out a Drug War, an Environmental War, and a Bosnian conflict for the express purpose in their own plans to control us. They have a mock-alien invasion planned to further justify more control over our lives.

Over the years mankind has created an entire industry around warfare. There are long traditions within military units, that for some reason must be "upheld" by the men who serve in those units. When people buy into the philosophies of war, they can generally be persuaded to give up or do anything to contribute to that war. After all, any sacrifice will be minor compare to the large numbers of bodies that will end up dead. One of the large purposes of the Monarch type of trauma-based mind-control is to produce robotic soldiers who will do anything. Normal military training is usually sufficient for most military needs, so it is clear that Monarch slaves have some ulterior uses that the military doesn’t want the public to know about.

Various Delta Forces
The military as well as other groups have created numerous delta teams, delta forces, delta groups etc.

Delta Assassination Teams
These teams are projects that the Satanic Hierarchy and the CIA collaborated together on. The programming that was placed into people was ingenious and very complex. As the program progressed over the years, the programming became more sophisticated and past mistakes were improved upon. The Delta Teams were programmed to carry out various assignments such as political assassinations. The members of these teams are housewives and other ordinary people who were programmed years ago. The Delta Teams are part of the CIA’s psychic warfare bag of tricks. The CIA works so closely with the military that the Delta Force is easily expected to be tied in with the CIA & U.S. intelligence.

Delta Force
The system tapped Frank Burns to create the Delta Force. Frank Burns was a Green Beret. What kind of things did Frank get involved with AFTER joining the military? Hold on. Frank Burns was an SDS (Students for a Democratic Society--an Illuminati organization) organizer. He was also deep into Zen Buddhism, which is the same as mysticism. Frank Burns as an officer also studied under the Esalen Institute.

The Esalen Institute is at Big Sur, California and is the American equivalent of the infamous Tavistock Institute. The Esalen Institute created "sensitivity training" programs for the business world under the title "Organizational Development (OD). Esalen people were brought in to Fort Ord where Frank Burns was the commander and began training people. The army promoted Burns to work in the Chief of Staffs office as a "senior organizational effectiveness consultant", which allowed Burns to introduce Esalen programs all through the army.

This could not have accidentally happened. Frank Burns in a conversation with a two-star General about the need for "wholistic" soldiers coined the slogan "Be all that you can be in the army." Burns phraseology began the army’s recruiting slogan. It refers to the Human Potential Movement that the army has incorporated from the New Age movement. The army is moving toward becoming an occult fighting force that practices witchcraft with its warfare. Some of the units moving that direction are Psy-Op operations, which has included Satanists within its officers. The Delta Force network of various Generals and other high ranking officers is merely one facet of the drive by the Illuminati to transform the American army into something akin to occultic warriors that will be as fierce as the Nazi Death head units. Bear in mind that George Bush, commander-in-chief of Burn’s Armed Forces has come from an Illuminati family/ & the Ill. Skull & Bones chapter that was part of the secret support for Hitler. They have been using as an insignia what they themselves (the Skull & Boners) call "the Death Head".

It is not surprising then that support for the Delta Team activities has come from the very top. Frank Burns set out to create a warrior monk. Lt. Col. Jim Channon, in Delta Forces, also put forward the idea. Channon visited more than 130 New Age groups in California doing what was called "social experimentation." It is an idea that the occult have repeatedly carried out.

Hitler’s S.S. were a special elite group of warrior monks from which about 3,000 went through religious initiations. (As the war progressed the primary focus of the S.S. shifted from being the Black Order to merely being a reliable military group called the Waffen SS.) There were 3 levels of initiation, the last reserved for the hard-core Satanists at the top. The Nazi initiation seems to have been an attempt to get the force of the Vril. The Ordensburgen (Castles of the Order) were training centers for the elite Nazis, including the S.S. (Having been in the military, I know first hand that the success of the S.S. and Waffen S.S. units in being fierce warriors is attributed by some of our leading military men to their training to be warrior-monks.) One group of the S.S. called Knights of Poseidon volunteered themselves for castration, in an experiment to change them back to the supermen of the mythical and magical Hyperborea.

Some of the best Sufi organizations were warrior monks. Burns and his Task Force Delta generated the First Earth Battalion, which is an occult military unit trained in martial arts, and witchcraft. Men who are selected for First Earth Battalion are given an occult initiation which includes the following oath:

"I have the capacity and therefore the duty to contribute to the development of myself, my associates, and our planet, simultaneously now! I take personal responsibility for generating evolutionary conspiracies as a regular part of my work. I will select and create conspiratorial mechanisms that are not costly in time or resources because I am aware of the five channels available to me (such as radio, television, and word of mouth.) I will organize a self-supporting high commando group that will create and perform evolutionary breakthrough actions on behalf of people and planet. One people, one planet. I will then pass this concept on to others who are capable of generating further self-organizing commando teams".

What ever happened to defending this nation? Military units such as the First Earth Battalion although they are supported by American tax dollars are not here to protect America. They are global minded. They are here to protect an occult world government. They are out there actively promoting the New World Order. Several years ago, Egendorf states that $4.5 million (which came from you and I, and other Americans) had already been spent on Delta Force’s 80 different projects. The Green Berets is another organization that has been heavily targeted by the Satanists, to indoctrinate and recruit. The Green Berets are increasingly moving toward being warrior-monk group. Many of them are now programmed multiples.

One man who is being looked up to by many American Patriots and Christian Patriots as the leader to help them oppose the New World Order is Bo Gritz. He was a recent presidential candidate. Bo Gritz was a Green Beret and a Delta Force commander. Bo Gritz is very proud of the fact that he wrote the manual for the Delta Forces. He also worked for the CIA. Bo Gritz is one of the military’s best programmed multiples, and perhaps one of the most dangerous. Insiders have told me he IS the most dangerous. Numerous insiders both for and against Bo, have talked about Bo Gritz, and that he is a programmed multiple. According to Bo Gritz’s campaign literature for President he was a commander in Delta Forces. Reproduced on a previous page is Bo’s own presidential campaign literature where he states that he is "Intelligence Officer & Reconnaissance Chief, Delta Force." He is also "Chief, Special Activities, U.S. Army General Staff, the Pentagon" and "Principle Agent, National Security Council, Intelligence Support Activity". Under qualifications Bo states that he is a "Security & Counter-terrorist Specialist."

Within the government, they are already referring to Christians who are against the NWO as terrorists. Bo is their greatest counter-intelligence counter-terrorist they have. He came in like a storm and took control of the Patriot movement, and it has been like pulling teeth to warn patriots about who he is. Bo Gritz himself was a Green Beret, and was used to assassinate 300 people. His blood lust caused him at one point during the Vietnam War to shoot 30 prisoners in cold blood.

I also heard Bo talk about say being Temple recommend Mormon. That means he was at that time in good standing with the LDS Mormon church so that he could go to the Temple and participate in its rituals. Those who are alert realize that the temple rituals are like Masonic and Witchcraft rituals. Now he is no longer a Mormon. But he still continues in the military philosophy he believes in. Bo Gritz is going around the nation teaching SPIKE training to anyone who wants martial arts skills. Bo has done an excellent job in identifying for the New World Order every person in the nation who could threaten their plans for a martial law NWO takeover.

Bo Gritz likes to call attention that he is one of this country’s foremost counter-terrorist agents. This is true. The New World Order believes patriots and Christians are terrorists, because they stand in the way of the world’s acceptance of their world dictator. Bo Gritz has done a great deal to infiltrate and neutralize the opposition to the New World Order. He has been their best counter-terrorist agent.

B. Internal Computers--Perfect Delegation; Internal Computers Which Auto-Control A Slave
If a master has to constantly spend time whipping and motivating his slave, as well as forever watching that the slave doesn’t escape or do shoddy work, or physically or verbally injure the master, then controlling the slave can end up to be a full time job. When the master gets too much involved in the control process, he ceases to be master, and becomes a slave to the control process. The intelligence agencies knew that they would have to create mind control slaves who could police themselves. If the master has to constantly guard his slave, the slave will be more trouble than he is worth.

Many successful people have gained their success because they knew how to delegate. The most successful supervisor is the one who can delegate the best. The programmers had to find ways to cut their supervisory requirements to the bone if they were to make owning a Monarch slave worthwhile. The method chosen was to build "computers" into the slave’s mind that would internally regulate everything. They do this by taking hundreds of the alters and dehumanizing them and turning them into parts of a computer.

For instance, the shutter on the All-seeing eye of the computer, which is seen in the mind like a camera shutter, is a child alter who's job is to open and shut. (Another primal part is inside the eye’s pupil.) This shutter part knows what goes on in all the system subconsciously but if discovered by a therapist and pulled to the front of the mind will not be able to vocalize about the system. The software for this "computer" could be programmed into it, and all the individual programming of every alter can then be tied back to the computer. In other words, each alter would be programmed on how to view life, to act, to think, and to function in their job. This programming would be linked to a computer.

The programmers invented the perfect method to decentralize their control over their slaves and yet still supervise with the tightest of control. Each alter is linked to a computer (internal-not an external one) built from a foundation of fear and trauma. Since each section of alters was to remain secret, each section of alters for a slave is given its own computer, and then linking computers were built to link the various sections, and then finally a major backup computer is built, and then finally the internal Beast computer. Bear in mind that this is all built internally in the mind of the victim. We are not talking about actual physical computers built out of physical microchips, wires, condensers etc.

If the programmer concentrates on a single point when giving instructions he will get better results. Rather than complicating things for the slave, you gain power over the slave (and any subordinate) if you can give simple clear instructions. For this reason, a large share of the alters in an alter system are given very clear straight forward jobs. Because their jobs are so straightforward, these alters will often remain fragments, rather than alter parts with full blown personalities. The programmers don’t cloud the issue. An undeveloped alter will be given one single clear, basic job. By stringing 1,000’s of alters together with single tasks, a highly sensitive system of alters can be created.

Each piece of the System is separated by some degree of dissociation to make it a separate piece. By dividing the mind so much, it is incapable of fighting what has been done to itself. Before we begin describing the technical details of an internal computer, bear in mind that every Monarch System is unique and yet they all follow certain patterns & methodologies. Most of the models for the first few decades follow these patterns, some of the newer ones have more updated imagery.

Power Sources
In an Illuminati System, a computer is created for each section of alters. That computer will be given a "power source", which if unscrewed like a light bulb will go out. The light from one of these power sources might be emerald blue or emerald green or other color. The reader may want to refer to chapter 4 for the codes to understand the structuring of the various computers and systems.

Color Codes And Ribbons
In a standard 13x13x13 Illuminati alter system, 13 colors were used, and each computer was given a color. These would be pink, orange, yellow, white, red, brown, blue, green, black, purple, silver, gold and platinum, and clear. Color programming is reported to have been developed at UCLA. Whatever the case, Systems all over the United States have color programming.

The hierarchy of colors in a System is often as follows (from top power down): Platinum, Gold, Silver, Purple, Black, Red, Green, Brown, White, Orange, Yellow, Pink. Clear is also used as a color for secret areas of the system. This hierarchy of color coding can be switched. The internal programmers can reassign colors if they need to, in order to protect the programming. Alters, sections, and parts of the computer are all color coded. The color coding for alters is not the same just because the alters are in the same section. The color coding within the Illuminati Mind Control is fairly consistent, however a sample of an alternative Illuminati color scheme will also be provided. A survey of colors is as follows:

CLEAR. Secret or shell alters who can take on any color are coded clear. These are alters who serve as images or as a stage for other alters. This would include "Guardian of the Vail" alters.

GOLD. This color is for the supreme leadership in the System, which includes the Grand Druid Council.

SILVER. This color is for the Satanic alters who perform high level Satanic rituals. The Mothers of Darkness have silver coding.

PURPLE. These alters see themselves as the abusers, rather than the Illuminati. These alters were involved with the programming. They have been taught to forget the abuse and to reframe it in their mind as training.

BLACK. These alters were born out of Satanic ritual, and are Moon children. The Delta and Beta alters are black coded. They do the dirty work for the cult, such as blackmail and assassination.

RED. These altars see themselves as witches. They were born out of witchcraft ritual, believe they have great spiritual power, and tend to deny that they have been abused.

GREEN or EMERALD GREEN. These cat altars recognize they have been abused. They still see themselves as belonging to the cult family, and deny that they have been abused to protect their cult family.

BLUE ALTERS. Clones, armies and the ribbons appear to have blue coding. These alters will go so far as to hurt the body to protect it from leaking information or deprogramming.

WHITE. These are Atlantean alters who have been given Aryan type racial nonsense to think they are superior. They believe in genetic engineering, and a master race.

ORANGE. These special protector alters are scouts who warn of danger from internal or external threats.

YELLOW. These are the strong Christian alters of which there will only be a few in the System. They help serve as a balancing point to control the System as well as to hide what the System is all about.

PINK. These are core related alters. They maintain the true feelings of the true self apart from the cult programming and the cult family’s programming. These alters are viewed as weak because they are emotional and often break down and weep. They are fragile emotionally.

An alternative color scheme that is used:

DARK EMERALD GREEN. This color is assigned to the Anti Christ-Satan alter(s). Green is the occult color for Satan and happens to be the most sacred color. Few people outside of Satanists know that Green is more sacred for them than any other color.

LIGHT GREEN. The gods and goddess alters which are triads which function in Illuminati ceremonies get this color coding.

WHITE. The internal programmers who come around in white robes get this color assigned to them, as if they are doctors or angels of light.

RED. Sexual alters are given the natural color of sex and arousal red.

BLACK. Connecting alters that are Nexus alters between various system parts.

PINK. Reporting alters.

DARK BLUE. Non hierarchy cult alters.

LIGHT BLUE. Alters in charge of the way the system runs, such as the judges.

YELLOW. Alters which are ritually and sexually twinned with alters of other systems.

ORANGE. Guard alters which are heavily programmed for obedience.

VIOLET-PURPLE. Front alters and small child alters placed into boxes.

CLEAR. Shell alters to deceive the outside world.

GOLD. The traumatized alters upon which the programming is built on.

Joseph Mengele and the programmers who worked with and under him, used a large dollhouse with 26 rooms. Each of the rooms were painted with one of the 13 different colors in order to build into the child’s mind, the 13 front and the 13 back computers. The internal computers worked off of color codes, as well as other codes.

A dollhouse was used to instill into the child’s minds the compartments of the computer. Each room was done up in a different color. One particular room was a secret room, and this represents the secret world of Petra which is hidden behind two large rocks. This secret world is coded the color clear.

Besides the special color clear, the following colors appear in the system: Gold, Silver, Purple, Black, Red, Green, Blue, Brown, White, Orange, Yellow, and Pink. Each color has meaning and a rank. Just as the hour glasses could be turned, the color coding can be switched in rank. This is why in some systems there is a "Computer Operator Black", a "Computer Operator Green", and a "Computer Operator Purple", etc.

During the programming a black box with needles and wires which attach to the body for electroshock is used. While electro shocking the victim, colored scarf's coming out of a box are showed to the child. The scarf's would help form the imagery needed to build colored ribbons internally. Alters would be created using the Tall Book of Make Believe story of the Pancake people. Using this as a base or foundation, the alters would then be dehumanized one step further into thinking they were ribbons, such as ticker tape, which could transmit information from one computer to another area of the mind.

The Ribbons had the ability to travel between the different levels and to transmit messages through the System, especially to the computers. It is believed they could do this because they were spirit. When a System is accessed by a programmer, one procedure is to obtain a Ribbon alter and then inform the Ribbon what he wants. The ribbons transmit messages to the internal computers. The ribbons on older systems use Morse Code.

Who are the Ribbons? The Ribbons are the beginning of the LUCIFERIAN alter-like demons and alters. They are primarily the message bearers from the computers to the different computers, levels and alters. The Ribbons might have angelic names (Michael, Gabriel, etc.). The word angel means messenger. The ribbons serve a very similar function. They transmit ticker tape with morse code messages. They are at work most of the time for a System. A sample cover story for what they guard--which is the main computer with the gems and the core, is that the ribbons guard the System’s "Garden of Eden".

Some more of the cover story that may be given is this: Ribbons were supposedly formed out of the dust of the ground and were placed in the Garden of Eden to create every pleasant tree. (See Genesis 1.) The ribbons relate to the Tree of Life. But to eat of the Tree of Knowledge of Good and Evil will cause death. The name of the first river of four in the garden is Pashon. Out of the first river come four heads. The River Pashon has gold, ballium, onyx, rubies, diamonds and precious stones. These gems are the programs the dwarfs mine. If the System has charismatic programming, the alters will have porcelain face programming. In this case each ribbon’s color will match the color of the stones in the masks--that is yellow, white, blue, green, purple, red and black.

The colors of the ribbons correlate or match the colors of the Dollhouse rooms. What do ribbons do? The Ribbons serve the programmers and the computers, who in turn serve the evil master Spirits. Things that the Ribbons do for the computers have been identified as follows:

a. The Ribbons eat from the system’s internal "Tree of Good and Evil",

b. Ribbon programming consists of several things--where they reside, who they are and what they are to protect.,

c. Ribbons must protect the computers in order to protect their own life. The Ribbons will be programmed to believe that reversing the computer will reverse the Ribbons’ life. The ribbons themselves operate with mechanical hearts (not human hearts).

The cover stories may include the following: All Ribbons are hid behind a little girl, who is a front for them & who tells the creation story. The little girl will tell the creation story which included the Ribbons. Behind her runs a silver cord. The silver cord has to do with heart programming. The silver cord has 3 strands that cannot be broken as per ECL 4:12. This silver cord goes off if the Ribbons are touched. Ribbons are set up so that suicide programming is triggered if they are cut.

Actually, French braiding conceals a 4th strand. In review as stated, during the programming, a box with colored scarf's was shown the child while severe electro-shock was given to the body. A colored scarf represents a ribbon which runs a message from a colored room to a similar colored alter.

In a System which is structured into families and cities and worlds and sections, these "geographically different" structures in the mind of the victim can be connected via the color coding. In other words, the alters are structured into a 3-D cube structure. Then a fourth dimension (the color coding) is added to tie in all of the three dimensions. A central computer was placed in at the bottom of the mind. Using various techniques the victim is brought to the deepest altered state possible, and a computer is built into the mind via hypnosis and alters. This can be done by freezing the entire body and just keeping the head active. Or it can be done by bringing the body to a comatose state where the heart is beating faintly. This step can only be done under the strictest medical supervision.

The memory storage area for the computers include the Emerald City Library (staying with the Wizard of Oz theme) which contains alters who's only function is to memorize & retain with photographic memories pages and pages of information. The layout with codes of the entire system can be stored in a storage bank, so the programmer could access this area if his own records were lost. The libraries contain the historical genealogies of satanic iniquity from early ancient times to present. This ancient occult information has been reported by at least half a dozen Illuminati slaves as being retained internally by demons.

How Monarch Slaves Are Designed To Interface With The Unix System Of The Beast Computers
In line with what is being done by the Illuminati around the world with their network of computers--the computers have access codes similar to 666 666 666, and back out and close down codes similar to 999 999 999. These are the codes that the UNIX universal system uses, and the Monarch slaves are being created with codes that interface with the UNIX system for computers. (On some systems if the computer is shutdown it will request an input code of 666fff666fff666fff666...This can then be reversed F6F6F6F6F6F6F6F6F6F6).

The UNIX system is being used to allow the New World Order’s big BEAST computers to communicate with any known computer, including the minds of their Monarch mind-controlled slaves. In the 1960s, the U.S. Department of Defense began linking computers together into a superhighway now developed into the Internet. Hundreds of thousands of computers around the world are tied in. Like buildings in a city, each computer has its own unique address. Most of these addresses are registered at the Network Information Center in Menlo Park, CA. Individuals can also be registered at the NIC too. The U.S. Military links into the system with their Arpanet and Milnet networks, which tie together such divergent things as MIT computers, West Point computers, NORAD computers, Air Force Systems Command Space Division computers at El Segundo, CA and U.S. Army DARCOM at Seckenheim, Ger. (to name a few). These are all being tied together to form one vast electronic brain.

There are nine secret BEAST computers of the New World Order, at the time this was written. "Big Bertha" is the nickname of the BEAST computer located at the secret military installation called Dreamland at the secret Groom Lake, NV test site facility. Papoose Lake is referred to as S-4. The other super-secret facilities in the area are named S-2, 8-6, and S-66. This area has become the Illuminati’s prime programming facility for turning out Monarch slaves, and the Monarch slaves which are turned out from this area have turned out to be the worst basket cases. In other words the programming is very severe which is carried out in this area. This area has also been used for the space program, for the U-2 & SR-71, for the CIA’s A-12 spy plane, for the Stealth fighters (Lockheed F-1 17A Attack plane) and bombers, the Aurora, and for the U.S. government’s "Above Top Secret" flying saucers. The Big Bertha computer (named after the Illuminati Mother-of-Darkness Bertha Krupp) can be talked to in half a dozen languages and will answer a person back in the language they speak.

On a daily basis, airplanes fly into the Groom Lake facility. The call name of flights bringing workers and people go by the call name "Janet". About 12 Janet flights come into the facility everyday. These flights are usually Boeing 737s and arrive from places like a secure terminal run by EG&G at McCarran Airport in Las Vegas and from the military’s Palmdale, CA facility. These 737s are unmarked except for a red stripe running down the fuselage. Large military C-130 arrive with cargo, and Illuminati dignitaries arrive in smaller twin-engine craft. Victims for the programming are brought in via planes, & other routes.

One of the BEAST computers occupies three floors of the headquarters of the European Economic Community building in Brussels, not far from the important Illuminati Mother-of-Darkness worldwide headquarters castle near the Fr.-Bel. border near Muno, Belgium. Another BEAST computer is in Luxembourg. In observing the operations of the Illuminati, it has been seen that telephone area codes are used as part of a mind-controlled slave’s code. We do not understand everything about their codes, but it does tie in with other things that are happening.

Every person in the world has been assigned an 18 digit tracking number, which consists of 3 groups of 6 numbers. The first 3 numbers assigned in the BEAST computer to everyone are 666. The next is one’s national code. The U.S. national code is 110. Then the next 3 numbers are your telephone area code, and then finally your 9 digit Social Security number. The code then is 666 + Nation code + Tel. area code + social security no. = BEAST I.D. no. for an individual.

According to Dwight Kinman’s book The World’s Last Dictator, 2nd ed., (Woodburn, OR: Solid Rock Books, p. 256) VISA has already begun issuing VISA cards using the BEAST 18 digit number. When an American makes a bank transaction on an autoteller within a matter of seconds the BEAST has been informed of the activity. These computers use UNIX.

The particular programs for the economic transactions just described are a worldwide computer network called SWIFT (Society For Worldwide Interbank Financial Transactions). The SWIFT works off of the UNIX system and can communicate with any computer. It was developed by AT&T and uses C language. (Bear in mind that there are dialects of UNIX, such as the standard AT&T UNIX and for instance Berkeley UNIX. The UNIX system uses both timesharing and multitasking.

The mind of a Monarch slave also does both multitasking and time sharing. One of the nice UNIX features, is "protected memory", which is also part of the Monarch programming. A kernal is what the UNIX programmers call a "protected person". It is very similar to the internal "person" (alter) who helps the Monarch slave’s programming functions.

The big item about UNIX is that it has permissions granted. This is similar to the Monarch programming. Permissions are granted to 3 types of entities. The Top Programmer or "god" as he is called, of the UNIX System receives what is called the individual permission. The next permission is called group permission, and it is given to insiders who work with the system. The final permission type is the world, which has very limited access. The parallel between this and the Monarch programming is surprising. In some cases the programmers may have matched things on a one-to-one correspondence.

The Monarch program also has a Top Programmer who is called "god" to the System. He has total control over the system. His programming permissions can not be deprogrammed out by others who might want to usurp his power.

Hidden from the casual user of the UNIX system are the Daemons and Demons. The UNIX programmers decided to use the old english spelling for demon = Daemon. These are computer processes which work secretly behind the scenes and are given actual demonic names, some corresponding to actual names of historically known demons, such as Asmodeus. Asmodeus is also a demon which is placed into many Monarch slaves.

In the UNIX system these demons are treated like persons in the computer’s user director. Demons in the computer system do not have to log onto the computer, but they work behind the scenes and are given the same powers that people users are given. They are set up in the same structure as how the computer treats people. Permission in the UNIX system is granted using an 8 bit count with 0 through 7. The three kinds of permission are the read, write, and execute permissions. If no permission were granted in any way the UNIX system would indicate" "on the screen which means 000000 000 or nine 0’s.

The super user called god is given the code 777 which means super user. However, the permission of 666 gives the user the power to everything the 777 permission gives, except that the 777 permission allows the god the master programmer to execute not executable programs.

The Postmaster Demon is the head demon, and his permission level in UNIX is 666. (In the Monarch Programming "Mr. Postman" is a code word used internationally.) The most important part of the BEAST system is its communication power. The Electronic Mail System of the BEAST allows it to communicate worldwide, and along with electronic mail comes levels of permission to super user (god) is called Root.

A programmer on the Beast must get permission. His program must get permission. That program that gives permission must also get permission. In other words, there are levels of permission that must be gone through.

This is similar to the Monarch program. For instance, the alters personalities which would control the body during Illuminati gatherings have very tight access permission. It is very hard to access these hierarchy personalities. Both the UNIX system (and the Monarch programming) creates "children" by "spinning". The "child" spins off. When the "child" is finished it is "killed" in UNIX lingo.

When the programmers created child processes in the computer, they were having problems with the child processes killing the parent processes. The same type of problems have had to be dealt with in the Monarch programming. The initial programmer is often the biological parent of the child, and this parent is very responsible for extreme tortures being applied to the child who is being programmed--not to mention all of the expendible children, who are killed in front of the child to highlight the reality of the trauma. The natural reaction of the child being created is to hate the programmer.

Naturally, the Monarch programming had to overcome that natural tendency, which it does very successfully. The UNIX system uses an internal clock within its computer system. The UNIX clock is called CRON. CRON checks files to see if the programmer has put in any files to run. The UNIX system uses data bus lines, which are like the Monarch programming ribbons, which go through the system. These ribbons or data bus lines take information and commands from the computers to other computers.

Within the UNIX system, insiders have revealed that the Daemon (Demon) processes of all the UNIX systems have a security flaw. That flaw is that the Postmaster Daemon has access to them in spite of who the god is of that particular UNIX computer system. So while owners, who purchase UNIX systems think that they have exclusive control over their system, an external Postmaster Daemon coming from the Beast could use its permission levels to over ride the power of the local owner of the system.

The Monarch system has a similar feature, the Illuminati programmers know how to access the base or primal anchors to the programming and yank out any programming they want. All the slaves of these lesser groups such as the CIA, Church of Satan, Mafia, etc. can all be reprogrammed rather quickly to serve the Illuminati, if they are not already due to the Illuminati programmers extra knowledge on how to get into the base programming. In these many ways, the UNIX system serves both real computers and also for the internal computers of some slaves’ mind.

The slave’s system becomes a computer system. It functions as a series of computers that are connected to the master computer which is sunk into the mind at the lowest hypnotic level, which is a level often placed even below an internal "hell pit". To access the different computers, combinations of cards were used for the codes (numbers are also used. See Chapter 4.). Various parts of a Monarch system correspond to what any computer would have. A microprocessor register has 3 sections on a computer to make it functional. In Monarch Systems, you would find these 3 represented by 1. stored data in the library and alters with photographic memories, 2. an instruction section with codes, and 3. stacking mechanisms.

Linked to all this were a crystal, clock, hour glasses, a compass and an entire demonic command structure. The eye in front of the big computer will be protected by legions of spirits. The front big computer runs front quadrants and the back computer runs the deeper quadrants.

The software so to speak for the Omega programming (computer) may be set up to include a stacking program called the Potter’s Wheel. The Potter’s Wheel is a misuse of the Bible, and is a type of programming that the Charismatic/pentecostal movement carries out. The Mormons and the Catholics have their own distinctive "software" programs.

An initial stacking mechanism would work by telling alters to "Stand in Order according to rank and serial no." Another code along with a hand signal would place the Gatekeeper alters up on the Potter’s wheel for their "creator" to work on them. A group of alters could be taught to go up on their Potter’s wheel by seeing a pattern of dominoes. It is whatever the programmer decides.

The dominoes were used for coding, but they also had the programming feature of being able to tie alters together so that if the System is tampered with out of sequence, a domino effect would take place. This domino effect is for one program to set off another program to set off another program. Soon the Monarch slave’s mind is trying to deal with dozens of suicide programs running simultaneously, along with perhaps other programs such as scrambling programs.

For instance, one story line used is the mice run up and down and open up new levels of programming and are tied to the pendulum/clock mechanism. The mice can activate the hour glass, and a gold-winged green skirted fairy Whisper balances the hour glass on her wings. If the slave goes toward freedom, the slave’s mind triggers programs of all kinds, and the mind ends up not knowing if it was coming or going with all the different programs which activate.

A more exhaustive look at all the craziness and activity of the Omega & Gamma programs which activate to defend the Illuminati’s Mind Control are given in other chapters. The programming has been designed that if it was taken out improperly, it is to come back Seven times Seven stronger. This is also a clue that the programming is partly a demonic manifestation, cf. MT 12:43-45 et al.

Components Of The Controls
At the center of the System are the mechanisms that control it, such as the Master Computer, the All-Seeing Eye, the Compass, the Master Clock, and the Quadrants that tie in together. The System may have 3 hourglasses spinning on axes. These hour glasses can also be called matrixes, which are on your standard 3 axes, a X axis, a Y axis & a Z axis. The worlds are various sections of these matrixes.

There are backup worlds & mirror image worlds. Occasionally, there will be a double system. Some of the more important alter System are even far more complex than a double System or a double Double System. Each alter is split so that every alter has another alter created from it.

Then there are demonic doubles--demonic mirror images in the System. The double images shown in the picture are very real when describing our System. Some therapists have noticed "Satanic Guardian Angels" which talk to their patients. They do not know what to make of these. Some classify them as hallucinations, because they do not have any room in their belief system for demonology. These are the demons that do control the multiple’s mind.

Thor, with his hugh hammer is a painful demon. Thor’s image is made of cast iron & carried an iron mallet. Thor is a black strong figure. When his hammer strikes, the slave gets split brain headaches.

Programmers can use the story of the Giant with the Hammer in the Ozma of Oz book (pp. 141-155) to give the imagery when programming. A special series of sweeping motions with both hands will relieve the split brain programming, but some alters can only tolerate these hand signals being done by the master. By the way, Thor is an important protector in Satanic/occult beliefs, & the religion of Thor now has equal stature/popularity in Germany as the Lutheran church.

The programs are put into a System and given codes. These programs use Greek, Hebrew and Druidic letters (or other esoteric languages) in their activation codes. Actually, these alphabets also are the way these people numbered with, and the Greek, Hebrew & Druid letters were used as numbers. These programs could be called Utility Programs, because they function much like the utility programs of a computer.

Along with all the programming comes cover programming. Generally, front stories cover almost everything in a System. Dominos have been used in Monarch programming as the basis for what is called a "Mother Board" in actual computers. Telephone tones key in on a slave’s computer matrix. At times, telephone tones in everyday life will make slaves accidently wacky.

All computers run off of base 2--which uses the numbers 0, and 1. 0 and 1 can be represented as on and off. In the programming, they were represented by "He Loves Me", "He Loves Me Not." The Programmers, especially Dr. Mengele, enjoyed taking a daisy and pulling its petals off one at a time. First petal, "I love you". Second Petal, "I love you not." IF the last daisy petal was "I love you not", then the child was dramatically killed in front of other children to be programmed.

The Illuminati’s method of death - skinning alive - has been developed into a fine art, for both programming and ceremonies. A drawing of this skinning procedure by a witness is on pg. 338.

The daisy game, which was scary for a child, heightened the victim’s attention. Matrixes were built upon this deadly game. How did it feel to be programmed with Mengele’s "I love you, I love you not" programming? A victim recalls, "The child was placed in a cage exposed and naked. The low voltage wires were rigged to the metal of the cage. The child experienced a continual erratic or sporadic prolonged voltage of shock until the heart would pulsate and the anxiety level of the child became out of control. "Then the Dr. would enter the scene with his sneering taunting smile while holding a daisy in his hands. The sporadic voltage would continue to flow through the child’s body. As the shock continued, the Dr. stood before the child pulling petals off the daisy. His only communication was voiced in these words, "LOVE YOU, LOVE YOU NOT, LOVE YOU, LOVE YOU NOT," while pulling off the daisy petals. This action would drive the child crazy because the child knows full well if that last petal is pulled off it meant death.

The child that is not loved is skinned alive before the other children. "...we can now begin to understand that the expendable children were in other cages placed all around us for the eye to see. They went through the same process as we watched. When the last petal of the daisy was pulled from the flower they were killed. Then the terror of what we had just experienced through the seeing and hearing, let us know we were next, but when? By the time the doctor got to "He loves me not" some children no longer knew fear. Their ashes were taken from the crematorium and used in the garden for fertilizer, as a reminder to all what happens to unloved children. "In the clinical room, the lights were used to program the day’s events. The bright light continually flashed starting with 7 lights, then six dots, then five dots, then four dots, then three, then two dots, then 1 dot. In the blindness of the lights, we could hear the doctor’s voice, "LOVE YOU, LOVE YOU NOT." over and over again. A child could have a false trust when the lights flashed 7 dots. By the time one dot was flashing, the child’s terror had once again risen. The doctor never pulled the last petal off for us, but we can’t forget how he teased us. He smiled and walked away, "NO, I LOVE YOU." and walked away."

If we use L=I love you and N=I love you not we can build the following matrix for the internal computer:

L N L N L N

1 2 3 4 5 6

2 3 4 5 6 1

3 4 5 6 1 2

4 5 6 1 2 3

5 6 1 2 3 4

6 1 2 3 4 5

This type of configuration can even be tied to color programming, and to dominoes, where the numbers are represented as the dots on a domino. By making numbers into dots--the numbers can be represented by lights in the same patterns of black domino dots. This means that dominos can be used to program a child, and who would suspect anything about dominoes?

Another thing that lends itself well to use as a programming code are a deck of cards. Many slaves have this. It can be tied in with the Alice In Wonderland story. When cards are used, a section (also called a world or city) of alters will be given its own computer. To access that computer, a code consisting of several things including 2 cards can be used.

In review of what Chapter 4 said about codes, often double codes are employed--what is meant by that is that suppose we have 13 important alters in a section. They will designate each of these "A" alters. Then they number them each 1 through 13. But then they will double code them so that as we count up, we also count down. Then they attach a generic level number to them, say 2,000. So putting this together we have Emerald Green 2001-13a for our first alter, then next is Emerald Green 2002-12a, the next is Emerald Green 2003-11a, and so on. Then the magical name of the alter or the Tribal name of the alter can be attached onto this to complete an access code.

While it seems perhaps complex at first, all an alter is remembering is a color, a common section no. and their rank no. and their file letter, and their magical name. (The name to pull them up, will not be their name for public use). Alice In Wonderland, the Wizard of Oz and the Tall Book of Make Believe played a fundamental role as "software" in a System. The Wizard of Oz stories are often used to show how & what structures to put in the small victim’s internal world. The stories even teach HOW to create an internal world and its parts. Some of the T.V. shows & movies, which served as Monarch programming scripts (i.e. the software) include:

* Batman

* Bewitched

* Bobby’s World Cartoons (deliberate triggers)

* Dameon/Omen movies

* Disney movies (all of them, some with deliberate triggers)

* Duck Tails Cartoon (deliberate triggers)

* ET (used in alien programming)

* Fantasy Island (deliberate triggers)

* Ghost Busters (used for "who ya’ gonna call" theme)

* Love Boat (used for mind control of cruise prostitutes)

* My Fair Lady (finishing school for slaves, such as Youngstown, OH)

* Star Wars

* Steven King Horror Movies

* Tiny Toons Cartoons of Steven Speilberg (deliberate triggers)

* Wizard of Oz movies

Some of the books which were used as programming scripts, which haven’t been mentioned yet, are the Dead Sea Scrolls, the Egyptian Book of the Dead (satanic rituals follow closely the rituals of the Egyptian Book of the Dead), Steven King novels, & Wilbur Smith’s. The Mother Goose nursery rhymes were used prolifically for internal codes in slaves.

Now that we have discussed the widely used "soft ware" available to the programmers, we don’t want to forget the root program, the tree which was used as a method of organizing the various programs, just like a computer’s subdirectories branch out more subdirectories. If the programming is tampered with, the slave will want to cut the tree, however, since the tree is in them, this means they will want very badly to cut their arms, especially their veins.

The programming is not guarded as much as the computers. Everything guards the BEAST computer including deaf alters who have to be communicated with using a hand number code system. Such a code might resemble finger signing 1,2,3,4,5,10 = 15 & following this with a shutdown code which simply reverses the access equation. Surrounding the central All-seeing-eye will be alters & programs with insanity, fear, hopelessness, cutting, burning, aloneness, etc. Strong demonic forces are attached to these alters & programs. They also can trigger the slave to have abusive behavior as punishment. A System is given a life force which is able to regenerate a system, the jokers who protected the programming, and you have the alpha-numeric codes, the cards, and dominoes (represented by a dice) that formed the access codes to parts of the System.

The alters will often feel the heartbeat (which may be an alter) associated with the computer. In the background is a LUCIFERIAN blue light. This Satanic light empowers the Joker. It along with the Joker and the internal programmers give a System the ability to regenerate itself. One can shut down internal computers which run programming to the levels of the System using the same codes that the original programmers use, but until one also takes care of the 13 Jokers & the faceless white-coated programmers who control the Omega Programming, then the back up computers can regenerate the programming & rebuild the system.

Jokers
If the computers are given cards as access codes, it works in well to create Jokers who are wild cards within the system, which can imitate anything. The Jokers have a LUCIFERIAN form. Luciferian is the term that the programmers used. This means that it is spirit. Because the Jokers are Spirit, they can take any form they need to and they can do what they want to do, until they are bound & cast out with the rest of their hierarchy of demons. The Jokers will pop up when a victim tries to study the codes & programming that direct that victim’s life. Around this cult core are the jewels (which are the programs the dwarfs mine). Remember the story of Snow White and the Seven dwarfs? Also swirling around Silence are ribbons which we will discuss later.

TREES. The trees bud at certain times. This is one way the imagery of the tree to connect to the time that rituals are to happen. If the tree is barren of leaves (no programs--i.e. deprogrammed), then the system is to grow more leaves.

C. Internal Hierarchies
The programmers build chains of command within the groups of alters that they create. They credit themselves with bringing order out of chaos. When a system of multiple personalities thinks of rebelling, they are in the similar situation as a colony wanting freedom from its mother country.

Can we govern ourselves, and what governing structures can we keep--since the structure itself is colonial? Can the mind work together to help itself? The concerns are legitimate questions. And yes, the multiple’s mind can function outside of the control of the programmer’s hierarchical arrangement, but not without alters taking on different job assignments. In the slave’s hierarchal chain of command, adult alters are assigned to insure that child alters don’t get out, unless the abusers want a child alter out. Likewise, commander alters are needed to keep the switching smooth, and to keep things orderly. Subordinate alters are taught to submit to their king, or governor, or queen alter. Immense power and indoctrination is given to the key cult alters ruling a system.

The internal hierarchical arrangement means that the host alter coming into therapy (often a Christian) may not be as completely open as therapists think. They must play an internal game of going toward health while not pushing the buttons of deeper more powerful alters. A lot of internal politics may go on. A front alter may promise a deeper alter secrecy in order to consult with it. This makes for all kinds of triangulation and manipulation within the alter system itself. The entire hierarchy of alters has a lot invested in protecting the core from trauma, which was why the core was split in the beginning. Trad, therapy goes after the core & the multiplicity that protects it, thus insuring resistance from the entire hierarchy incl. front alters, who in MPD systems seeking help are often close to the core. The core self is best not directly pursued by the therapist, but gently encouraged on its own to reconnect.

Reply With Quote
  #34  
Old 10-13-2010, 01:54 PM
8esteve
Offline:
So Fucking Banned
Poster Rank:257
Join Date: Dec 2009
 
Mentioned: 0 Post(s)
Quoted: 0 Post(s)
Activity Longevity
0/20 14/20
Today Posts
0/11 sssss3294
Re: Trauma-based Mind Control? (or Torture-porn?)

Science No. 11--Internal Controls
A. Teaching Occult Philosophies
B. Internal Computers--Perfect Delegation; Internal Computers Which Auto-Control A Slave

C. Internal Hierarchies

A. Teaching Occult Philosophies

Learning plays an important part in perception. The Programmers try to get their victims to subscribe to philosophies and ideas that will make it hard for them to rebel against their controllers. This is what is termed indoctrination. The same methods of teaching that others find useful are employed. Ways of thinking are incorporated by the slave via handlers, programmers, and the cult they belong to. Everyone tries in their own way to make sense of life. This is a natural brain function, so that the human mind can understand how to deal with the future. The mind takes raw data, and then applies some type of logic, and comes to conclusions. Once accepted these conclusions can be as hard as nails, and they will defy any attempt to change them, even in the light of new evidence. If the Programmer is smart enough, he can get an alter to logically believe anything.

Once the belief is embedded, it will remain there tenaciously. In the Illuminati, "great" masters and adepts teach "hidden mysteries". The slave feels the authority that emanates from this teacher with special gifts and abilities. The slave is hardly in a position to question the teachings being given from on high. Circular reasoning, lies, and other tricks are used to convince the person that the occult world is true. For instance, "God abandoned you, therefore you need to cling to us, the only ones who would see any use in you." (The truth is that the cult staged a crisis where their actor playing God abandoned the child to the cult’s abusiveness. The whole event was simply cult abuse--with God taking the blame).

"We are trying to fashion a better man, a man with far more capabilities than before, with better genetics. Those who oppose us, are trying to keep humankind back in the dark ages."

This is circular reasoning and outright lies. (They are not interested in helping mankind, only destroying it). To make occult philosophies more palatable, the occult world attacks the character of anyone whose life would dispute their false claims. They also use a great deal of rationalization, where the end justifies the means. Many slaves have had to sit and listen to their masters rationalize their brutality.

Within the Illuminati, ranks are achieved with much learning and ritual. Within the Temple of Set, a member is required to read certain books. Fritz, the co-author has a list of books a Temple of Set member is asked to read, with the comments attached by the Temple of Set to each suggested title.

In their suggested/required reading Category 19 entitled "The Metamind" is Metropolis by Thea von Harbou. Their comments are "An Expressionistic portrait of a negative utopia in which humans are controlled by machines.. .the basis for many electronic/audio-visual ritual techniques employed by the Church of Satan and further developed by the Temple of Set." (p. C21-2).

Another is Physical Control of the Mind: Towards a Psycho-civilized Society by Jose M.R. Delgado. Their comments, "Delgado, Professor of Physiology at Yale University, is one of the most distinguished authorities in the field of Electrical/chemical Stimulation of the Brain (ESB). This book is necessarily dated, but it is so well-written that it deserves to be perused as a preface to more recent works on the subject." (p.C-16?-2).

The Psychology of Anomalous Experience by Graham Reed. Their comments, "This book addresses unusual, irregular, and puzzling experiences- dejí vu, illusions, delusions, hallucinations, etc.-in terms of the mind’s normal psychological processes of gathering, monitoring, processing, and storing information." (ibid).

This is just a brief look to illustrate to the reader that leaders of groups like the Temple of Set are avid students of mind-control. (An almost complete membership list of this group at one point in time, is provided in Appendix A). The librarian of the Multnomah County Detention Ctr. shared with co-author Fritz that Sheila, formerly second-in-command of the Bhagwan Shree Rajneesh’s commune at Antelope, OR studied, via jail/prison interlibrary loan, books on Hitler’s mind-control techniques. Many other examples could be given of how mind-control is being studied and taught by these groups.

One more book on the Temple of Set’s reading list would be worthy to point out, The Psychology of Man’s Possible Evolution by Peter D. Ouspensky. Their comments, "Should be read especially by those members whose magical ability is hampered by flaws in their balance factor....A series of lectures which explain the Gurdjieff approach to the concept better than G. himself was able to do." There is an important link between Gurdjieff, mind-control, MPD, etc. but the subject is big and needs to be further investigated. Co-author Fritz has been investigating this link, including talking with leaders of the most successful Gurdjieff commune. As with so many groups, what you see, is not what you get.

Teaching The Ideologies Of War
One of the ways to control a person is to get them angry and then channel that hate. Wars have been used for centuries by the oligarchies that run things to control their people. Right now, the New World Order is carrying out a Drug War, an Environmental War, and a Bosnian conflict for the express purpose in their own plans to control us. They have a mock-alien invasion planned to further justify more control over our lives.

Over the years mankind has created an entire industry around warfare. There are long traditions within military units, that for some reason must be "upheld" by the men who serve in those units. When people buy into the philosophies of war, they can generally be persuaded to give up or do anything to contribute to that war. After all, any sacrifice will be minor compare to the large numbers of bodies that will end up dead. One of the large purposes of the Monarch type of trauma-based mind-control is to produce robotic soldiers who will do anything. Normal military training is usually sufficient for most military needs, so it is clear that Monarch slaves have some ulterior uses that the military doesn’t want the public to know about.

Various Delta Forces
The military as well as other groups have created numerous delta teams, delta forces, delta groups etc.

Delta Assassination Teams
These teams are projects that the Satanic Hierarchy and the CIA collaborated together on. The programming that was placed into people was ingenious and very complex. As the program progressed over the years, the programming became more sophisticated and past mistakes were improved upon. The Delta Teams were programmed to carry out various assignments such as political assassinations. The members of these teams are housewives and other ordinary people who were programmed years ago. The Delta Teams are part of the CIA’s psychic warfare bag of tricks. The CIA works so closely with the military that the Delta Force is easily expected to be tied in with the CIA & U.S. intelligence.

Delta Force
The system tapped Frank Burns to create the Delta Force. Frank Burns was a Green Beret. What kind of things did Frank get involved with AFTER joining the military? Hold on. Frank Burns was an SDS (Students for a Democratic Society--an Illuminati organization) organizer. He was also deep into Zen Buddhism, which is the same as mysticism. Frank Burns as an officer also studied under the Esalen Institute.

The Esalen Institute is at Big Sur, California and is the American equivalent of the infamous Tavistock Institute. The Esalen Institute created "sensitivity training" programs for the business world under the title "Organizational Development (OD). Esalen people were brought in to Fort Ord where Frank Burns was the commander and began training people. The army promoted Burns to work in the Chief of Staffs office as a "senior organizational effectiveness consultant", which allowed Burns to introduce Esalen programs all through the army.

This could not have accidentally happened. Frank Burns in a conversation with a two-star General about the need for "wholistic" soldiers coined the slogan "Be all that you can be in the army." Burns phraseology began the army’s recruiting slogan. It refers to the Human Potential Movement that the army has incorporated from the New Age movement. The army is moving toward becoming an occult fighting force that practices witchcraft with its warfare. Some of the units moving that direction are Psy-Op operations, which has included Satanists within its officers. The Delta Force network of various Generals and other high ranking officers is merely one facet of the drive by the Illuminati to transform the American army into something akin to occultic warriors that will be as fierce as the Nazi Death head units. Bear in mind that George Bush, commander-in-chief of Burn’s Armed Forces has come from an Illuminati family/ & the Ill. Skull & Bones chapter that was part of the secret support for Hitler. They have been using as an insignia what they themselves (the Skull & Boners) call "the Death Head".

It is not surprising then that support for the Delta Team activities has come from the very top. Frank Burns set out to create a warrior monk. Lt. Col. Jim Channon, in Delta Forces, also put forward the idea. Channon visited more than 130 New Age groups in California doing what was called "social experimentation." It is an idea that the occult have repeatedly carried out.

Hitler’s S.S. were a special elite group of warrior monks from which about 3,000 went through religious initiations. (As the war progressed the primary focus of the S.S. shifted from being the Black Order to merely being a reliable military group called the Waffen SS.) There were 3 levels of initiation, the last reserved for the hard-core Satanists at the top. The Nazi initiation seems to have been an attempt to get the force of the Vril. The Ordensburgen (Castles of the Order) were training centers for the elite Nazis, including the S.S. (Having been in the military, I know first hand that the success of the S.S. and Waffen S.S. units in being fierce warriors is attributed by some of our leading military men to their training to be warrior-monks.) One group of the S.S. called Knights of Poseidon volunteered themselves for castration, in an experiment to change them back to the supermen of the mythical and magical Hyperborea.

Some of the best Sufi organizations were warrior monks. Burns and his Task Force Delta generated the First Earth Battalion, which is an occult military unit trained in martial arts, and witchcraft. Men who are selected for First Earth Battalion are given an occult initiation which includes the following oath:

"I have the capacity and therefore the duty to contribute to the development of myself, my associates, and our planet, simultaneously now! I take personal responsibility for generating evolutionary conspiracies as a regular part of my work. I will select and create conspiratorial mechanisms that are not costly in time or resources because I am aware of the five channels available to me (such as radio, television, and word of mouth.) I will organize a self-supporting high commando group that will create and perform evolutionary breakthrough actions on behalf of people and planet. One people, one planet. I will then pass this concept on to others who are capable of generating further self-organizing commando teams".

What ever happened to defending this nation? Military units such as the First Earth Battalion although they are supported by American tax dollars are not here to protect America. They are global minded. They are here to protect an occult world government. They are out there actively promoting the New World Order. Several years ago, Egendorf states that $4.5 million (which came from you and I, and other Americans) had already been spent on Delta Force’s 80 different projects. The Green Berets is another organization that has been heavily targeted by the Satanists, to indoctrinate and recruit. The Green Berets are increasingly moving toward being warrior-monk group. Many of them are now programmed multiples.

One man who is being looked up to by many American Patriots and Christian Patriots as the leader to help them oppose the New World Order is Bo Gritz. He was a recent presidential candidate. Bo Gritz was a Green Beret and a Delta Force commander. Bo Gritz is very proud of the fact that he wrote the manual for the Delta Forces. He also worked for the CIA. Bo Gritz is one of the military’s best programmed multiples, and perhaps one of the most dangerous. Insiders have told me he IS the most dangerous. Numerous insiders both for and against Bo, have talked about Bo Gritz, and that he is a programmed multiple. According to Bo Gritz’s campaign literature for President he was a commander in Delta Forces. Reproduced on a previous page is Bo’s own presidential campaign literature where he states that he is "Intelligence Officer & Reconnaissance Chief, Delta Force." He is also "Chief, Special Activities, U.S. Army General Staff, the Pentagon" and "Principle Agent, National Security Council, Intelligence Support Activity". Under qualifications Bo states that he is a "Security & Counter-terrorist Specialist."

Within the government, they are already referring to Christians who are against the NWO as terrorists. Bo is their greatest counter-intelligence counter-terrorist they have. He came in like a storm and took control of the Patriot movement, and it has been like pulling teeth to warn patriots about who he is. Bo Gritz himself was a Green Beret, and was used to assassinate 300 people. His blood lust caused him at one point during the Vietnam War to shoot 30 prisoners in cold blood.

I also heard Bo talk about say being Temple recommend Mormon. That means he was at that time in good standing with the LDS Mormon church so that he could go to the Temple and participate in its rituals. Those who are alert realize that the temple rituals are like Masonic and Witchcraft rituals. Now he is no longer a Mormon. But he still continues in the military philosophy he believes in. Bo Gritz is going around the nation teaching SPIKE training to anyone who wants martial arts skills. Bo has done an excellent job in identifying for the New World Order every person in the nation who could threaten their plans for a martial law NWO takeover.

Bo Gritz likes to call attention that he is one of this country’s foremost counter-terrorist agents. This is true. The New World Order believes patriots and Christians are terrorists, because they stand in the way of the world’s acceptance of their world dictator. Bo Gritz has done a great deal to infiltrate and neutralize the opposition to the New World Order. He has been their best counter-terrorist agent.

B. Internal Computers--Perfect Delegation; Internal Computers Which Auto-Control A Slave
If a master has to constantly spend time whipping and motivating his slave, as well as forever watching that the slave doesn’t escape or do shoddy work, or physically or verbally injure the master, then controlling the slave can end up to be a full time job. When the master gets too much involved in the control process, he ceases to be master, and becomes a slave to the control process. The intelligence agencies knew that they would have to create mind control slaves who could police themselves. If the master has to constantly guard his slave, the slave will be more trouble than he is worth.

Many successful people have gained their success because they knew how to delegate. The most successful supervisor is the one who can delegate the best. The programmers had to find ways to cut their supervisory requirements to the bone if they were to make owning a Monarch slave worthwhile. The method chosen was to build "computers" into the slave’s mind that would internally regulate everything. They do this by taking hundreds of the alters and dehumanizing them and turning them into parts of a computer.

For instance, the shutter on the All-seeing eye of the computer, which is seen in the mind like a camera shutter, is a child alter who's job is to open and shut. (Another primal part is inside the eye’s pupil.) This shutter part knows what goes on in all the system subconsciously but if discovered by a therapist and pulled to the front of the mind will not be able to vocalize about the system. The software for this "computer" could be programmed into it, and all the individual programming of every alter can then be tied back to the computer. In other words, each alter would be programmed on how to view life, to act, to think, and to function in their job. This programming would be linked to a computer.

The programmers invented the perfect method to decentralize their control over their slaves and yet still supervise with the tightest of control. Each alter is linked to a computer (internal-not an external one) built from a foundation of fear and trauma. Since each section of alters was to remain secret, each section of alters for a slave is given its own computer, and then linking computers were built to link the various sections, and then finally a major backup computer is built, and then finally the internal Beast computer. Bear in mind that this is all built internally in the mind of the victim. We are not talking about actual physical computers built out of physical microchips, wires, condensers etc.

If the programmer concentrates on a single point when giving instructions he will get better results. Rather than complicating things for the slave, you gain power over the slave (and any subordinate) if you can give simple clear instructions. For this reason, a large share of the alters in an alter system are given very clear straight forward jobs. Because their jobs are so straightforward, these alters will often remain fragments, rather than alter parts with full blown personalities. The programmers don’t cloud the issue. An undeveloped alter will be given one single clear, basic job. By stringing 1,000’s of alters together with single tasks, a highly sensitive system of alters can be created.

Each piece of the System is separated by some degree of dissociation to make it a separate piece. By dividing the mind so much, it is incapable of fighting what has been done to itself. Before we begin describing the technical details of an internal computer, bear in mind that every Monarch System is unique and yet they all follow certain patterns & methodologies. Most of the models for the first few decades follow these patterns, some of the newer ones have more updated imagery.

Power Sources
In an Illuminati System, a computer is created for each section of alters. That computer will be given a "power source", which if unscrewed like a light bulb will go out. The light from one of these power sources might be emerald blue or emerald green or other color. The reader may want to refer to chapter 4 for the codes to understand the structuring of the various computers and systems.

Color Codes And Ribbons
In a standard 13x13x13 Illuminati alter system, 13 colors were used, and each computer was given a color. These would be pink, orange, yellow, white, red, brown, blue, green, black, purple, silver, gold and platinum, and clear. Color programming is reported to have been developed at UCLA. Whatever the case, Systems all over the United States have color programming.

The hierarchy of colors in a System is often as follows (from top power down): Platinum, Gold, Silver, Purple, Black, Red, Green, Brown, White, Orange, Yellow, Pink. Clear is also used as a color for secret areas of the system. This hierarchy of color coding can be switched. The internal programmers can reassign colors if they need to, in order to protect the programming. Alters, sections, and parts of the computer are all color coded. The color coding for alters is not the same just because the alters are in the same section. The color coding within the Illuminati Mind Control is fairly consistent, however a sample of an alternative Illuminati color scheme will also be provided. A survey of colors is as follows:

CLEAR. Secret or shell alters who can take on any color are coded clear. These are alters who serve as images or as a stage for other alters. This would include "Guardian of the Vail" alters.

GOLD. This color is for the supreme leadership in the System, which includes the Grand Druid Council.

SILVER. This color is for the Satanic alters who perform high level Satanic rituals. The Mothers of Darkness have silver coding.

PURPLE. These alters see themselves as the abusers, rather than the Illuminati. These alters were involved with the programming. They have been taught to forget the abuse and to reframe it in their mind as training.

BLACK. These alters were born out of Satanic ritual, and are Moon children. The Delta and Beta alters are black coded. They do the dirty work for the cult, such as blackmail and assassination.

RED. These altars see themselves as witches. They were born out of witchcraft ritual, believe they have great spiritual power, and tend to deny that they have been abused.

GREEN or EMERALD GREEN. These cat altars recognize they have been abused. They still see themselves as belonging to the cult family, and deny that they have been abused to protect their cult family.

BLUE ALTERS. Clones, armies and the ribbons appear to have blue coding. These alters will go so far as to hurt the body to protect it from leaking information or deprogramming.

WHITE. These are Atlantean alters who have been given Aryan type racial nonsense to think they are superior. They believe in genetic engineering, and a master race.

ORANGE. These special protector alters are scouts who warn of danger from internal or external threats.

YELLOW. These are the strong Christian alters of which there will only be a few in the System. They help serve as a balancing point to control the System as well as to hide what the System is all about.

PINK. These are core related alters. They maintain the true feelings of the true self apart from the cult programming and the cult family’s programming. These alters are viewed as weak because they are emotional and often break down and weep. They are fragile emotionally.

An alternative color scheme that is used:

DARK EMERALD GREEN. This color is assigned to the Anti Christ-Satan alter(s). Green is the occult color for Satan and happens to be the most sacred color. Few people outside of Satanists know that Green is more sacred for them than any other color.

LIGHT GREEN. The gods and goddess alters which are triads which function in Illuminati ceremonies get this color coding.

WHITE. The internal programmers who come around in white robes get this color assigned to them, as if they are doctors or angels of light.

RED. Sexual alters are given the natural color of sex and arousal red.

BLACK. Connecting alters that are Nexus alters between various system parts.

PINK. Reporting alters.

DARK BLUE. Non hierarchy cult alters.

LIGHT BLUE. Alters in charge of the way the system runs, such as the judges.

YELLOW. Alters which are ritually and sexually twinned with alters of other systems.

ORANGE. Guard alters which are heavily programmed for obedience.

VIOLET-PURPLE. Front alters and small child alters placed into boxes.

CLEAR. Shell alters to deceive the outside world.

GOLD. The traumatized alters upon which the programming is built on.

Joseph Mengele and the programmers who worked with and under him, used a large dollhouse with 26 rooms. Each of the rooms were painted with one of the 13 different colors in order to build into the child’s mind, the 13 front and the 13 back computers. The internal computers worked off of color codes, as well as other codes.

A dollhouse was used to instill into the child’s minds the compartments of the computer. Each room was done up in a different color. One particular room was a secret room, and this represents the secret world of Petra which is hidden behind two large rocks. This secret world is coded the color clear.

Besides the special color clear, the following colors appear in the system: Gold, Silver, Purple, Black, Red, Green, Blue, Brown, White, Orange, Yellow, and Pink. Each color has meaning and a rank. Just as the hour glasses could be turned, the color coding can be switched in rank. This is why in some systems there is a "Computer Operator Black", a "Computer Operator Green", and a "Computer Operator Purple", etc.

During the programming a black box with needles and wires which attach to the body for electroshock is used. While electro shocking the victim, colored scarf's coming out of a box are showed to the child. The scarf's would help form the imagery needed to build colored ribbons internally. Alters would be created using the Tall Book of Make Believe story of the Pancake people. Using this as a base or foundation, the alters would then be dehumanized one step further into thinking they were ribbons, such as ticker tape, which could transmit information from one computer to another area of the mind.

The Ribbons had the ability to travel between the different levels and to transmit messages through the System, especially to the computers. It is believed they could do this because they were spirit. When a System is accessed by a programmer, one procedure is to obtain a Ribbon alter and then inform the Ribbon what he wants. The ribbons transmit messages to the internal computers. The ribbons on older systems use Morse Code.

Who are the Ribbons? The Ribbons are the beginning of the LUCIFERIAN alter-like demons and alters. They are primarily the message bearers from the computers to the different computers, levels and alters. The Ribbons might have angelic names (Michael, Gabriel, etc.). The word angel means messenger. The ribbons serve a very similar function. They transmit ticker tape with morse code messages. They are at work most of the time for a System. A sample cover story for what they guard--which is the main computer with the gems and the core, is that the ribbons guard the System’s "Garden of Eden".

Some more of the cover story that may be given is this: Ribbons were supposedly formed out of the dust of the ground and were placed in the Garden of Eden to create every pleasant tree. (See Genesis 1.) The ribbons relate to the Tree of Life. But to eat of the Tree of Knowledge of Good and Evil will cause death. The name of the first river of four in the garden is Pashon. Out of the first river come four heads. The River Pashon has gold, ballium, onyx, rubies, diamonds and precious stones. These gems are the programs the dwarfs mine. If the System has charismatic programming, the alters will have porcelain face programming. In this case each ribbon’s color will match the color of the stones in the masks--that is yellow, white, blue, green, purple, red and black.

The colors of the ribbons correlate or match the colors of the Dollhouse rooms. What do ribbons do? The Ribbons serve the programmers and the computers, who in turn serve the evil master Spirits. Things that the Ribbons do for the computers have been identified as follows:

a. The Ribbons eat from the system’s internal "Tree of Good and Evil",

b. Ribbon programming consists of several things--where they reside, who they are and what they are to protect.,

c. Ribbons must protect the computers in order to protect their own life. The Ribbons will be programmed to believe that reversing the computer will reverse the Ribbons’ life. The ribbons themselves operate with mechanical hearts (not human hearts).

The cover stories may include the following: All Ribbons are hid behind a little girl, who is a front for them & who tells the creation story. The little girl will tell the creation story which included the Ribbons. Behind her runs a silver cord. The silver cord has to do with heart programming. The silver cord has 3 strands that cannot be broken as per ECL 4:12. This silver cord goes off if the Ribbons are touched. Ribbons are set up so that suicide programming is triggered if they are cut.

Actually, French braiding conceals a 4th strand. In review as stated, during the programming, a box with colored scarf's was shown the child while severe electro-shock was given to the body. A colored scarf represents a ribbon which runs a message from a colored room to a similar colored alter.

In a System which is structured into families and cities and worlds and sections, these "geographically different" structures in the mind of the victim can be connected via the color coding. In other words, the alters are structured into a 3-D cube structure. Then a fourth dimension (the color coding) is added to tie in all of the three dimensions. A central computer was placed in at the bottom of the mind. Using various techniques the victim is brought to the deepest altered state possible, and a computer is built into the mind via hypnosis and alters. This can be done by freezing the entire body and just keeping the head active. Or it can be done by bringing the body to a comatose state where the heart is beating faintly. This step can only be done under the strictest medical supervision.

The memory storage area for the computers include the Emerald City Library (staying with the Wizard of Oz theme) which contains alters who's only function is to memorize & retain with photographic memories pages and pages of information. The layout with codes of the entire system can be stored in a storage bank, so the programmer could access this area if his own records were lost. The libraries contain the historical genealogies of satanic iniquity from early ancient times to present. This ancient occult information has been reported by at least half a dozen Illuminati slaves as being retained internally by demons.

How Monarch Slaves Are Designed To Interface With The Unix System Of The Beast Computers
In line with what is being done by the Illuminati around the world with their network of computers--the computers have access codes similar to 666 666 666, and back out and close down codes similar to 999 999 999. These are the codes that the UNIX universal system uses, and the Monarch slaves are being created with codes that interface with the UNIX system for computers. (On some systems if the computer is shutdown it will request an input code of 666fff666fff666fff666...This can then be reversed F6F6F6F6F6F6F6F6F6F6).

The UNIX system is being used to allow the New World Order’s big BEAST computers to communicate with any known computer, including the minds of their Monarch mind-controlled slaves. In the 1960s, the U.S. Department of Defense began linking computers together into a superhighway now developed into the Internet. Hundreds of thousands of computers around the world are tied in. Like buildings in a city, each computer has its own unique address. Most of these addresses are registered at the Network Information Center in Menlo Park, CA. Individuals can also be registered at the NIC too. The U.S. Military links into the system with their Arpanet and Milnet networks, which tie together such divergent things as MIT computers, West Point computers, NORAD computers, Air Force Systems Command Space Division computers at El Segundo, CA and U.S. Army DARCOM at Seckenheim, Ger. (to name a few). These are all being tied together to form one vast electronic brain.

There are nine secret BEAST computers of the New World Order, at the time this was written. "Big Bertha" is the nickname of the BEAST computer located at the secret military installation called Dreamland at the secret Groom Lake, NV test site facility. Papoose Lake is referred to as S-4. The other super-secret facilities in the area are named S-2, 8-6, and S-66. This area has become the Illuminati’s prime programming facility for turning out Monarch slaves, and the Monarch slaves which are turned out from this area have turned out to be the worst basket cases. In other words the programming is very severe which is carried out in this area. This area has also been used for the space program, for the U-2 & SR-71, for the CIA’s A-12 spy plane, for the Stealth fighters (Lockheed F-1 17A Attack plane) and bombers, the Aurora, and for the U.S. government’s "Above Top Secret" flying saucers. The Big Bertha computer (named after the Illuminati Mother-of-Darkness Bertha Krupp) can be talked to in half a dozen languages and will answer a person back in the language they speak.

On a daily basis, airplanes fly into the Groom Lake facility. The call name of flights bringing workers and people go by the call name "Janet". About 12 Janet flights come into the facility everyday. These flights are usually Boeing 737s and arrive from places like a secure terminal run by EG&G at McCarran Airport in Las Vegas and from the military’s Palmdale, CA facility. These 737s are unmarked except for a red stripe running down the fuselage. Large military C-130 arrive with cargo, and Illuminati dignitaries arrive in smaller twin-engine craft. Victims for the programming are brought in via planes, & other routes.

One of the BEAST computers occupies three floors of the headquarters of the European Economic Community building in Brussels, not far from the important Illuminati Mother-of-Darkness worldwide headquarters castle near the Fr.-Bel. border near Muno, Belgium. Another BEAST computer is in Luxembourg. In observing the operations of the Illuminati, it has been seen that telephone area codes are used as part of a mind-controlled slave’s code. We do not understand everything about their codes, but it does tie in with other things that are happening.

Every person in the world has been assigned an 18 digit tracking number, which consists of 3 groups of 6 numbers. The first 3 numbers assigned in the BEAST computer to everyone are 666. The next is one’s national code. The U.S. national code is 110. Then the next 3 numbers are your telephone area code, and then finally your 9 digit Social Security number. The code then is 666 + Nation code + Tel. area code + social security no. = BEAST I.D. no. for an individual.

According to Dwight Kinman’s book The World’s Last Dictator, 2nd ed., (Woodburn, OR: Solid Rock Books, p. 256) VISA has already begun issuing VISA cards using the BEAST 18 digit number. When an American makes a bank transaction on an autoteller within a matter of seconds the BEAST has been informed of the activity. These computers use UNIX.

The particular programs for the economic transactions just described are a worldwide computer network called SWIFT (Society For Worldwide Interbank Financial Transactions). The SWIFT works off of the UNIX system and can communicate with any computer. It was developed by AT&T and uses C language. (Bear in mind that there are dialects of UNIX, such as the standard AT&T UNIX and for instance Berkeley UNIX. The UNIX system uses both timesharing and multitasking.

The mind of a Monarch slave also does both multitasking and time sharing. One of the nice UNIX features, is "protected memory", which is also part of the Monarch programming. A kernal is what the UNIX programmers call a "protected person". It is very similar to the internal "person" (alter) who helps the Monarch slave’s programming functions.

The big item about UNIX is that it has permissions granted. This is similar to the Monarch programming. Permissions are granted to 3 types of entities. The Top Programmer or "god" as he is called, of the UNIX System receives what is called the individual permission. The next permission is called group permission, and it is given to insiders who work with the system. The final permission type is the world, which has very limited access. The parallel between this and the Monarch programming is surprising. In some cases the programmers may have matched things on a one-to-one correspondence.

The Monarch program also has a Top Programmer who is called "god" to the System. He has total control over the system. His programming permissions can not be deprogrammed out by others who might want to usurp his power.

Hidden from the casual user of the UNIX system are the Daemons and Demons. The UNIX programmers decided to use the old english spelling for demon = Daemon. These are computer processes which work secretly behind the scenes and are given actual demonic names, some corresponding to actual names of historically known demons, such as Asmodeus. Asmodeus is also a demon which is placed into many Monarch slaves.

In the UNIX system these demons are treated like persons in the computer’s user director. Demons in the computer system do not have to log onto the computer, but they work behind the scenes and are given the same powers that people users are given. They are set up in the same structure as how the computer treats people. Permission in the UNIX system is granted using an 8 bit count with 0 through 7. The three kinds of permission are the read, write, and execute permissions. If no permission were granted in any way the UNIX system would indicate" "on the screen which means 000000 000 or nine 0’s.

The super user called god is given the code 777 which means super user. However, the permission of 666 gives the user the power to everything the 777 permission gives, except that the 777 permission allows the god the master programmer to execute not executable programs.

The Postmaster Demon is the head demon, and his permission level in UNIX is 666. (In the Monarch Programming "Mr. Postman" is a code word used internationally.) The most important part of the BEAST system is its communication power. The Electronic Mail System of the BEAST allows it to communicate worldwide, and along with electronic mail comes levels of permission to super user (god) is called Root.

A programmer on the Beast must get permission. His program must get permission. That program that gives permission must also get permission. In other words, there are levels of permission that must be gone through.

This is similar to the Monarch program. For instance, the alters personalities which would control the body during Illuminati gatherings have very tight access permission. It is very hard to access these hierarchy personalities. Both the UNIX system (and the Monarch programming) creates "children" by "spinning". The "child" spins off. When the "child" is finished it is "killed" in UNIX lingo.

When the programmers created child processes in the computer, they were having problems with the child processes killing the parent processes. The same type of problems have had to be dealt with in the Monarch programming. The initial programmer is often the biological parent of the child, and this parent is very responsible for extreme tortures being applied to the child who is being programmed--not to mention all of the expendible children, who are killed in front of the child to highlight the reality of the trauma. The natural reaction of the child being created is to hate the programmer.

Naturally, the Monarch programming had to overcome that natural tendency, which it does very successfully. The UNIX system uses an internal clock within its computer system. The UNIX clock is called CRON. CRON checks files to see if the programmer has put in any files to run. The UNIX system uses data bus lines, which are like the Monarch programming ribbons, which go through the system. These ribbons or data bus lines take information and commands from the computers to other computers.

Within the UNIX system, insiders have revealed that the Daemon (Demon) processes of all the UNIX systems have a security flaw. That flaw is that the Postmaster Daemon has access to them in spite of who the god is of that particular UNIX computer system. So while owners, who purchase UNIX systems think that they have exclusive control over their system, an external Postmaster Daemon coming from the Beast could use its permission levels to over ride the power of the local owner of the system.

The Monarch system has a similar feature, the Illuminati programmers know how to access the base or primal anchors to the programming and yank out any programming they want. All the slaves of these lesser groups such as the CIA, Church of Satan, Mafia, etc. can all be reprogrammed rather quickly to serve the Illuminati, if they are not already due to the Illuminati programmers extra knowledge on how to get into the base programming. In these many ways, the UNIX system serves both real computers and also for the internal computers of some slaves’ mind.

The slave’s system becomes a computer system. It functions as a series of computers that are connected to the master computer which is sunk into the mind at the lowest hypnotic level, which is a level often placed even below an internal "hell pit". To access the different computers, combinations of cards were used for the codes (numbers are also used. See Chapter 4.). Various parts of a Monarch system correspond to what any computer would have. A microprocessor register has 3 sections on a computer to make it functional. In Monarch Systems, you would find these 3 represented by 1. stored data in the library and alters with photographic memories, 2. an instruction section with codes, and 3. stacking mechanisms.

Linked to all this were a crystal, clock, hour glasses, a compass and an entire demonic command structure. The eye in front of the big computer will be protected by legions of spirits. The front big computer runs front quadrants and the back computer runs the deeper quadrants.

The software so to speak for the Omega programming (computer) may be set up to include a stacking program called the Potter’s Wheel. The Potter’s Wheel is a misuse of the Bible, and is a type of programming that the Charismatic/pentecostal movement carries out. The Mormons and the Catholics have their own distinctive "software" programs.

An initial stacking mechanism would work by telling alters to "Stand in Order according to rank and serial no." Another code along with a hand signal would place the Gatekeeper alters up on the Potter’s wheel for their "creator" to work on them. A group of alters could be taught to go up on their Potter’s wheel by seeing a pattern of dominoes. It is whatever the programmer decides.

The dominoes were used for coding, but they also had the programming feature of being able to tie alters together so that if the System is tampered with out of sequence, a domino effect would take place. This domino effect is for one program to set off another program to set off another program. Soon the Monarch slave’s mind is trying to deal with dozens of suicide programs running simultaneously, along with perhaps other programs such as scrambling programs.

For instance, one story line used is the mice run up and down and open up new levels of programming and are tied to the pendulum/clock mechanism. The mice can activate the hour glass, and a gold-winged green skirted fairy Whisper balances the hour glass on her wings. If the slave goes toward freedom, the slave’s mind triggers programs of all kinds, and the mind ends up not knowing if it was coming or going with all the different programs which activate.

A more exhaustive look at all the craziness and activity of the Omega & Gamma programs which activate to defend the Illuminati’s Mind Control are given in other chapters. The programming has been designed that if it was taken out improperly, it is to come back Seven times Seven stronger. This is also a clue that the programming is partly a demonic manifestation, cf. MT 12:43-45 et al.

Components Of The Controls
At the center of the System are the mechanisms that control it, such as the Master Computer, the All-Seeing Eye, the Compass, the Master Clock, and the Quadrants that tie in together. The System may have 3 hourglasses spinning on axes. These hour glasses can also be called matrixes, which are on your standard 3 axes, a X axis, a Y axis & a Z axis. The worlds are various sections of these matrixes.

There are backup worlds & mirror image worlds. Occasionally, there will be a double system. Some of the more important alter System are even far more complex than a double System or a double Double System. Each alter is split so that every alter has another alter created from it.

Then there are demonic doubles--demonic mirror images in the System. The double images shown in the picture are very real when describing our System. Some therapists have noticed "Satanic Guardian Angels" which talk to their patients. They do not know what to make of these. Some classify them as hallucinations, because they do not have any room in their belief system for demonology. These are the demons that do control the multiple’s mind.

Thor, with his hugh hammer is a painful demon. Thor’s image is made of cast iron & carried an iron mallet. Thor is a black strong figure. When his hammer strikes, the slave gets split brain headaches.

Programmers can use the story of the Giant with the Hammer in the Ozma of Oz book (pp. 141-155) to give the imagery when programming. A special series of sweeping motions with both hands will relieve the split brain programming, but some alters can only tolerate these hand signals being done by the master. By the way, Thor is an important protector in Satanic/occult beliefs, & the religion of Thor now has equal stature/popularity in Germany as the Lutheran church.

The programs are put into a System and given codes. These programs use Greek, Hebrew and Druidic letters (or other esoteric languages) in their activation codes. Actually, these alphabets also are the way these people numbered with, and the Greek, Hebrew & Druid letters were used as numbers. These programs could be called Utility Programs, because they function much like the utility programs of a computer.

Along with all the programming comes cover programming. Generally, front stories cover almost everything in a System. Dominos have been used in Monarch programming as the basis for what is called a "Mother Board" in actual computers. Telephone tones key in on a slave’s computer matrix. At times, telephone tones in everyday life will make slaves accidently wacky.

All computers run off of base 2--which uses the numbers 0, and 1. 0 and 1 can be represented as on and off. In the programming, they were represented by "He Loves Me", "He Loves Me Not." The Programmers, especially Dr. Mengele, enjoyed taking a daisy and pulling its petals off one at a time. First petal, "I love you". Second Petal, "I love you not." IF the last daisy petal was "I love you not", then the child was dramatically killed in front of other children to be programmed.

The Illuminati’s method of death - skinning alive - has been developed into a fine art, for both programming and ceremonies. A drawing of this skinning procedure by a witness is on pg. 338.

The daisy game, which was scary for a child, heightened the victim’s attention. Matrixes were built upon this deadly game. How did it feel to be programmed with Mengele’s "I love you, I love you not" programming? A victim recalls, "The child was placed in a cage exposed and naked. The low voltage wires were rigged to the metal of the cage. The child experienced a continual erratic or sporadic prolonged voltage of shock until the heart would pulsate and the anxiety level of the child became out of control. "Then the Dr. would enter the scene with his sneering taunting smile while holding a daisy in his hands. The sporadic voltage would continue to flow through the child’s body. As the shock continued, the Dr. stood before the child pulling petals off the daisy. His only communication was voiced in these words, "LOVE YOU, LOVE YOU NOT, LOVE YOU, LOVE YOU NOT," while pulling off the daisy petals. This action would drive the child crazy because the child knows full well if that last petal is pulled off it meant death.

The child that is not loved is skinned alive before the other children. "...we can now begin to understand that the expendable children were in other cages placed all around us for the eye to see. They went through the same process as we watched. When the last petal of the daisy was pulled from the flower they were killed. Then the terror of what we had just experienced through the seeing and hearing, let us know we were next, but when? By the time the doctor got to "He loves me not" some children no longer knew fear. Their ashes were taken from the crematorium and used in the garden for fertilizer, as a reminder to all what happens to unloved children. "In the clinical room, the lights were used to program the day’s events. The bright light continually flashed starting with 7 lights, then six dots, then five dots, then four dots, then three, then two dots, then 1 dot. In the blindness of the lights, we could hear the doctor’s voice, "LOVE YOU, LOVE YOU NOT." over and over again. A child could have a false trust when the lights flashed 7 dots. By the time one dot was flashing, the child’s terror had once again risen. The doctor never pulled the last petal off for us, but we can’t forget how he teased us. He smiled and walked away, "NO, I LOVE YOU." and walked away."

If we use L=I love you and N=I love you not we can build the following matrix for the internal computer:

L N L N L N

1 2 3 4 5 6

2 3 4 5 6 1

3 4 5 6 1 2

4 5 6 1 2 3

5 6 1 2 3 4

6 1 2 3 4 5

This type of configuration can even be tied to color programming, and to dominoes, where the numbers are represented as the dots on a domino. By making numbers into dots--the numbers can be represented by lights in the same patterns of black domino dots. This means that dominos can be used to program a child, and who would suspect anything about dominoes?

Another thing that lends itself well to use as a programming code are a deck of cards. Many slaves have this. It can be tied in with the Alice In Wonderland story. When cards are used, a section (also called a world or city) of alters will be given its own computer. To access that computer, a code consisting of several things including 2 cards can be used.

In review of what Chapter 4 said about codes, often double codes are employed--what is meant by that is that suppose we have 13 important alters in a section. They will designate each of these "A" alters. Then they number them each 1 through 13. But then they will double code them so that as we count up, we also count down. Then they attach a generic level number to them, say 2,000. So putting this together we have Emerald Green 2001-13a for our first alter, then next is Emerald Green 2002-12a, the next is Emerald Green 2003-11a, and so on. Then the magical name of the alter or the Tribal name of the alter can be attached onto this to complete an access code.

While it seems perhaps complex at first, all an alter is remembering is a color, a common section no. and their rank no. and their file letter, and their magical name. (The name to pull them up, will not be their name for public use). Alice In Wonderland, the Wizard of Oz and the Tall Book of Make Believe played a fundamental role as "software" in a System. The Wizard of Oz stories are often used to show how & what structures to put in the small victim’s internal world. The stories even teach HOW to create an internal world and its parts. Some of the T.V. shows & movies, which served as Monarch programming scripts (i.e. the software) include:

* Batman

* Bewitched

* Bobby’s World Cartoons (deliberate triggers)

* Dameon/Omen movies

* Disney movies (all of them, some with deliberate triggers)

* Duck Tails Cartoon (deliberate triggers)

* ET (used in alien programming)

* Fantasy Island (deliberate triggers)

* Ghost Busters (used for "who ya’ gonna call" theme)

* Love Boat (used for mind control of cruise prostitutes)

* My Fair Lady (finishing school for slaves, such as Youngstown, OH)

* Star Wars

* Steven King Horror Movies

* Tiny Toons Cartoons of Steven Speilberg (deliberate triggers)

* Wizard of Oz movies

Some of the books which were used as programming scripts, which haven’t been mentioned yet, are the Dead Sea Scrolls, the Egyptian Book of the Dead (satanic rituals follow closely the rituals of the Egyptian Book of the Dead), Steven King novels, & Wilbur Smith’s. The Mother Goose nursery rhymes were used prolifically for internal codes in slaves.

Now that we have discussed the widely used "soft ware" available to the programmers, we don’t want to forget the root program, the tree which was used as a method of organizing the various programs, just like a computer’s subdirectories branch out more subdirectories. If the programming is tampered with, the slave will want to cut the tree, however, since the tree is in them, this means they will want very badly to cut their arms, especially their veins.

The programming is not guarded as much as the computers. Everything guards the BEAST computer including deaf alters who have to be communicated with using a hand number code system. Such a code might resemble finger signing 1,2,3,4,5,10 = 15 & following this with a shutdown code which simply reverses the access equation. Surrounding the central All-seeing-eye will be alters & programs with insanity, fear, hopelessness, cutting, burning, aloneness, etc. Strong demonic forces are attached to these alters & programs. They also can trigger the slave to have abusive behavior as punishment. A System is given a life force which is able to regenerate a system, the jokers who protected the programming, and you have the alpha-numeric codes, the cards, and dominoes (represented by a dice) that formed the access codes to parts of the System.

The alters will often feel the heartbeat (which may be an alter) associated with the computer. In the background is a LUCIFERIAN blue light. This Satanic light empowers the Joker. It along with the Joker and the internal programmers give a System the ability to regenerate itself. One can shut down internal computers which run programming to the levels of the System using the same codes that the original programmers use, but until one also takes care of the 13 Jokers & the faceless white-coated programmers who control the Omega Programming, then the back up computers can regenerate the programming & rebuild the system.

Jokers
If the computers are given cards as access codes, it works in well to create Jokers who are wild cards within the system, which can imitate anything. The Jokers have a LUCIFERIAN form. Luciferian is the term that the programmers used. This means that it is spirit. Because the Jokers are Spirit, they can take any form they need to and they can do what they want to do, until they are bound & cast out with the rest of their hierarchy of demons. The Jokers will pop up when a victim tries to study the codes & programming that direct that victim’s life. Around this cult core are the jewels (which are the programs the dwarfs mine). Remember the story of Snow White and the Seven dwarfs? Also swirling around Silence are ribbons which we will discuss later.

TREES. The trees bud at certain times. This is one way the imagery of the tree to connect to the time that rituals are to happen. If the tree is barren of leaves (no programs--i.e. deprogrammed), then the system is to grow more leaves.

C. Internal Hierarchies
The programmers build chains of command within the groups of alters that they create. They credit themselves with bringing order out of chaos. When a system of multiple personalities thinks of rebelling, they are in the similar situation as a colony wanting freedom from its mother country.

Can we govern ourselves, and what governing structures can we keep--since the structure itself is colonial? Can the mind work together to help itself? The concerns are legitimate questions. And yes, the multiple’s mind can function outside of the control of the programmer’s hierarchical arrangement, but not without alters taking on different job assignments. In the slave’s hierarchal chain of command, adult alters are assigned to insure that child alters don’t get out, unless the abusers want a child alter out. Likewise, commander alters are needed to keep the switching smooth, and to keep things orderly. Subordinate alters are taught to submit to their king, or governor, or queen alter. Immense power and indoctrination is given to the key cult alters ruling a system.

The internal hierarchical arrangement means that the host alter coming into therapy (often a Christian) may not be as completely open as therapists think. They must play an internal game of going toward health while not pushing the buttons of deeper more powerful alters. A lot of internal politics may go on. A front alter may promise a deeper alter secrecy in order to consult with it. This makes for all kinds of triangulation and manipulation within the alter system itself. The entire hierarchy of alters has a lot invested in protecting the core from trauma, which was why the core was split in the beginning. Trad, therapy goes after the core & the multiplicity that protects it, thus insuring resistance from the entire hierarchy incl. front alters, who in MPD systems seeking help are often close to the core. The core self is best not directly pursued by the therapist, but gently encouraged on its own to reconnect.

Reply With Quote
  #35  
Old 10-13-2010, 01:55 PM
8esteve
Offline:
So Fucking Banned
Poster Rank:257
Join Date: Dec 2009
 
Mentioned: 0 Post(s)
Quoted: 0 Post(s)
Activity Longevity
0/20 14/20
Today Posts
0/11 sssss3294
Re: Trauma-based Mind Control? (or Torture-porn?)

The Science Of External Controls
Monitoring (Asset Control)
Every intelligence service since time began has sought methods of owning people and ensuring they stayed loyal. Two of 13 Illuminati families who are known to have developed extremely well-run bloodline intelligence groups are the Li family and the Rothschild family. The Li’s family started its Chinese intelligence back in 1400 A.D. They had already been an ancient Chinese aristocratic family for many centuries prior to this. Some of their techniques for their agents were state of the art mind control techniques.

The Rothschild’s personal spy network and their own mail service was known to be superior to the national European governments during the 19th century. Traditional spy-craft has involved the ability to recruit and keep agents loyal. The professional spook manipulates his recruits for a living. He becomes adept at controlling people.

For thousands of years, spy operations have honed their skills at controlling people. Because they work secretly, they generally have done whatever they wanted. When you combine the resources and centuries of intelligence operations of the Illuminati, along with the credibility of government intelligence agencies supposedly guarding our national security, the combination is horrific. There are no moral or financial restraints on what is being done. If the intelligence groups want to dabble in keeping a severed head alive apart from the body, (or a frozen body with an active head) which they have done, there is no one to stop them. Handlers of slaves use both natural and contrived cues to convey to the slave that they want obedience.

A natural non-verbal threat cue would be brusque movements, and an innuendo in their voice. A contrived cue would be placing both hands behind the head, which is a code for "I AM YOUR MASTER, OBEY ME." Another cue for slaves to obey is when the master makes a fist with his right hand and touches his forehead. This means, "OBEY." Even children, who were multiples, who were being taught to control their mother who wanted to leave the cult, have been observed using the fist to the forehead to try to get obedience from their mother. Staring is one method that the Programmers use. Charles Manson, who was both a slave and a handler, is an example of how a penetrating hypnotic stare is used by the Programmers.

One way to control people is to wear clothes of authority. Dr. Green, Dr. Black, Dr. Star, Michael Aquino and other programmers have worn Nazi uniforms while programming, and at other time have worn Satanic Priestly garb.
A beginning point to control people is understanding human needs, and understanding the individual to be controlled. A good case officer learns everything he can about the asset (person or slave) he is to control. Case officers/handlers have been constantly working at improving their skills of control. Monarch slaves who must function as intelligence officers, who recruit spies, are trained in the art of listening and conversation.

Learning to listen without interrupting is a guarantee of success. CIA handlers/ programmers have an extremely personable side to them--and a very deadly animalistic side to them too. They will be trained to look anyone they want to recruit in the eyes and withstand their stare.

"Friendship begins with a smile; recruitment with a stare." (This is a quote from the book Suvorov, Viktor. Inside The Aquarium. New York: Macmillan, p. 108. During training, men in U.S. Army Intelligence are told to read this book to understand how U.S. intelligence works). The entire lives of Monarch slaves are kept on records. Zbigniew Brezinski, and the heads of the CIA, and Sec. of Defense Cheney are just some of the men known about who have access to the computer records that contain records on every active Monarch slave.

Not everyone has a price, but everyone will respond to their needs being met. James K. Van Fleet, an important military intelligence officer, wrote about how to manage people. In military intelligence, they keep files on people where they identify which subconscious desires of people are important to the person at the time.

All this information is kept in SOFT FILES--which are not official files, so these files have never officially existed and are not given up even to Congressional subpoenas. The Intelligence agencies know that if they find out what the person wants above all else in life, they can control the person. The nine areas that are monitored to see if they are important at the moment are:

1. emotional security

2. recognition of efforts or reassurance of worth

3. creative outlets

4. a sense of personal power

5. a sense of roots--belonging somewhere

6. immortality

7. ego-gratification

8. love in all its forms

9. new experiences

Once they monitor these areas and then they determine which needs are priority needs for the person, then they will use what they call "the depth approach" to subconsciously gratify those needs in a way that they gain control over the person. Modern companies are doing this too. Dough mix isn’t sold, but making a family memory with the children is. Soap isn’t sold to get dishes clean--but rather soft beautiful hands are sold. Cosmetic companies don’t sell an item--they sell you hope or an image. Fruit dealers don’t sell fruit, they sell health and vitality. Car dealers don’t sell cars, they sell prestige and images. Freezers aren’t sold, emotional security from having a full freezer is sold. They have learned to genuinely appeal to the 9 subconscious desires.

In intelligence, these desires are called "weaknesses", because intelligence case officers and handlers will attempt to manipulate those desires for their own gain by sincerely helping the person. They set up short-range & long term goals and plans on how to manage a person.

For instance, if a Monarch slave’s day to day alters want ego-gratification, a creative outlet, and reassurance of worth, the Illuminati may promise the slave that if the alters comply they will give them a singing contract in Las Vegas. If they need to appeal to their emotional security--they can promise a big salary and a nice house. If they need to appeal to immortality they can promise to award them a star on Hollywood Boulevard or whatever religious immortality they can credibly offer. (The slave will get the short end of any deal). Anything the slave gets is going to come at a price. The slave will have to do something in return for the Network. Illuminati alters are promised power, honor, glory and wealth. Considering the power and wealth of the elite, they do have the resources to make good on this if they want. However, the price of obedience might be to shave one’s head in submission and sacrifice a child.

Another important point is that the abusers want to get the active cooperation of the person being used. This can be accomplished by lies (or facts if they are convenient) which appeal to the person’s views of right and wrong. For instance, a pedophile will talk to the child who they are going to rape to get its cooperation. The CIA handlers will listen to what a Slave needs, and solve it for them.

Bear in mind, they will only do this if the slave doesn’t live with the handler and is pulling in the wrong direction. For instance, the CIA has lots of sleepers, who are dangerous people just waiting to be set off. In these cases, the CIA has to work with front alters who aren’t aware of the mind control. Rather than force an issue with control, sometimes a gentle manipulation will work. Then again some slave alters are under such strong mind control that they simply need an order, and don’t need gentle manipulation.

The isolation that the handlers impose on their slave to prevent real relationships with outsiders, and the strong bonding of the slave to its master (trauma bonding, etc.) that is administered via the mind control, actually provides a chance for freedom IF the slave survives its master’s death.

Most slaves are programmed to die soon after their master dies, the co-author Cisco was. If the slave survives the suicide programming, the Illuminati will have already taken into consideration who the slave will be passed onto. Cisco’s system survived their programmer/master’s death, and they were not able to break the intense bonds which made the System loyal to that master. Because there is so much secret mind-control slavery going on, if only a small percentage begin to break loose because their loyalty programming backfires on the Illuminati, it has still given us on the other side a significant break.

Another example of an MPD system becoming exposed when a handler dies, is when Rothschild, the President of Oilfield Scrap & Equipment in Kentucky, committed suicide. He was the handler of a highly functioning MPD slave, who was his secretary, Mary Davis. Mary Davis could not function after his death and sued in court - Davis v. Oilfield Scrap & Equipment Co., 482 So.2d 970 (La. App. 3rd Cir. 1986) - for worker’s compensation because she could not function after her handler’s death. Because the Illuminati have kept their membership secret, people have not seen the connections between the various cases of multiple personality that surface.

In Iowa in 1987, a Multiple named Freeman was arrested for stealing a car. In South Carolina in 1990, a Rutherford with MPD was in court. In North Dakota in 1988, an MPD daughter named Johnson tried to sue her abusive father named Johnson for her sexual abuse. In 1984, a Multiple named Hall was hit by a truck and was in court. In 1987, a Multiple named Jones tried to use his MPD to get off of a murder conviction in Washington. In 1988, Marie Moore, a Multiple in N.J. ran a coven which tortured teenagers. The police found a well hidden body in her house, but the corrupt judicial system did not convict her of murder. In 1988, a Ms. Wheeler applied for Social Security disability benefits due to mental impairments such as MPD.

In each of these MPD cases: Freeman, Hall, Jones, Johnson, Moore, Rutherford, and Wheeler are all surnames that have many members in the Illuminati. The secrecy of the Illuminati has protected people from seeing their hidden genealogies. Tracking these genealogies would in turn start exposing the extent of their mind control. As the handlers isolate the slave from mainstream society, they can begin to give them things that will satisfy their long suppressed emotional needs. These are given in a way that they further lock the person in to the control. For instance, the slave has been stripped of power, he craves power, so he is given power over other people’s lives. The slave has been stripped of its real family, so he is given roots by a long generational occult bloodline, and a cult family.

Each Monarch slave exists in their own situation, but there are often common features to how they are controlled. For instance, the handlers like to restrict the mobility of their slaves. Some of the slaves will never write their own checks, will never drive anywhere, and will seldom watch television unless it is something like a Walt Disney movie which is mind-control programming. Some slaves are allowed to drive, but only on a limited basis and their sense of direction is stripped from them hypnotically.

In January, 1995, this co-author’s newsletter From A Follower of Christ² had a feature article on Marilyn Monroe. Monarch mind-controlled slaves like Loretta Lynn and Marilyn Monroe lived tightly controlled lives, and were not allowed to drive automobiles. The one exception is that Loretta has been allowed to drive her car around the ranch. The following is some excerpts from the co-author’s January ‘95 newsletter because it gives a good example of how Marilyn Monroe, a mind-controlled slave had her life very tightly controlled.

Excerpts
...On a day in October, 1957, a woman named Lena Pepitone was hired to take care of Marilyn Monroe. In 1979, she published her memories of the time she was the primary person taking care of Marilyn Monroe. I personally think that Lena Pepitone was clean, and didn’t know what she was dealing with. She describes in detail her life with Marilyn Monroe.

The inside story of life with Marilyn is nothing like people might imagine. Lena’s book is such a clear description of how life with a Monarch slave can be--that I decided to use her book as the basis of some articles. Marilyn Monroe was an orphan, and during her infancy the Illuminati/CIA programmed her to be a Monarch slave. Before becoming an actress, while she was still a stripper, she spent time with the founder of the Church of Satan Anton LaVey.

Victims of LaVey have pointed him out as a mind-control programmer. At that time, Marilyn was going by several names including Mona. When they made her a star, Marilyn lived on the 13th floor, in 13E at Sutton Place, NY - the world of the rich and famous. That is where Lena came to help her. However, Marilyn’s existence was not that of a rich person, but was more like that of an inmate. Marilyn was allowed to have no personal life, outside of the dictates of her programmers and her masters. The programmers and users bore down so hard on controlling Marilyn that they repeatedly came close to driving her insane. The following format the words in italic are direct quotes from Lena Pepitone’s book which is entitled Marilyn Monroe Confidential An Intimate Personal Account, NY: Simon & Schuster, 1979.

P.16 - "Floor-to-ceiling mirrors were everywhere. Even the dining alcove at the rear of the living room had a table with a mirrored top. All these mirrors didn’t cheer things up."

In programming Monarch slaves, mirrors are used a great deal. Within the Monarch slave’s mind, countless mirror images are made. The slave sees thousands of mirrors everywhere in their mind. Because Marilyn was so stripped of any personal identity, she decorated her house as her mind looked on the inside--full of mirrors. Although other Monarchs may have some desires to decorate with mirrors, Marilyn is the most extreme case I know of filling one’s house full of mirrors.

P.25 - "Marilyn’s bedroom was definitely not a queen’s chamber... There were no paintings in the cramped, square room, only mirrors.

Marilyn’s controllers kept her down. Even when she was famous and great, she lived like a slave. She was not allowed to have any self-esteem beyond what she was programmed for.

P.29 - "May was finally able to call for the chauffeur to take Marilyn away."

... Marilyn was a captive, she didn’t go anywhere on her own, she always had someone drive her.

P.32 - "First of all, Marilyn’s life was incredibly monotonous for her. Her doctor’s appointments (I later learned these were appointments with psychiatrists) and her acting lessons were virtually all she had to look forward to. She spent most of her time in her little bedroom...

Marilyn went out of the house to be either programmed or groomed. Other than that she stayed cooped up in her room. Does the reader begin to see that the woman was a slave with no life of her own?

P.33 - "She [Marilyn] didn’t even own a television, never listened to the radio."

They stripped Marilyn of any contact with the outside world to insure that their mind control would work. They were afraid that something might go wrong with the first Presidential slave that was allowed to be highly visible to the public...

P.41 - [Marilyn says], "Shit. My life is shit, "she wept. "I can’t go anywhere. I’m a prisoner in this house."

Marilyn is only telling the truth.

P.43 - "Because Marilyn had no real friends, she concentrated on herself"

The closest friend Marilyn had is saying that Marilyn Monroe had no real friends. Doesn’t that strike someone as strange. Marilyn didn’t have any real friends. Almost the only ones in her life were her abusers, and they worked hard to strip her of any personal goals or esteem.

P.70 - "You can go anywhere," I [Lena] assured her. "Anywhere in the world" "Who with? she asked sadly. "Who with? By myself" "Mr. Miller, your friends..." "What friends? I ain’t got nobody."

Many times during the programming, the programmers separate the victim from anyone who could be a support person, they are isolated from having friends and relatives unless the relatives are in the occult.

P.71 - Marilyn repeatedly calls herself a prostitute. She says, "They laugh at me. What am I... nothing... a prostitute."

Further on the page Marilyn tells Lena that no one has cared about her for her entire life, including her mother...

P.77 - "Don’t take my baby. So they took my baby from me... and I never saw it again. "After Marilyn had a healthy baby it was taken away from her and she was never allowed to see it.

It was very likely sacrificed. Marilyn was too afraid to ask what they were going to do with it.

P.100 - Marilyn loses her baby at the same place that some of her programming was done at. One can speculate that they took the baby for some perverted use...

P.134 - "The operation took place at Polyclinic Hospital where Marilyn had lost her baby the year before... [Marilyn said] "Going back to that hospital’s a nightmare... .Pain? What’s pain?" For her, the only pain was in not having her own child."

Notice she always go back to the Polyclinic Hospital. Monarch victims have had to endure vast amounts of horrible torture. They learn to survive by disassociation.

When Marilyn says "What is pain?" she is being accurate in reflecting her response to pain. She could not have pain, because she would disassociate it. Certain alters are created to take the pain, and the other alters don’t have to experience it.

P.135 - "I found Marilyn in a small room without any view. It was very depressing, especially since there were no flowers or any other signs that Marilyn had friends who were thinking of her."

Imagine a great actor like Marilyn is given a room without a view and no flowers or anything to cheer her up.

P.137 - "Marilyn’s now almost daily visits to the psychiatrists."

... She was closely monitored.

P.193 – Marilyn’s half-sister tries to come into Marilyn’s life. Marilyn says "I have a right to have a family." And on the next page "Gee, you’re really my sister. My sister... At least you lived with relatives."

Marilyn’s masters did not want her to have any family. They often strip the deeper alters of a Monarch slave from any ties to any non-cult person...

P.199 -Marilyn orders a $3,000 Emerald green dress to be made. Emerald green is often the most favorite color of Monarch slaves because of their Wizard of Oz programming which is usually the foundational programming.

P.202 - "Frank... clipped two gorgeous emerald earrings on Marilyn’s ears."

Again we see that emerald green is often used by Monarch slaves.

P. 205 - "A side from her evenings with Frank [Sinatra], Marilyn’s life in California seemed identical to her life in New York. She didn’t read, didn’t watch television, didn’t go anywhere. Although the sun was always shining, Marilyn was as pale as ever. She didn’t like to go outside during the day."

²As time goes on the case officer or handler will weave and ever firming ever tightening web of control around his asset. They will often use rapport. Many of the CIA’s Monarch programmers are very likable people, they have learned the skill of "B.S." and building rapport. Some of this involves just understanding people and NLP. The handler will look for telltale signs such as absenteeism, lateness, nervousness, or inconsistency. He will rely on intuition, spies, astral projection or psychic abilities to keep tabs on the asset. Then if a problem develops it will be addressed with appeals to patriotism, greed, ambition, or fear. Whatever works is the motto of the game.

When slaves are picked up, the men picking them up are called Draconian enforcers. Both authors of this book are very familiar with some of these men. They are often big male Monarch slaves. A popular Illuminati access point is to grab the right hand with the enforcers thumb in the area between the victim’s thumb and index finger. The pressure will be strong enough to leave a bruise after the access.

At different times in different states there have been patterns to what kind of car they drive. They often take the cars from cooperating dealerships, so that there is no license number to trace. They also use stolen license plates on their cars. In 1993, in NY they were using brown Volkswagens. In the Oregon area (especially Portland), a full time Monarch slave enforcer named Rex drives his large red pickup or at times someone else’s other vehicle (like his Illuminati boss’s white pickup truck). He will carry a gun and a cattle prod. The cars in some places have been often red or black. A white or silver car sometimes is used to denote someone of rank. When limousines are used to pick up slaves, they may switch license plates regularly because the plates contain access codes. This was one reason the establishment began allowing people to customize their own license plates!

When one wants to control a group of people, as a leader of a country Machiavelli’s book is great. Some of those principles can be scaled down to working with individuals.

Fritz has observed that almost across the board, if slaves are left within a non-cult family, relatives will consistently misperceive what is happening in the slave’s life. Switches between personalities are reinterpreted to fit the world view of the observer, the multiple is merely perceived as "moody" and "irrational". Half-way decent cover stories will generally suffice to cover the slave’s activities for the mafia, the CIA, and the satanic cult they belong to. The slave merely needs to pull up a good front alter for public consumption, for people want to think the best of everyone. The public will watch the 7-Swans fairy tale where a magical coat turns swans into a princess, never guessing that a news story far greater is happening all around them.

One way to control a person is to identify who the key people are in their life and then influence those people. Some of the work in controlling Monarch slaves goes on behind the scenes, even without the slave ever realizing it. A number of Monarch slaves have been maneuvered into marriages without actual mind-control even being necessary.

One of the items to successfully controlling people is that they know who they are taking orders from. In the military, officers get frustrated because they end up getting conflicting orders from conflicting jurisdictions. This happens with the control of Monarch slaves too, when too many chiefs and not enough Indians are around. When a slave ends up serving several handlers within a short period of time they can get really messed up. This is because the slaves receive severe abuse and their programming can be splintered and destroyed if not handled correctly. Of course, the slave takes the blame, but that doesn’t eliminate the problem.

If a handler wants a better chance of his slave functioning smoothly, the slave shouldn’t be tampered with by lots of handlers. This common sense logic of management seems to have been missed by a large number of handlers. One thing can be said, someone who is a common drug dealer had better not tamper with an Illuminati Mother of Darkness alter slave if they want to stay alive. It appears that slaves are seldom tampered with without permission.

Another ingredient in controlling people is knowing what your competition is going to do. Because the cults work with the intelligence agencies, they often know who, what, where, when, and how their enemies are going to challenge them. The authors of this book could write a book on how the Illuminati/intelligence agencies have watched them. People such as therapists and ministers who challenge the Monarch trauma-based programming have nice growing dossiers in CIA files.

A note should be made that the American intelligence agencies tattooed some of their slaves with blue Monarch butterflies, bluebirds, or roses for identification purposes. The bluebird relates to the CIA project name Project Bluebird. Some satanic cults tattoo the "sign of the great Beast" on the heads of victims. They also place scars with occult designs on their victims. The Illuminati slaves, who are hierarchy members of the Illuminati, are not tattooed, although a hard-to-see scar consisting of dots in a triangle on the third eye is done to some members. The prohibition against marking up one’s body is not consistently enforced in the Illuminati--it seems this standard is enforced more with the women than the male Illuminati members. CIA slaves have received the Butterfly tattoos from the age of about 11 on up.

Back to Index

Reply With Quote
  #36  
Old 10-13-2010, 01:56 PM
8esteve
Offline:
So Fucking Banned
Poster Rank:257
Join Date: Dec 2009
 
Mentioned: 0 Post(s)
Quoted: 0 Post(s)
Activity Longevity
0/20 14/20
Today Posts
0/11 sssss3294
Re: Trauma-based Mind Control? (or Torture-porn?)

The Science Of External Controls
Monitoring (Asset Control)
Every intelligence service since time began has sought methods of owning people and ensuring they stayed loyal. Two of 13 Illuminati families who are known to have developed extremely well-run bloodline intelligence groups are the Li family and the Rothschild family. The Li’s family started its Chinese intelligence back in 1400 A.D. They had already been an ancient Chinese aristocratic family for many centuries prior to this. Some of their techniques for their agents were state of the art mind control techniques.

The Rothschild’s personal spy network and their own mail service was known to be superior to the national European governments during the 19th century. Traditional spy-craft has involved the ability to recruit and keep agents loyal. The professional spook manipulates his recruits for a living. He becomes adept at controlling people.

For thousands of years, spy operations have honed their skills at controlling people. Because they work secretly, they generally have done whatever they wanted. When you combine the resources and centuries of intelligence operations of the Illuminati, along with the credibility of government intelligence agencies supposedly guarding our national security, the combination is horrific. There are no moral or financial restraints on what is being done. If the intelligence groups want to dabble in keeping a severed head alive apart from the body, (or a frozen body with an active head) which they have done, there is no one to stop them. Handlers of slaves use both natural and contrived cues to convey to the slave that they want obedience.

A natural non-verbal threat cue would be brusque movements, and an innuendo in their voice. A contrived cue would be placing both hands behind the head, which is a code for "I AM YOUR MASTER, OBEY ME." Another cue for slaves to obey is when the master makes a fist with his right hand and touches his forehead. This means, "OBEY." Even children, who were multiples, who were being taught to control their mother who wanted to leave the cult, have been observed using the fist to the forehead to try to get obedience from their mother. Staring is one method that the Programmers use. Charles Manson, who was both a slave and a handler, is an example of how a penetrating hypnotic stare is used by the Programmers.

One way to control people is to wear clothes of authority. Dr. Green, Dr. Black, Dr. Star, Michael Aquino and other programmers have worn Nazi uniforms while programming, and at other time have worn Satanic Priestly garb.
A beginning point to control people is understanding human needs, and understanding the individual to be controlled. A good case officer learns everything he can about the asset (person or slave) he is to control. Case officers/handlers have been constantly working at improving their skills of control. Monarch slaves who must function as intelligence officers, who recruit spies, are trained in the art of listening and conversation.

Learning to listen without interrupting is a guarantee of success. CIA handlers/ programmers have an extremely personable side to them--and a very deadly animalistic side to them too. They will be trained to look anyone they want to recruit in the eyes and withstand their stare.

"Friendship begins with a smile; recruitment with a stare." (This is a quote from the book Suvorov, Viktor. Inside The Aquarium. New York: Macmillan, p. 108. During training, men in U.S. Army Intelligence are told to read this book to understand how U.S. intelligence works). The entire lives of Monarch slaves are kept on records. Zbigniew Brezinski, and the heads of the CIA, and Sec. of Defense Cheney are just some of the men known about who have access to the computer records that contain records on every active Monarch slave.

Not everyone has a price, but everyone will respond to their needs being met. James K. Van Fleet, an important military intelligence officer, wrote about how to manage people. In military intelligence, they keep files on people where they identify which subconscious desires of people are important to the person at the time.

All this information is kept in SOFT FILES--which are not official files, so these files have never officially existed and are not given up even to Congressional subpoenas. The Intelligence agencies know that if they find out what the person wants above all else in life, they can control the person. The nine areas that are monitored to see if they are important at the moment are:

1. emotional security

2. recognition of efforts or reassurance of worth

3. creative outlets

4. a sense of personal power

5. a sense of roots--belonging somewhere

6. immortality

7. ego-gratification

8. love in all its forms

9. new experiences

Once they monitor these areas and then they determine which needs are priority needs for the person, then they will use what they call "the depth approach" to subconsciously gratify those needs in a way that they gain control over the person. Modern companies are doing this too. Dough mix isn’t sold, but making a family memory with the children is. Soap isn’t sold to get dishes clean--but rather soft beautiful hands are sold. Cosmetic companies don’t sell an item--they sell you hope or an image. Fruit dealers don’t sell fruit, they sell health and vitality. Car dealers don’t sell cars, they sell prestige and images. Freezers aren’t sold, emotional security from having a full freezer is sold. They have learned to genuinely appeal to the 9 subconscious desires.

In intelligence, these desires are called "weaknesses", because intelligence case officers and handlers will attempt to manipulate those desires for their own gain by sincerely helping the person. They set up short-range & long term goals and plans on how to manage a person.

For instance, if a Monarch slave’s day to day alters want ego-gratification, a creative outlet, and reassurance of worth, the Illuminati may promise the slave that if the alters comply they will give them a singing contract in Las Vegas. If they need to appeal to their emotional security--they can promise a big salary and a nice house. If they need to appeal to immortality they can promise to award them a star on Hollywood Boulevard or whatever religious immortality they can credibly offer. (The slave will get the short end of any deal). Anything the slave gets is going to come at a price. The slave will have to do something in return for the Network. Illuminati alters are promised power, honor, glory and wealth. Considering the power and wealth of the elite, they do have the resources to make good on this if they want. However, the price of obedience might be to shave one’s head in submission and sacrifice a child.

Another important point is that the abusers want to get the active cooperation of the person being used. This can be accomplished by lies (or facts if they are convenient) which appeal to the person’s views of right and wrong. For instance, a pedophile will talk to the child who they are going to rape to get its cooperation. The CIA handlers will listen to what a Slave needs, and solve it for them.

Bear in mind, they will only do this if the slave doesn’t live with the handler and is pulling in the wrong direction. For instance, the CIA has lots of sleepers, who are dangerous people just waiting to be set off. In these cases, the CIA has to work with front alters who aren’t aware of the mind control. Rather than force an issue with control, sometimes a gentle manipulation will work. Then again some slave alters are under such strong mind control that they simply need an order, and don’t need gentle manipulation.

The isolation that the handlers impose on their slave to prevent real relationships with outsiders, and the strong bonding of the slave to its master (trauma bonding, etc.) that is administered via the mind control, actually provides a chance for freedom IF the slave survives its master’s death.

Most slaves are programmed to die soon after their master dies, the co-author Cisco was. If the slave survives the suicide programming, the Illuminati will have already taken into consideration who the slave will be passed onto. Cisco’s system survived their programmer/master’s death, and they were not able to break the intense bonds which made the System loyal to that master. Because there is so much secret mind-control slavery going on, if only a small percentage begin to break loose because their loyalty programming backfires on the Illuminati, it has still given us on the other side a significant break.

Another example of an MPD system becoming exposed when a handler dies, is when Rothschild, the President of Oilfield Scrap & Equipment in Kentucky, committed suicide. He was the handler of a highly functioning MPD slave, who was his secretary, Mary Davis. Mary Davis could not function after his death and sued in court - Davis v. Oilfield Scrap & Equipment Co., 482 So.2d 970 (La. App. 3rd Cir. 1986) - for worker’s compensation because she could not function after her handler’s death. Because the Illuminati have kept their membership secret, people have not seen the connections between the various cases of multiple personality that surface.

In Iowa in 1987, a Multiple named Freeman was arrested for stealing a car. In South Carolina in 1990, a Rutherford with MPD was in court. In North Dakota in 1988, an MPD daughter named Johnson tried to sue her abusive father named Johnson for her sexual abuse. In 1984, a Multiple named Hall was hit by a truck and was in court. In 1987, a Multiple named Jones tried to use his MPD to get off of a murder conviction in Washington. In 1988, Marie Moore, a Multiple in N.J. ran a coven which tortured teenagers. The police found a well hidden body in her house, but the corrupt judicial system did not convict her of murder. In 1988, a Ms. Wheeler applied for Social Security disability benefits due to mental impairments such as MPD.

In each of these MPD cases: Freeman, Hall, Jones, Johnson, Moore, Rutherford, and Wheeler are all surnames that have many members in the Illuminati. The secrecy of the Illuminati has protected people from seeing their hidden genealogies. Tracking these genealogies would in turn start exposing the extent of their mind control. As the handlers isolate the slave from mainstream society, they can begin to give them things that will satisfy their long suppressed emotional needs. These are given in a way that they further lock the person in to the control. For instance, the slave has been stripped of power, he craves power, so he is given power over other people’s lives. The slave has been stripped of its real family, so he is given roots by a long generational occult bloodline, and a cult family.

Each Monarch slave exists in their own situation, but there are often common features to how they are controlled. For instance, the handlers like to restrict the mobility of their slaves. Some of the slaves will never write their own checks, will never drive anywhere, and will seldom watch television unless it is something like a Walt Disney movie which is mind-control programming. Some slaves are allowed to drive, but only on a limited basis and their sense of direction is stripped from them hypnotically.

In January, 1995, this co-author’s newsletter From A Follower of Christ² had a feature article on Marilyn Monroe. Monarch mind-controlled slaves like Loretta Lynn and Marilyn Monroe lived tightly controlled lives, and were not allowed to drive automobiles. The one exception is that Loretta has been allowed to drive her car around the ranch. The following is some excerpts from the co-author’s January ‘95 newsletter because it gives a good example of how Marilyn Monroe, a mind-controlled slave had her life very tightly controlled.

Excerpts
...On a day in October, 1957, a woman named Lena Pepitone was hired to take care of Marilyn Monroe. In 1979, she published her memories of the time she was the primary person taking care of Marilyn Monroe. I personally think that Lena Pepitone was clean, and didn’t know what she was dealing with. She describes in detail her life with Marilyn Monroe.

The inside story of life with Marilyn is nothing like people might imagine. Lena’s book is such a clear description of how life with a Monarch slave can be--that I decided to use her book as the basis of some articles. Marilyn Monroe was an orphan, and during her infancy the Illuminati/CIA programmed her to be a Monarch slave. Before becoming an actress, while she was still a stripper, she spent time with the founder of the Church of Satan Anton LaVey.

Victims of LaVey have pointed him out as a mind-control programmer. At that time, Marilyn was going by several names including Mona. When they made her a star, Marilyn lived on the 13th floor, in 13E at Sutton Place, NY - the world of the rich and famous. That is where Lena came to help her. However, Marilyn’s existence was not that of a rich person, but was more like that of an inmate. Marilyn was allowed to have no personal life, outside of the dictates of her programmers and her masters. The programmers and users bore down so hard on controlling Marilyn that they repeatedly came close to driving her insane. The following format the words in italic are direct quotes from Lena Pepitone’s book which is entitled Marilyn Monroe Confidential An Intimate Personal Account, NY: Simon & Schuster, 1979.

P.16 - "Floor-to-ceiling mirrors were everywhere. Even the dining alcove at the rear of the living room had a table with a mirrored top. All these mirrors didn’t cheer things up."

In programming Monarch slaves, mirrors are used a great deal. Within the Monarch slave’s mind, countless mirror images are made. The slave sees thousands of mirrors everywhere in their mind. Because Marilyn was so stripped of any personal identity, she decorated her house as her mind looked on the inside--full of mirrors. Although other Monarchs may have some desires to decorate with mirrors, Marilyn is the most extreme case I know of filling one’s house full of mirrors.

P.25 - "Marilyn’s bedroom was definitely not a queen’s chamber... There were no paintings in the cramped, square room, only mirrors.

Marilyn’s controllers kept her down. Even when she was famous and great, she lived like a slave. She was not allowed to have any self-esteem beyond what she was programmed for.

P.29 - "May was finally able to call for the chauffeur to take Marilyn away."

... Marilyn was a captive, she didn’t go anywhere on her own, she always had someone drive her.

P.32 - "First of all, Marilyn’s life was incredibly monotonous for her. Her doctor’s appointments (I later learned these were appointments with psychiatrists) and her acting lessons were virtually all she had to look forward to. She spent most of her time in her little bedroom...

Marilyn went out of the house to be either programmed or groomed. Other than that she stayed cooped up in her room. Does the reader begin to see that the woman was a slave with no life of her own?

P.33 - "She [Marilyn] didn’t even own a television, never listened to the radio."

They stripped Marilyn of any contact with the outside world to insure that their mind control would work. They were afraid that something might go wrong with the first Presidential slave that was allowed to be highly visible to the public...

P.41 - [Marilyn says], "Shit. My life is shit, "she wept. "I can’t go anywhere. I’m a prisoner in this house."

Marilyn is only telling the truth.

P.43 - "Because Marilyn had no real friends, she concentrated on herself"

The closest friend Marilyn had is saying that Marilyn Monroe had no real friends. Doesn’t that strike someone as strange. Marilyn didn’t have any real friends. Almost the only ones in her life were her abusers, and they worked hard to strip her of any personal goals or esteem.

P.70 - "You can go anywhere," I [Lena] assured her. "Anywhere in the world" "Who with? she asked sadly. "Who with? By myself" "Mr. Miller, your friends..." "What friends? I ain’t got nobody."

Many times during the programming, the programmers separate the victim from anyone who could be a support person, they are isolated from having friends and relatives unless the relatives are in the occult.

P.71 - Marilyn repeatedly calls herself a prostitute. She says, "They laugh at me. What am I... nothing... a prostitute."

Further on the page Marilyn tells Lena that no one has cared about her for her entire life, including her mother...

P.77 - "Don’t take my baby. So they took my baby from me... and I never saw it again. "After Marilyn had a healthy baby it was taken away from her and she was never allowed to see it.

It was very likely sacrificed. Marilyn was too afraid to ask what they were going to do with it.

P.100 - Marilyn loses her baby at the same place that some of her programming was done at. One can speculate that they took the baby for some perverted use...

P.134 - "The operation took place at Polyclinic Hospital where Marilyn had lost her baby the year before... [Marilyn said] "Going back to that hospital’s a nightmare... .Pain? What’s pain?" For her, the only pain was in not having her own child."

Notice she always go back to the Polyclinic Hospital. Monarch victims have had to endure vast amounts of horrible torture. They learn to survive by disassociation.

When Marilyn says "What is pain?" she is being accurate in reflecting her response to pain. She could not have pain, because she would disassociate it. Certain alters are created to take the pain, and the other alters don’t have to experience it.

P.135 - "I found Marilyn in a small room without any view. It was very depressing, especially since there were no flowers or any other signs that Marilyn had friends who were thinking of her."

Imagine a great actor like Marilyn is given a room without a view and no flowers or anything to cheer her up.

P.137 - "Marilyn’s now almost daily visits to the psychiatrists."

... She was closely monitored.

P.193 – Marilyn’s half-sister tries to come into Marilyn’s life. Marilyn says "I have a right to have a family." And on the next page "Gee, you’re really my sister. My sister... At least you lived with relatives."

Marilyn’s masters did not want her to have any family. They often strip the deeper alters of a Monarch slave from any ties to any non-cult person...

P.199 -Marilyn orders a $3,000 Emerald green dress to be made. Emerald green is often the most favorite color of Monarch slaves because of their Wizard of Oz programming which is usually the foundational programming.

P.202 - "Frank... clipped two gorgeous emerald earrings on Marilyn’s ears."

Again we see that emerald green is often used by Monarch slaves.

P. 205 - "A side from her evenings with Frank [Sinatra], Marilyn’s life in California seemed identical to her life in New York. She didn’t read, didn’t watch television, didn’t go anywhere. Although the sun was always shining, Marilyn was as pale as ever. She didn’t like to go outside during the day."

²As time goes on the case officer or handler will weave and ever firming ever tightening web of control around his asset. They will often use rapport. Many of the CIA’s Monarch programmers are very likable people, they have learned the skill of "B.S." and building rapport. Some of this involves just understanding people and NLP. The handler will look for telltale signs such as absenteeism, lateness, nervousness, or inconsistency. He will rely on intuition, spies, astral projection or psychic abilities to keep tabs on the asset. Then if a problem develops it will be addressed with appeals to patriotism, greed, ambition, or fear. Whatever works is the motto of the game.

When slaves are picked up, the men picking them up are called Draconian enforcers. Both authors of this book are very familiar with some of these men. They are often big male Monarch slaves. A popular Illuminati access point is to grab the right hand with the enforcers thumb in the area between the victim’s thumb and index finger. The pressure will be strong enough to leave a bruise after the access.

At different times in different states there have been patterns to what kind of car they drive. They often take the cars from cooperating dealerships, so that there is no license number to trace. They also use stolen license plates on their cars. In 1993, in NY they were using brown Volkswagens. In the Oregon area (especially Portland), a full time Monarch slave enforcer named Rex drives his large red pickup or at times someone else’s other vehicle (like his Illuminati boss’s white pickup truck). He will carry a gun and a cattle prod. The cars in some places have been often red or black. A white or silver car sometimes is used to denote someone of rank. When limousines are used to pick up slaves, they may switch license plates regularly because the plates contain access codes. This was one reason the establishment began allowing people to customize their own license plates!

When one wants to control a group of people, as a leader of a country Machiavelli’s book is great. Some of those principles can be scaled down to working with individuals.

Fritz has observed that almost across the board, if slaves are left within a non-cult family, relatives will consistently misperceive what is happening in the slave’s life. Switches between personalities are reinterpreted to fit the world view of the observer, the multiple is merely perceived as "moody" and "irrational". Half-way decent cover stories will generally suffice to cover the slave’s activities for the mafia, the CIA, and the satanic cult they belong to. The slave merely needs to pull up a good front alter for public consumption, for people want to think the best of everyone. The public will watch the 7-Swans fairy tale where a magical coat turns swans into a princess, never guessing that a news story far greater is happening all around them.

One way to control a person is to identify who the key people are in their life and then influence those people. Some of the work in controlling Monarch slaves goes on behind the scenes, even without the slave ever realizing it. A number of Monarch slaves have been maneuvered into marriages without actual mind-control even being necessary.

One of the items to successfully controlling people is that they know who they are taking orders from. In the military, officers get frustrated because they end up getting conflicting orders from conflicting jurisdictions. This happens with the control of Monarch slaves too, when too many chiefs and not enough Indians are around. When a slave ends up serving several handlers within a short period of time they can get really messed up. This is because the slaves receive severe abuse and their programming can be splintered and destroyed if not handled correctly. Of course, the slave takes the blame, but that doesn’t eliminate the problem.

If a handler wants a better chance of his slave functioning smoothly, the slave shouldn’t be tampered with by lots of handlers. This common sense logic of management seems to have been missed by a large number of handlers. One thing can be said, someone who is a common drug dealer had better not tamper with an Illuminati Mother of Darkness alter slave if they want to stay alive. It appears that slaves are seldom tampered with without permission.

Another ingredient in controlling people is knowing what your competition is going to do. Because the cults work with the intelligence agencies, they often know who, what, where, when, and how their enemies are going to challenge them. The authors of this book could write a book on how the Illuminati/intelligence agencies have watched them. People such as therapists and ministers who challenge the Monarch trauma-based programming have nice growing dossiers in CIA files.

A note should be made that the American intelligence agencies tattooed some of their slaves with blue Monarch butterflies, bluebirds, or roses for identification purposes. The bluebird relates to the CIA project name Project Bluebird. Some satanic cults tattoo the "sign of the great Beast" on the heads of victims. They also place scars with occult designs on their victims. The Illuminati slaves, who are hierarchy members of the Illuminati, are not tattooed, although a hard-to-see scar consisting of dots in a triangle on the third eye is done to some members. The prohibition against marking up one’s body is not consistently enforced in the Illuminati--it seems this standard is enforced more with the women than the male Illuminati members. CIA slaves have received the Butterfly tattoos from the age of about 11 on up.

Back to Index

Reply With Quote
  #37  
Old 10-13-2010, 01:59 PM
8esteve
Offline:
So Fucking Banned
Poster Rank:257
Join Date: Dec 2009
 
Mentioned: 0 Post(s)
Quoted: 0 Post(s)
Activity Longevity
0/20 14/20
Today Posts
0/11 sssss3294
Re: Trauma-based Mind Control? (or Torture-porn?)

May each & every person listed get right with God before they die.
Short List of some addresses of abusers who are part of the Network, a.k.a. New World Order
Addresses may not be current but are my last address for them. This information may have mistakes, this is only to display to readers that the veil of secrecy is no longer holding up for the Mind Control Programmers.

²AC/DC satanic Rock Band, 11 Leonminster Rd., Morden, Surrey SM4, England
Ade, Henry. CIA & drug dealer & Monarch slave abuser, 1663 County Rd. 13, Waterloo, IN 46793
Aga Khan IV, H.H. Prince Karim. Satanist & leader of Ismaili Muslims, Aiglemont, 60270 Gouvieux. France
Alabama Country Music group, satanists and Monarch slave handlers, Box 529, Ft. Payne, AL 35967
Baily, John, slave abuser, 1525 Pine St., Office 10. Redding, CA 96001
Barnes, Don, slave abuser & in co. sherriff office, 7309 Grove Rd. Frederick, MD 21701 301-694-2152; 1513 Cedarcrest Ln, Frederick, MD 21702301-663-8316
Benson, Ezra Taft, satanist/leader of LDS church. Church of Jesus Christ, Administration Bldg., 47 E. S. Temple. Salt Lake City, UT 84415
Bowers, Wilbur D., Ipsimus in Illum. Monarch programmer & CIA drug dealer. 1735 NE 11th, Bend, OR 97701 ph. 503-EV2-5162 (EV for 'evergreen')
Brown, Edmund G. (Jerry). Jr., Illum. satanist & CA politician & slave abuser. 700 S. Flower St., #600, Los Angeles, CA 90017 (phns 415-928-6346, 415-928-5073)
Brown, Charlie. Air Force Intell. & murderer & Monarch slave abuser, Box 8. Greenbrier, TN
Bundy, McGeorge, Illum., 133 East 18th St., NY, NY 10021 Bus. 212-371-3200
Byrd, Robert C.. Satanist and mind-control programmer & Sen. from W.VA, 311 Senate Hart Office Bldg., Washington. D.C. 20501
Clinton, Hillary. Immuminati witch & mind-control slave handler, (address besides White House) Rose Law Firm, 120 E. 4tn St., Little Rock. Ark. 72201
Cochran, Hank, CIA drug kingpin. Hendersonville. TN, 615-824-7011
Cox, Wayne, Satanic High Priest & Monarch handler & dangerous serial killer, Rt. 1. Box 84, Chatham, LA 71226
Dante, Michael (Michael Vitti). Monarch slave abuser and porn maker, 3485 Canon Drive. Beverly Hills, CA 90212 218-858-9425; Orange, CA 92665, 714637-0590
Day, Brad, slave abuser & coke pusher. 5300 Las Pablanos NW. Albuquerque, NM 87107
Drake, Jim (and son), slave abuser & porn/drug dist., 11173 N. Kendall Dr. #F105, Miami, FL 33176
Fonda, Peter. RR #38, Livingston, MT 59047
Fonda, Jane, c/o Fonda Films, P.O. Box 1198, Santa Monica, CA 90406
Gavoruhk, John, Police chief working for Illum. protects Monarch programmers/handlers. 121 Partridge Circle. Wintersprings, FL 32708 305-699-0618
Grace, J. Peter, business leader & illuminati. CCAGW, 1301 Connecticut Ave., NW. #400, Washington, DC 20036
Grateful Dead satanic cult rock band and Illuminati cocaine distributors. P.O. Box 1566, Main Office St., Montclair, N.J. 07043
Greene, Jack, CIA & white slavery & Monarch slave abuser & country entertainer, Box 485A Goodlettsviiie, TN 615-859-3284
Haggard, Merle, slave abuser & country singer. P.O. Box 536, Palo Cedro, CA 96073
Hestbeck, Vaughn. Monarch abuser & Danish cocaine distr., 515 Rhapsody Paquet Cruises. 1007 N. American Way, Miami, FL 33176
Hope, Bob, slave owner and slave handler w/ intelligence agencies, 3808 Riverside Dr., Burbank, CA 91505
Houston, Alex, satanist & Monarch programmer & CIA, 1155 Ridge Hill Rd., Goodlettsville, TN 37072 615-859-3543
Hummell, Ed, Monarch programmer, Cattleman’s Steak & Seafood Co., 10260 S.W. Nimbus Ave. Suite M-3, Tigard, OR 97223 503-620-7824 (also Las Vegas?).
Humperdink, Englebert, Castro Valley. CA 94546 510-733-6085
King Juan Carlos I, King of Spain and Illuminati, Palacio de la Zarzuela, Madrid. Spain
KISS satanic rock band, 6363 Sunset Blvd., #417, Los Angeles, CA 90028
Kissinger, Henry, Illuminat & P2 Freemason, 1800 K. St., NW. #400. Washington. D.C. 20006
Kreskin, occultist, P.O. Box 1383, West Caldwell, NJ 07006
Lang, Velton, white slavery & drug running, 264 Bluegrass Dr., Hendersonville, TN 37075 615-824-6076 (also at Twitty City 615-822-3210)
Lewis, Jerry Lee, Monarch slave programmer & musician, P.O. Box 3864. Memphis, TN 37173; 3324 Lynchburg St. Memphis, TN 38134 901-388-1135
MacLaine, Shirley, actress/author/New Age occultist, 8899 Beverly Blvd., Los Angeles. CA 90048
Madonna, satanist & monarch slave, 75 Rockefeler Plaza, New York, NY 10019
Manson, Charles, satanist & monarch slave and monarch slave handler, Corcoran Prison, 1002 Diary Ave., Corcoran, CA 93212
Martin, Diane, CIA drug dealer & Monarch slave abuser, 45-641 F. Apapane St., Keneoke, HA 96744
McKee, Lloyd, drug dealer & Monarch slave abuser, 6501 Meoqui, Albuquerque, NM, 87107; 3000 Colonnade Ct. NW. Albuquerqe, NM 87107 505-345-4194
McOuinn, Mike, slave handler & money launderer, Miami, FL 305-386-1512 & 305-251-5320
Meadows, Hal, dir. of the CIA near death mind-control programming center. Swiss Villa Ampetheater, Box 27, Lampe, MO 65681
Merritt, Jeff, CIA drug runner & slave abuser, St. Thomas, US Virgin Islands, 809-744-4000
Mitterrand, Francois Maurice Marie, Illuminati & close friend to Rothschilds & Pres. of France, Palais de l’Elysè. 55-57 rue du Faubourg Saint-Honor˜. 75008 Paris, France
Nelson, Willie, singer & monarch slave handler. P.O. Box 33280, Austin. TX 78784
Nunn, Sam. IlIuminati, 303 Senate Dirksen Office Bldg., Washington. D.C. 20510
O’Brien, Earl. CIA Monarch abuser, 12614 Lakeshore, Grand Haven, Ml 49417
Overstreet, Tommy, CIA & white slavery. P.C. Box 41103, Nashville, TN 37204
Parton, Dolly, satanist. Crockett Road, Rt. #1. Brentwood, TN 37027
Pope John Paul II (aka Karol Wojtyla), Illuminati & Freemason. Apostolic Palace, Vatican City
Pride, Charley, slave abuser & white slavery & country singer & CIA. c/o Chardon Inc., 3198 Royal Ln., #204, Dallas, TX 75229
Prophet, Ronnie, Satanist & Monarch slave runner, 1030 17th Ave. N., Nashville, TN 37208 615-321-0539
Queen Beatrix (Wilhelmina Armgard). Illuminati & Queen, of the Netherlands, Binnen Huf 19. The Hague 2513 AA. The Netherlands
Reynolds, Dr. Herbert H., Illuminati & Univ. CEO, Baylor Univ., Waco TX 76798; 336 Guittard Ave. Waco, TX 76706 817-753-4011
Riley, Ken, CIA & Neo-nazi & Loretta Lynn’s handler/road manager, Rt. 3, Rosebrook Ct., Gallatin, TN 37066
Rockefeller, Winthrop Illumnati kingpin & porn dealer. Winrock Farms, MorriIton, AR 72110 501-727-5481
Rorick, David (a.k.a. Dave Roe), satanist & white slavery, 1211 Mallard, Franklin, TN, 37064
Rose, Ivan, CIA & White slavery & Monarch abuser, RR 2, Mt. Pleasant Rd., Spartansburg, PA 16434 814-694-2496
Ryan, Dr. Michael N., one of Illum.’s coverup doctor who patches up slaves, 353 New Shackle Is. Rd., Hendersonville. TN 37075, 615-824-8475, 615-824-8496
Smith, Dan, car & drug dealer & slave abuser, P.O. Box 262. New Martinsville, W. VA 26155
Stevens, Jim, Monarch slave abuser & drug runner, 1726 N. Magnolia, Ocala, FL 32670 904-622-1966 904-622-2139
Tanis, Bob, CIA & Air Force Intell., Monarch abuser & Mafia & pornographer, 7278 N. Lakeshore, West Olive. MI 49460
Train, Russell, Club of Rome, 1803 Kalorma Sq., Washington, D.C., 20008-4021 202-332-5800
Trump, Donald. Illuminati, 725 Fifth Ave. New York, NY 10022
Vanderpool, Darcy, Monarch programmer, 2620 Regatta Dr. # - 116, Las Vegas, NV 891 702-242-4222
Walker, Jimmy, Monarch save abuser/pornographer, 904 Carswell Waycroos, GA 31501 912-285-5594
Warlock, Billy, actor, 9200 Sunset Blvd., #625, Los Angeles, CA 90069
Westberry, Kent, songwriter, satanist & white slavery. 359 Lee Road, CottonTown, TN 37048


*Some of THE Illuminati's Companies:
Air America, CIA front, works out of Tulsa; Nederland, TX; Berea, OH. & Jackson, MS. The Tulsa addresss is 1419 S. 135th East Ave., Tulsa, OK 74108-4131 918-234-3041
Cargill, Inc., large grain cartell run by Illum. P.O. Box 9300, 15407 McGinty Rd, Minnetonka, MN 55440
Dungeon Master, Desmodus Inc., hard gay porn, s & m pubIisher, Box 11314. San Francisco, CA 94101
Eli Lilly & Co., Illuminati drug co., Lilly Corporate Center, Indianapolis, IN 46285
Machinery International, Inc., CIA front, 302 Fall Cr Dr.. Richardson, TX 75080 214-234-2969
Rothschild Pediatric Group, 4770 S. I 10 Service Rd., Metairie, L.A 70001 504-887-1133
Rothschild Pedatric Group, 1970 Ormond Blvd., Destrehan, LA 70047 504-784-6036
Southern Air Transport, CIA front, 6400 N.W. 36th, Miami, FL 33166
Summit Aviation, CIA front, Summit Airport, Middletown, Delaware 19709 302-834-5400


Appendix Two
The Programming Sites
²

Some MAJOR MIND-CONTROL PROGRAMMING SITES with explanations of their programming.

(Fritz Springmeier originally exposed many of these sites in 1993, so it is possible they have made some changes since they were originally exposed. Most of these operated for years, and may still be operating. We are aware of that some of their programming bases have been moved after exposure).

Besides these major programming sites, there are countless minor ones. For instance, some of the programming sites for water-beach tortures have been visited by the co-authors, but are not listed. The massive Boeing Plant in the Seatle, WA area with its large amount underground tunnels has been used for programming, as well as the ARCO Beaver Valley Plant in Pennslyvannia. So has the chapel at the Coast Guard Academy at New London, Conn. which was built by A.W. Mellon of the Mellon Illuminati family via their Mellon Foundation. This list is not put forth as comprehensive. Without question, this list is only the tip of the iceberg.

²

* 29 Palms, CA

* Area 51 (Dreamland, Groom Lake), NV - Area 51 is also known as Dreamland. There are a number of extensive underground facilities in the area. This was one of the first genetic research facilities in the U.S. and perhaps the first major genetic research facility. The people/workers & victims are brought in by airplane and tube shuttle. The worst cases of UFO/alien type of Monarch programming is coming out of Area 51. The eggs from slaves are being harvested and weird genetic creatures are being developed from human eggs which have been genetically mixed with other things.

* Bethseda, MD - The Bethesada Naval Hospital

* Bingham, UT - A red brick house, which was a closed House of Prostitution. The building was used for KKK programming. Child porn was produced in the basement, and upstairs programmed child slaves serviced KKK members. The KKK activity in the area connects in with the Illuminati controlled Kennecott Copper Co. (aka Utah Copper Co.) Russell G. Frazer, head of Bingham’s Klavern & doctor for Kennecott Copper Co. did the electro-shock to split personalities.

* Black Forest, Germany - Because the U.S-U.K. and Germany do so much programming, and some of the people in the U.S. were programmed in the U.K., Germany or Russia, it is worthwhile to mention some of the German programming sites. A number of witnesses report about castles in the Black Forest which are used for programming & ritual. Basal, Sw. on the border with Germany is a important Illuminati center. Frankfurt, Berlin and Zurich are all important programming/ritual sites. The Jesuits and the Catholic churches are very active in programming in Germany.

* Boulder, CO - The headquarters for EMC, a type of electra-magnetic mind control that is being broadcast to modify the thinking of Americans, and to control slaves.

* Butner, N.C. - Center of Correctional Research, all types of mind control are carried out and experimented with on the inmates.

* Camp Peary, VA - The CIA’s The Farm is located on a narrow strip of land between the York & James Rivers near Williamsburg, VA, used for programming CIA slaves. It has red brick buildings, and looks similar to a small college. The official crytonym was ISOLATION. People who are brought in who don’t know where they are for training are called Black Trainees.

* China Lake Naval Research Base (Inyokern), CA - This facility had a country store, and hangers, and a hospital (address for the hospital is the code- 232 Naval Air Weapons Station) which all provided sites for programming. This site has been operational since the early 1950s. Large numbers of children (batches of 1000 or 2,000 or 3,000 children) were run through this facility at a time. This facility did much of the original traumas and mind-splitting tortures that created the MPD. Other facilities then specialized in further programming that was then layered in on top of the original China Lake programming. A great deal of dehumanization in cages was done to large numbers of tiny children at China Lake Naval Facility. Nimitz Hospital did drug testing of the children prior to their programming.

* Colorado Springs, CO - The ALEX system programming and end-times Military programming is coming out of Colorado Springs and is connected to NORAD. One of the Colorado sites is doing alien programming with mock UFOs.

* Dillsboro Nike Base - Monarch programming of many kinds.

* Disneyland, CA - Disneyland has been an off hour site for Illuminati and satanic rituals for years. Programming has gone on using Disneyland as one big prop for programming. Many of the Disney movies are used for programming, and some Disney scripts are especially tailored for Monarch slave programming. The Peter Pan programming can use the ship. The space programming can use the space props. The satanic programming can use the castles. Lots of mirror programming is done at Disneyland, and Disneyworld. There is also Magic Mountain programming, and programming using the Around the World Dolls, and its theme song. Some of Wizard of Oz and the Cinderella programming was also done at Disneyland using costumes. Preverbal children are taken to Disneyland to get them ready for the scripts.

* Disneyworld, FL - Disneyworld was created as the eastern counterpart to the Disneyland programming site. One of the rides in Disneyworld plays "It’s a small, small world" which is Disneyland developed programming theme.

* Ft. Campbell, KT - Base programs are placed in here.

* Ft. Detrick, MD - involved with medical/biological experimentation.

* Ft. Holabird, MD - This site is no longer in existence, but was the Army Intelligence School. CIC used the school. The place was known as "the Bird."

* Ft. Hood, TX - programming involving military uses of Delta Monarch slaves was done here.

* Ft. Huahuachua, AZ - HQ for Army Intelligence.

* Ft. Knox, KT - The 1st Earth Batt. was developed here.

* Ft. Lewis, WA - involved with the Psychic warfare part of the Monarch Programming.

* Ft. McClellen - Ft. Meade, MD - The National Security Agency was created on 4 Nov 1952. Its headquarters were Fort Meade, VA. The National Security Agency (NSA) employs tens of thousands of employees and has a budget larger than the CIA. It has also been kept far more secret, while the CIA has been used as the fall guy to protect the National Security Agency’s reputation. In the late 1960’s, under Operation Minaret and Program Shamrock, the NSA and its British counterpart GCHQ began monitoring much of the communication within the USA and UK.

The NSA monitors all american calls via computers using trip words, specific names, specific addresses, specific telephone numbers, etc. NSA has several computer to record all the millions of conversations which the computers have examined and deemed worthy of recording. How the NSA can get any use out of millions of recorded telephone conversations is beyond me? What intelligence agency could adequately process so much information?

These organizations now monitor all communications within both countries. At least one congressman got upset that his phone was bugged by the NSA. (see David Corn’s article, "The case of the bugged senator" in Nation, Feb. 6, ð89, p. 152).

NSA has developed a fiberoptics network called Internet computer network. An orange book is used to specify some of the NSA’s security levels.

An informant in the National Security Agency states that establishment newspapers like the Wall Street Journal and the New York Times are used to communicate secret messages which are placed within want ads, buzz words in editorials, and via other methods. Because of some of what this person told me, I have given some possible examples in this newsletter of how people might be using the papers for secret messages. For instance using Michael Jackson with his hands making some type of sign might be a signal. Manfried Adler and the US Senate Committee investigating the CIA found that 90% of the CIA’s secret messages are transmitted via the media, with the aid of coded texts and pictures.

A raised forefinger or two raised forefingers while a speaker is talking means that the message is a masonic message coming from a masonic speaker.

The Illuminati uses code words within the large establishment papers to warn their people what they are going to do with the economy. In this way, people in the Illuminati can take appropriate responses.

* Goddard Space Flight Center - NASA mirror-theme programming.

* Grissom AFB, IND

* Hollywood, CA - One of the programmers/handlers in the Hollywood area is surprisingly Anton LaVey. This is one reason Anton LaVey has followers who will carry out his very wishes. LaVey’s children of course were programmed too. His own girls have been participating in the nude in satanic rituals since little children.

* Homestead AFB, FL

* Kirkland AFB, NM - Lampe, MO - This has been the site of a CIA near-death trauma center where slaves are programmed. It is an R&R center for the CIA where they can have any sexual perversion or drug they want. This has been a large cocaine supply depot also. Hal Meadows was director of this center which is deep in the woods surrounded by cabin chalets overlooking a small deep lake. A gravel road leads to the site which is fenced and well-guarded. Hal Meadows address was Box 27, Lampe, MO 65681.

* Langley, VA - Slaves for the wants of intelligence.

* Las Vegas (sites in and around Las Vegas), NV – MGM’s Grand Hotel and Theme park were built for programming, but there are also some sites outside of the city used. In the general area of Las Vegas in remote sites, the elite gather for slave auctions once a year where Monarch slaves are sold and traded. One of the favorite slave auction sites was 20 miles out of Las Vegas and 10 miles off the main road into the site. The Mob is involved with Monarch slaves in Las Vegas. A blue-eyed 11 year old girl will go for $50,000. Toronto, Canada is another regular site for Monarch slave auctions.

* McClellan AFB, CA - Very bad Child and adult porn using Monarch victims is distributed through this base as well as the other bases listed in this list. A T.W. Sanderson worked with Monarchs at this base.

* MacDill AFB, FL - Near Tampa, FL

* Maxwell AFB, AL

* Montreal, Que., Canada - McGill Univ., McGill Psychiatric Training Network, Allan Memorial Inst., St. Mary’s Hosp.- The Zombie Room (Sleep Room) in the basement, the Isolation chamber and the Grid Room at St. Mary’s Hospital were used for programming.

* Mt. Shasta, CA - Underground facilities around this hugh mountain in the Lake Shasta area are putting out Monarch programming that makes the people think they are in communication with aliens. This facility is for torturing & reprogramming captured runaway Monarch slaves. People are brought into the area via helicopter, plane, or flying saucer. This site is probably the largest mind-control programming center. It is in a remote wooded area. It is heavily guarded, has fences, and a large contingent of black helicopters. Mt. Shasta is equipped with state of the art high tech programming equipment. Mind-controlled slaves who are soldiers are programmed and trained at the Mt. Shasta facility.

* Nashville, TN - These sites work with the Country Western Music Industry which is actually a CIA front for moving drugs to finance their dirty black activities. Fiddler’s Inn, Nashville fits in with the Monarch Programming.

* Papillion, NE

* Patrick AFB - Portland (Old OMSI, New OMSI, Bldg. Near Monarch Hotel at 8800 SE Sunnyside Rd., Mormon Temple, etc.), OR. The Old OMSI building had a back door on the west side in which slaves were taken in to the bottom floor and reprogrammed. Although security guards aren’t visible, they are there with electronic surveillance. The people running OMSI are tied in the Illuminati. The DC-3 airplane outside of the building was used in the programming as a hypnotic trigger. The submarine docked outside of the new OMSI building is also used as a programming hypnotic tool. The new Mormon Temple has an extremely high tech underground tunnel facility for programming built underneath it. Witnesses have collaborated their testimony on this high tech programming site under the Portland Mormon Temple. Although building plans are to be public information, the city of Lake Oswego makes it very difficult to view the temple’s building plans. The plans show that the foundation walls are far thicker than any conceivable earthquake would ever call for. The reason is that the foundation helps house an underground arena for the Illuminati & and their guests to watch perverse shows.

* Presideo, CA (incl. Alcatraz, San Francisco) - The Illuminati and various Satanic cults used the Presideo for their programming. Split-brain & other programming was done at Letterman hospital. Fort Point was used for Illuminati ritual & programming, as well as a number of churches, underground gun emplacements and the large circular Greek column art building at the Presideo. Alcatraz, abandoned as a prison, was used for water tortures and other programming. Tunnels connected buildings, and the Mule/Horse buildings and the cemetery also were used. This is one of the older programming sites. Psychic warfare activity also was experimented on in this area. Letterman Hospital has been used for the initial drug testing of the infants before programming. Lots of isolation programming in damp cold places was done at the Presideo. Lots of porn and military programming have also been done here.

* Redstone Arsenal, AL

* San Antonio, TX

* Salt Lake City (Mormon Temple) - This underground facility works in conjunction with the Mormon hierarchy who are allowed to create slaves. The Illuminati put in base programming that still gives them ultimate control beyond the control that the Mormon programming has.

* Scotty’s Castle, Death Valley, CA - Mengele (Dr.Green) programmed in some of his "internal boxes" as well as other Illuminati programming was done at this site. Mengele had a large circular red bed in the castle which he stocked with his little girl slaves, who already had kitten sexual alters.

Scotty’s Castle is a castle located in Death Valley CA. It has a very interesting history. To reach the castle one is required to drive through many miles of desert. If one drives to lnyo County, CA, the same county that has China Lake Naval Testing Grounds, and Inyokern, and then you drive on Hwy. 190 into Death Valley National Monument (it is not a park or forest, dead valleys are called monuments), next you go north on a road after Stove Pipe for 35 miles.

The man who built Scotty’s Castle was Walter Perry Scott (1872-1954). Walter P. Scott was the son of an alcohol distiller and horse breeder in Kentucky. Walter did not get any formal education. He left home and went west where he worked as a mule driver, and a water boy. From there he became a horse wrangler. Because of his talent with horses Buffalo Bill made him the feature rider along with Annie Oakley in Buffalo Bill’s family show. The show travelled and Scotty was with it eleven years. During this time, Scotty made many important friendships with men of power and wealth. In 1900, Walter married and left the show. He got a loan from Julian Gerard, a NY banker, to go prospecting for gold which he failed to pay back. Julian Gerard was repeatedly sending people to hassle Scotty to get his money back. In 1905, Walter Scott ("Scotty") scattered gold nuggets and $100 bills from N.Y. to L.A. Where he got all this gold and $100 bills is a mystery, but it wasn’t from prospecting. The idea of finding a secret mine was very obviously a cover for however Scotty managed to get his money. Scotty is well-known for his penchant to throw away $20 gold pieces as if they were candy wherever he went.

Nobody believed he had a mine, strangely the IRS never got interested in Scotty. Why? The IRS went after Charles Caughlin who was exposing the elite, the bankers, the Freemasons, etc. in the early 1930’s on his radio show. There was no reason to suspect Caughlin of any cheating on his Income Tax, and the audits found the IRS actually owed Caughlin money. However the national papers printed front page stories of the IRS investigation, and practically ignored that the man was exonerated. Yet, the IRS left Scotty alone. Hmmm.

Although Scotty was married, he became intimate friends with Albert Mussey Johnson (1872-1948), a Chicago millionaire, who was v.p. from 1906 to 1926 of the National Life Insurance Co. Albert M. Johnson was born in Ohio, and lived in Arkansas and Missouri before moving to Chicago. Johnson came out and stayed in Death Valley. The stay helped his health, and he and Scotty remained close friends.

In 1924, construction secretly began on a castle in Death Valley. The best of materials were used and the materials had to be hauled clear out in the desert by truck to Grapevine Canyon where the castle sits. Hundreds of workers were hired. The castle got its kitchen tiles from Spain. Special rugs were made on the European island of Majorca for the castle. Tiles for the incompleted pool came from the Mediterranean. Many of the furnishing of the castle came from cathedrals and palaces in Spain and Morocco. Draperies made for the castle were hand-tooled in selected sheepskin leather. Sixty hand-carved panels, each of a different design, were installed in the music-room ceiling. A Welte Mignon organ reported to have cost $160,000 --the finest of its kind in Western United States was placed in the music room, even though Scotty could not play the organ. Twelve bathrooms were installed. Several kitchens were installed. Tunnels and secret rooms were built under the buildings. Around $2 million (dollars of that time period) were spent on building the castle, supposedly from Scotty’s "gold mine." The castle became known as Scotty’s Castle. It is ideal as a Satanic ritual site. It can accommodate numerous people. It is remote. It has hidden rooms and areas and tunnels.

* Tavistock, England - This has been the primary programming center for England. The Rothschild programmers work out of Tavistock. A large number of slaves in America have been programmed there. Tavistock has been doing mind-control since before W.W.ll. Under the supervision of London’s W Board & 20 Committee MI6 and MIS’s Section BIA ran double agents and mind-controlled spies/couriers during W.W. II.

MI6 has had an office at Century House, No. 100, Westminster Bridge Road. MI5 offices have been in part on Curzon St. MI5 has operated behind a number of fronts, incl. their fake travel agency Casuro Holidays. MI-5’s address for mail is Room 055, The War Office, London. Special Intelligence Service (SIS) dealt with all types of mind control. Tavistock was under SIS.

The British government has had their own telephone exchange with a 222 prefix, which was later linked to another secret exchange YTAN. Outsiders could dial 222 8080 to get into the secret govt. exchange. Men like mind-control expert/hypnotist Eric Trist worked for Tavistock. A six-man team which wore black berets also helped w/ mind control at Tavistock. Two people who became terrorists after their visits to Tavistock are Angela Davis and Stockley Carmichael who went to a conference at Tavistock entitled Dialectics of Liberation in 1967.

Its main building is a bland 6-story building. The address is The Training Office, The Tavistock Clinic, 120 Belsize Lane, London, UK NWs SBA. Tel. no. 071-435 7111. The chief exec. is Anton Obholzer. The Chair of Prof. Comm. is Nicholas Temple. Both are skilled in psychology.

The Tavistock Clinic was founded in 1920, and in 1946 the Tavistock Institute was created as an independent body to assist the Tavistock Clinic. The Institute does more of the research. The Royal Free Hospital at the University of London works with Tavistock Clinic, as well as the Science Policy Research Unit (SPRU) of Sussex University. A large number of Britian’s psychologist, social workers and police get their training at Tavistock. Tavistock has set themselves up as the authority on ritual abuse and MPD (DID). In other words, the primary programming site, is pretending to be the leading institution trying to solve the problem! That’s a good cover.

* Tinker, AFB, OK - Tinkerbell programming is carried out here. This programming makes alters think they are like Tinkerbell in that they will never grow up or age.

* Titusville, FL - At the Kennedy Space Center. Mind control testing is done, and base programming such as the Wizard of Oz programming is done here. Also NASA high tech programming is done here.

* Tulsa, OK - Believed to have an Alice In Wonderland theme to their programming. Oral Roberts University is used for programming. The programming to infiltrate and capture the Christian church via the healing/charismatic movement has centered around Tulsa and Oral Roberts University.

* Utah State Prison - The prison has carried out mind control for over 30 years on their inmates for the intelligence agencies with the help of the U.S. government’s power to cover it up.

* Versailles, IL - Brain implants are put into Monarchs here.

* Washington, D.C. area - The basement of the Pentagon and other facilities around Washington D.C. such as the Jesuit Georgetown Univ. Hosp. are involved with Mind-Control. Presidential Models are moving in and out of Washington, D.C. carrying messages and performing their sexual acts for the lusts of politicians. There is also a NASA Mind-control Programming Center in Washington D.C. Secret tunnels connect the White House to other buildings. These tunnels are used to bring in slaves. Some secret rooms in the lower White House are set aside for rituals.

* Wright-Patterson AFB - Near Dayton, OH, Virtual reality programming is carried out here.

* Youngstown, OH - The Youngstown Charm School has been run by Illuminatus Prosser Seward Mellon along with a U.S. Congressman named Jim Trafficant. The old stone building originally belonged to one of the railroad elite. This school is for Beta models and gives them advance sexual charm training. This school produces about 6 new Monarch slaves every three days. Mafia deals are carried out on the second floor of the charm school. A slave who is being trained/programmed at the Charm school will take a course that last a few days. The first day may be spent hanging in a dungeon which was once a basement wine celler. The torture dungeon has all the traditional torture devices, a stretching rack, whips, hanging chains, etc. In the dungeon rooms were a black Nubian goat "Satan", a small donkey "Nester", and a small white pony "Trigger", as well as dogs and snakes. The slave is taught silence in the dungeon as they are subjected to bestiality.

²

We have just touched the surface of the vest network of programming sites. Two examples of an entire series of programming sites--(1) the Coast to Coast campground resorts and (2), the Jesuit-run institutions, which are often programming sites incl. Jesuit College, WV. An example of the former is the Park City Diamond Caverns. KT Coast to Coast resort, which has had a sensory deprivation tank, headphones for state of the art harmonic programming. etc. These membership camp sites are used to program children. Nor have we touched upon the large numbers of programmed Russians & Eastern Europeans that are coming Into this nation. When this book was written more people immigrated to the U.S. from Russia than anywhere else. Europe is teeming with programming sites, including the Vatican. Sebulun Zuflucht in Marienheide, Germany is about the only European attempt at deprogramming.



BIBLIOGRAPHY & SOURCES
The co-authors bring much experience and study with this subject into the creation of this book. The sources that have contributed to their knowledge would take a book as long as this to list every source that has gotten them to their understanding of the subject.

PRIMARY SOURCES ON PRIMARY SUBJECT - TRAUMA-BASED TOTAL MIND-CONTROL

1. Numerous professional papers.

2. Personal accounts about slaves (published).

3. Unpublished paperwork, tapes, interviews of slaves.

4. Therapists.

5. Books on Mind-control.

6. Books on associated topics, such as PTSD, the Mind, hypnosis, drugs, witchcraft, and the various aspects of control.

1. Numerous Professional Papers.

Carole Goettman, George B. Greaves and Philip M. Croons put out a reference book Multiple Personality & Dissociation 1791-1992 A Complete Bibliography, 2nd edition. (Lutherville, MD: The Sidran Press, 1994). Co-author Fritz has gone through the Bibliography which lists in 150 pages essentially all the articles ever published on MPD and Dissociation, and he has read all that he could obtain via the large research libraries. Dozens of the articles, and many of the books which appear in this complete bibliography have been read. Most of the professional literature on the subject is trash. During the 1970s, Americans got interested in Multiple Personalities, after having lost interest in the subject as W.W. I got started. I believe the therapeutic community was probably nudged by the military/intelligence agencies to lose interest when W.W. I broke out, and that anyone who did get interested got scooped up into the government during W.W. II and the Cold War. Some of the helpful professional papers have been notated in the book itself. A perusal of the index will provide part of the sources for this book.


2. All the Personal Account (Auto Biographical Accounts) that are available.

The list of auto-biographies (or biographies) of victims which were consulted include the following:

CHASE, TRUDY

Chase. Trudy. When the Rabbit Howls. NY: Dutton, 1987.

DORSETT, SYBIL ISABEL.

Schreiber, Flora Rheta. Sybil. Chicago, IL: Henry Regnery Co., 1973.

FORD, SUE.

Taylor, Brice with Patrick Stone. (written as a novel). Starshine. Huntsville, AL: The Brice Taylor Foundation, 1995.

JONES, CANDY. (born Jessica Wilcox).

Bain, Donald. The Control of Candy Jones. Chicago: Playboy Press, 1976.

LYNN, LORETTA.

Vecsey, George with Loretta Lynn. Loretta Lynn A Coal Miners Daughter. Rockefeller Plaza, NY: Warner Books, 1976.

MONROE, MARILYN.

Pepitone, Lena. Marilyn Monroe Confidential An Intimate Personal Account. NY: Simon & Schuster, 1979.

O’BRIEN, CATHY.

O’Brien, Cathy with Mark Phillips. Trance Formation ofAmerica, The True Life Story of a CIA Slave. Nashville, TN: Global Trance Formation Info, Ltd., 1995. Also Cathy O’Brien and Mark Phillips put out numerous monographs and a number of articles in the Contact magazine, which were also consulted in writing this book.

STRATFORD, LAUREN.

Satan’s Underground: The Extraodinary Story of One Woman’s Escape., 1991.

WHEELER, CISCO.

Wheeler, Cisco with Fritz Springmeier. They Know What They Do, An Illustrated Guide to Monarch Programming-MindControl. Oregon City, OR: Springme ier & Wheeler, 1995.

OTHERS VICTIMS:

* Casey, J.F. & Wilson, L. The Flock. Alfred A. Knopf, 1991.

* LaCalle, TM. Voices. NY: Dodd, Mead, & Co., 1988.

* Lancaster, E. & Polney, J. The Final Face of Eve. NY: McGraw-Hill, 1958.

* Schoenewolf, G. Jennifer and her selves. NY: Donald I. Fine, 1991.

* Sizemore, C. & Pittillo, E. I’m Eve. Garden City, NY: Doubleday & Co., 1977.

* Smith, Michelle & Lawrence Padzer. Michelle Remembers: A Story of Satanic Possession.

* Thigpen, C.H. & Cleckley, H. The three faces of Eve. NY: McGraw-Hill, 1957.

3. Unpublished Papers, Tapes and Interviews With Victims

These sources will have to remain confidential. Over a dozen Illuminati slaves provided notes from what they have found out about their lives and mind-control systems. The co-authors have interviewed and personally known dozens more, who have been visited with. Notes were kept on some of these interviews. Fritz taped some of his interviews, and in more than one case got a computer disk of the person’s life story with colloborating evidence.

4. Therapists

Fritz is appreciative to the following therapists for the help he received:

Dale Calvocade, Ukiah, CA, who helped me understand the religious covers better.

Dr. Carol Clifton, Portland, OR, who helped me understand the value of patience, kindness and listening in helping victims help themselves.

Dr. Loreda Fox, Denver, CO, who helped give a better understanding of the spiritual dimensions.

Catherine Gould, TX, who helped me understand the role of alters within programs.

Denny Hilgers, Pasadena, TX, who helped me understand the deeper codes, and the deeper systems better, and the importance of a person’s identity.

David W. Neswald, Irvine, CA, who helped me understand the primal traumas better.

Randy Noblitt, Dallas, TX, who helped give a better understanding of overall picture, and how some of the codes are constructed.

Mark Phillips, Nashville, TN, who opened up a deeper understanding of how the Network operates, and provided some direction for how we should approach dealing with mind control.

Doug Riggs, Tulsa, OK, who helped give a better understanding of the religious fronts, and who helped tremendously understand how this trauma-based mind-control fits in with the Word of God.

5. Books (and long papers) on Mind Control

Bowart, Walter H. Operation Mind-Control, original edition and the totally revised Researchers edition of 1994, which carried the same title.

Chavkin, Samuel. The Mind Stealers, Psychosurgery and Mind Control. Westport, Conn: Lawrence Hill & Co., 1978.

Estabrooks, G.H. Hypnotism. NY: EP. Dutton, 1957.

Lockwood, Craig. Other Altars, Roots and Realities of Cultic and Satanic Ritual Abuse & Multiple Personality Disorder. Minneapolis, MN: CompCare Publishers, 1993.

Marks, John. The Search For The "Manchurian Candidate" The CIA & Mind Control. NY: W.W. Norton & Co. (paperback version), 1991.

Mediaecco. When The State Rapes, Part I & 2. Gorredijk, Netherlands

Thomas, Gordon. Journey into Madness. NY: Bantam Books, 1989

White, John. Psychic Warfare, Fact or Fiction? (An investigation into the use of the mind as a military weapon.) Wellingborough, Northamptonshire, UK: The Aquarian Press, 1990(?).

De Laurence, editor. The Lesser Key of Solomon Goetia, The Book of Evil Spirits. Chicago, 1916.

6. Books on Associated Topics

Both authors have read many books on tangent subjects. The list of books that have been read and researched prior to writing this would take another book to record. The co-author Fritz found himself consulting his own books, Be Wise As Serpents (1991), The Top 13 Illuminati Bloodlines Vol. 1 (1995), and Exodus 20:4-5 (1978). The co-authors purchased and read the 14 Oz books. They also have a number of the other books used for scripts such as, Mother Goose Rhymes, The Tall Book of Make Believe, Michael Aquino’s version of Star Wars, etc., Snow White & the 7 Dwarfs, The Island of the Blue Dolphins, Through the Looking Glass, etc. Fritz purchased his own copy of The Graphic Work of M. C. Esher. NY: Ballantine Books, 3rd edition, 1972. in order to have on hand the artwork which contains so many mirror images and inversions and is so often used for programming.

As I, Fritz, sit down to provide the sources for the reader, it is apparent that the task is beyond my time restraints. Knowledge accumulates. A random sample of just two of almost countless references looked at to come to the author’s level of understanding would be Jean L. Sutton’s workshop book Ritualistic Abuse of Children Identification and Case Management Strategies which was used in workshops for teachers and child services division people on Fri. Sept. 11, 1992 at 815 N.E. Davis St., Portland, OR. Another example is The New Yorker’s, May 24, 1993, article "Remembering Satan - Part II". Neither one was referred to in writing the book, but these two and countless others over the years form the accumulation of understanding that is needed to tackle writing a book on Multiple Personality Disorder (Dissociative Identity Disorder).

To be able to write this book, Fritz, the co-author has studied material, books, newspapers clippings, articles, etc. from the following ASSOCIATED TOPICS with a close estimate of the number of items studied in each area: Aliens & UFOs (40 items), Amish-Mennonite (30 items), Astronomy & astrology (25 items), Behavior Modification (12 items), Black religions in the New World and Africa (6 items), Brain (30 items), Caballa (10 items at least), Computers (25 items), Computer languages (8 items), Crime (25 items), Demonology (30 -items), Druidism (20 items), ELF waves (20 items), Fairy Tales (7 items), False Memory Syndrome (5 items), Freemasonry (35 items), Holograms (6 items), Hypnosis (12 items), Intelligence (20 items), Jesuits (6 items), Ku Klux Klan (15 items), Medical technology (15 items), Memory (20 items), Mental Hospitals (5 items), Military (10 items), Mind (25 items), Movies (20 items), NeuroLinguistic Programming (6 items), New World Order (50 items), Particular Individuals such as the Rothschilds, Rockefellers, Collins, Mengele, Cameron, Wheeler, LaVey, Aquino, Elvis Presley, Doris Duke, and many others mentioned in the book (50 items at least), Personality (25 items), Satanic Ritual Abuse (50 items), Spiritual warfare (40 items), Spying (25 items), Underwater research (40 items), Voodoo (3 items), Witchcraft (50 items). Some of the books that would have been cited if every detail had been footnoted can be found footnoted in other writings by Fritz Springmeier.

Also I, Fritz, have spent time examining the Word of God to try to understand what God’s written word revealed by His Spirit would teach me about this situation. There are numerous Bible verses that pertain to the information in this book which are not referred to in this volume. The primary issues created by the traumas are a. identity issues, and b. issues concerning fellowship with God. Much of the trauma and programming is cloud the issue of who the person really is, and how they can have a beneficial relationship to God Almighty.

The Bill Gothard Basic Youth Seminar which the co-author Fritz has attended 6 times, has been very helpful to him to understand what the programmers do, and how they strip a person of what they need to be spiritually strong. In fact, Fritz knows a number of the programmers have attended the Bill Gothard Seminar themselves, and know how to use beneficial information for evil purposes.

Likewise, the Christian can take the occult knowledge of revealed in this book and use it for good instead of the evil that it was designed for. The Institute has a hard volume reference book on Research in Principles of Lfe as well as a workbook.

Cisco, the other co-author, has studied MPD, SRA, Bible issues, and occult topics in depth. Her personal knowledge added a depth to the book that could not have been achieved without her.

William Frost of San Antonio, TX was a good friend of a tall lean Texan named David Hill. David Hill had been taken in by Mafia boss Joseph Bonanno, who was as a surrogate father to him. After David Hill became a Christian, he used his first hand knowledge of the Mafia, the occult world such as his Masonic experience to put the pieces together about the NWO. He had just completed a very detailed manuscript for a book exposing the NWO, when he was murdered. After David’s murder, William Frost was able to retrieve David’s manuscript and sent me a copy. The death was not ruled a murder by the authorities, but men who have written lengthy exposes on the New World Order do not commit suicide before they get their books published.

It was keen-minded David Hill who warned Billy Graham for many hours about the New World Order, only to be told by Billy Graham, that Billy was ‘a captive’ (Graham’s own words) of the New World Order. The information William Frost gave me about David Hill, was later verified in many ways by Joseph Bonanno’s surprising autobiography A Man of Honor, Simon & Schuster, Rockefeller Center, N.Y., 1983.

It’s somewhat unusual for Mafia chiefs to write autobiographies. In it, Joseph Bonanno says he looked up to Billy Graham, and that David Hill joined up with Billy Graham. In 1974, Billy Graham came to Joseph Bonanno’s house in Tuscon with David. Graham sent him a Christmas card every year, and called him soon after his wife died to offer condolences. These things are mentioned on page 333 of his autobiography. David Hill’s manuscript was encouraging to me, Fritz, because he verified many of the same things that I’d found. His manuscript was quoted in Vol. 1 concerning the top families.

Information about the names of programmers and programming sites and the Temple of Set membership has come from recovering victims of Trauma-based mind-control. Information about Illuminati bloodlines, ritual sites, and important buildings has also come from Illuminati members who are recovering from Illuminati mind-control. Many more witnesses to Illuminati Mind-control will come forward if people learn how to help these people, and to believe the things that have happened to them. Now that this legitimate information is being circulated, it can be expected that "witnesses" with bogus information/bogus memories will come forward to detract from the credibility of this book.

All Items By Fritz Springmeier, Copyright © By Fritz Springmeier

Reply With Quote
  #38  
Old 10-13-2010, 01:59 PM
8esteve
Offline:
So Fucking Banned
Poster Rank:257
Join Date: Dec 2009
 
Mentioned: 0 Post(s)
Quoted: 0 Post(s)
Activity Longevity
0/20 14/20
Today Posts
0/11 sssss3294
Re: Trauma-based Mind Control? (or Torture-porn?)

May each & every person listed get right with God before they die.
Short List of some addresses of abusers who are part of the Network, a.k.a. New World Order
Addresses may not be current but are my last address for them. This information may have mistakes, this is only to display to readers that the veil of secrecy is no longer holding up for the Mind Control Programmers.

²AC/DC satanic Rock Band, 11 Leonminster Rd., Morden, Surrey SM4, England
Ade, Henry. CIA & drug dealer & Monarch slave abuser, 1663 County Rd. 13, Waterloo, IN 46793
Aga Khan IV, H.H. Prince Karim. Satanist & leader of Ismaili Muslims, Aiglemont, 60270 Gouvieux. France
Alabama Country Music group, satanists and Monarch slave handlers, Box 529, Ft. Payne, AL 35967
Baily, John, slave abuser, 1525 Pine St., Office 10. Redding, CA 96001
Barnes, Don, slave abuser & in co. sherriff office, 7309 Grove Rd. Frederick, MD 21701 301-694-2152; 1513 Cedarcrest Ln, Frederick, MD 21702301-663-8316
Benson, Ezra Taft, satanist/leader of LDS church. Church of Jesus Christ, Administration Bldg., 47 E. S. Temple. Salt Lake City, UT 84415
Bowers, Wilbur D., Ipsimus in Illum. Monarch programmer & CIA drug dealer. 1735 NE 11th, Bend, OR 97701 ph. 503-EV2-5162 (EV for 'evergreen')
Brown, Edmund G. (Jerry). Jr., Illum. satanist & CA politician & slave abuser. 700 S. Flower St., #600, Los Angeles, CA 90017 (phns 415-928-6346, 415-928-5073)
Brown, Charlie. Air Force Intell. & murderer & Monarch slave abuser, Box 8. Greenbrier, TN
Bundy, McGeorge, Illum., 133 East 18th St., NY, NY 10021 Bus. 212-371-3200
Byrd, Robert C.. Satanist and mind-control programmer & Sen. from W.VA, 311 Senate Hart Office Bldg., Washington. D.C. 20501
Clinton, Hillary. Immuminati witch & mind-control slave handler, (address besides White House) Rose Law Firm, 120 E. 4tn St., Little Rock. Ark. 72201
Cochran, Hank, CIA drug kingpin. Hendersonville. TN, 615-824-7011
Cox, Wayne, Satanic High Priest & Monarch handler & dangerous serial killer, Rt. 1. Box 84, Chatham, LA 71226
Dante, Michael (Michael Vitti). Monarch slave abuser and porn maker, 3485 Canon Drive. Beverly Hills, CA 90212 218-858-9425; Orange, CA 92665, 714637-0590
Day, Brad, slave abuser & coke pusher. 5300 Las Pablanos NW. Albuquerque, NM 87107
Drake, Jim (and son), slave abuser & porn/drug dist., 11173 N. Kendall Dr. #F105, Miami, FL 33176
Fonda, Peter. RR #38, Livingston, MT 59047
Fonda, Jane, c/o Fonda Films, P.O. Box 1198, Santa Monica, CA 90406
Gavoruhk, John, Police chief working for Illum. protects Monarch programmers/handlers. 121 Partridge Circle. Wintersprings, FL 32708 305-699-0618
Grace, J. Peter, business leader & illuminati. CCAGW, 1301 Connecticut Ave., NW. #400, Washington, DC 20036
Grateful Dead satanic cult rock band and Illuminati cocaine distributors. P.O. Box 1566, Main Office St., Montclair, N.J. 07043
Greene, Jack, CIA & white slavery & Monarch slave abuser & country entertainer, Box 485A Goodlettsviiie, TN 615-859-3284
Haggard, Merle, slave abuser & country singer. P.O. Box 536, Palo Cedro, CA 96073
Hestbeck, Vaughn. Monarch abuser & Danish cocaine distr., 515 Rhapsody Paquet Cruises. 1007 N. American Way, Miami, FL 33176
Hope, Bob, slave owner and slave handler w/ intelligence agencies, 3808 Riverside Dr., Burbank, CA 91505
Houston, Alex, satanist & Monarch programmer & CIA, 1155 Ridge Hill Rd., Goodlettsville, TN 37072 615-859-3543
Hummell, Ed, Monarch programmer, Cattleman’s Steak & Seafood Co., 10260 S.W. Nimbus Ave. Suite M-3, Tigard, OR 97223 503-620-7824 (also Las Vegas?).
Humperdink, Englebert, Castro Valley. CA 94546 510-733-6085
King Juan Carlos I, King of Spain and Illuminati, Palacio de la Zarzuela, Madrid. Spain
KISS satanic rock band, 6363 Sunset Blvd., #417, Los Angeles, CA 90028
Kissinger, Henry, Illuminat & P2 Freemason, 1800 K. St., NW. #400. Washington. D.C. 20006
Kreskin, occultist, P.O. Box 1383, West Caldwell, NJ 07006
Lang, Velton, white slavery & drug running, 264 Bluegrass Dr., Hendersonville, TN 37075 615-824-6076 (also at Twitty City 615-822-3210)
Lewis, Jerry Lee, Monarch slave programmer & musician, P.O. Box 3864. Memphis, TN 37173; 3324 Lynchburg St. Memphis, TN 38134 901-388-1135
MacLaine, Shirley, actress/author/New Age occultist, 8899 Beverly Blvd., Los Angeles. CA 90048
Madonna, satanist & monarch slave, 75 Rockefeler Plaza, New York, NY 10019
Manson, Charles, satanist & monarch slave and monarch slave handler, Corcoran Prison, 1002 Diary Ave., Corcoran, CA 93212
Martin, Diane, CIA drug dealer & Monarch slave abuser, 45-641 F. Apapane St., Keneoke, HA 96744
McKee, Lloyd, drug dealer & Monarch slave abuser, 6501 Meoqui, Albuquerque, NM, 87107; 3000 Colonnade Ct. NW. Albuquerqe, NM 87107 505-345-4194
McOuinn, Mike, slave handler & money launderer, Miami, FL 305-386-1512 & 305-251-5320
Meadows, Hal, dir. of the CIA near death mind-control programming center. Swiss Villa Ampetheater, Box 27, Lampe, MO 65681
Merritt, Jeff, CIA drug runner & slave abuser, St. Thomas, US Virgin Islands, 809-744-4000
Mitterrand, Francois Maurice Marie, Illuminati & close friend to Rothschilds & Pres. of France, Palais de l’Elysè. 55-57 rue du Faubourg Saint-Honor˜. 75008 Paris, France
Nelson, Willie, singer & monarch slave handler. P.O. Box 33280, Austin. TX 78784
Nunn, Sam. IlIuminati, 303 Senate Dirksen Office Bldg., Washington. D.C. 20510
O’Brien, Earl. CIA Monarch abuser, 12614 Lakeshore, Grand Haven, Ml 49417
Overstreet, Tommy, CIA & white slavery. P.C. Box 41103, Nashville, TN 37204
Parton, Dolly, satanist. Crockett Road, Rt. #1. Brentwood, TN 37027
Pope John Paul II (aka Karol Wojtyla), Illuminati & Freemason. Apostolic Palace, Vatican City
Pride, Charley, slave abuser & white slavery & country singer & CIA. c/o Chardon Inc., 3198 Royal Ln., #204, Dallas, TX 75229
Prophet, Ronnie, Satanist & Monarch slave runner, 1030 17th Ave. N., Nashville, TN 37208 615-321-0539
Queen Beatrix (Wilhelmina Armgard). Illuminati & Queen, of the Netherlands, Binnen Huf 19. The Hague 2513 AA. The Netherlands
Reynolds, Dr. Herbert H., Illuminati & Univ. CEO, Baylor Univ., Waco TX 76798; 336 Guittard Ave. Waco, TX 76706 817-753-4011
Riley, Ken, CIA & Neo-nazi & Loretta Lynn’s handler/road manager, Rt. 3, Rosebrook Ct., Gallatin, TN 37066
Rockefeller, Winthrop Illumnati kingpin & porn dealer. Winrock Farms, MorriIton, AR 72110 501-727-5481
Rorick, David (a.k.a. Dave Roe), satanist & white slavery, 1211 Mallard, Franklin, TN, 37064
Rose, Ivan, CIA & White slavery & Monarch abuser, RR 2, Mt. Pleasant Rd., Spartansburg, PA 16434 814-694-2496
Ryan, Dr. Michael N., one of Illum.’s coverup doctor who patches up slaves, 353 New Shackle Is. Rd., Hendersonville. TN 37075, 615-824-8475, 615-824-8496
Smith, Dan, car & drug dealer & slave abuser, P.O. Box 262. New Martinsville, W. VA 26155
Stevens, Jim, Monarch slave abuser & drug runner, 1726 N. Magnolia, Ocala, FL 32670 904-622-1966 904-622-2139
Tanis, Bob, CIA & Air Force Intell., Monarch abuser & Mafia & pornographer, 7278 N. Lakeshore, West Olive. MI 49460
Train, Russell, Club of Rome, 1803 Kalorma Sq., Washington, D.C., 20008-4021 202-332-5800
Trump, Donald. Illuminati, 725 Fifth Ave. New York, NY 10022
Vanderpool, Darcy, Monarch programmer, 2620 Regatta Dr. # - 116, Las Vegas, NV 891 702-242-4222
Walker, Jimmy, Monarch save abuser/pornographer, 904 Carswell Waycroos, GA 31501 912-285-5594
Warlock, Billy, actor, 9200 Sunset Blvd., #625, Los Angeles, CA 90069
Westberry, Kent, songwriter, satanist & white slavery. 359 Lee Road, CottonTown, TN 37048


*Some of THE Illuminati's Companies:
Air America, CIA front, works out of Tulsa; Nederland, TX; Berea, OH. & Jackson, MS. The Tulsa addresss is 1419 S. 135th East Ave., Tulsa, OK 74108-4131 918-234-3041
Cargill, Inc., large grain cartell run by Illum. P.O. Box 9300, 15407 McGinty Rd, Minnetonka, MN 55440
Dungeon Master, Desmodus Inc., hard gay porn, s & m pubIisher, Box 11314. San Francisco, CA 94101
Eli Lilly & Co., Illuminati drug co., Lilly Corporate Center, Indianapolis, IN 46285
Machinery International, Inc., CIA front, 302 Fall Cr Dr.. Richardson, TX 75080 214-234-2969
Rothschild Pediatric Group, 4770 S. I 10 Service Rd., Metairie, L.A 70001 504-887-1133
Rothschild Pedatric Group, 1970 Ormond Blvd., Destrehan, LA 70047 504-784-6036
Southern Air Transport, CIA front, 6400 N.W. 36th, Miami, FL 33166
Summit Aviation, CIA front, Summit Airport, Middletown, Delaware 19709 302-834-5400


Appendix Two
The Programming Sites
²

Some MAJOR MIND-CONTROL PROGRAMMING SITES with explanations of their programming.

(Fritz Springmeier originally exposed many of these sites in 1993, so it is possible they have made some changes since they were originally exposed. Most of these operated for years, and may still be operating. We are aware of that some of their programming bases have been moved after exposure).

Besides these major programming sites, there are countless minor ones. For instance, some of the programming sites for water-beach tortures have been visited by the co-authors, but are not listed. The massive Boeing Plant in the Seatle, WA area with its large amount underground tunnels has been used for programming, as well as the ARCO Beaver Valley Plant in Pennslyvannia. So has the chapel at the Coast Guard Academy at New London, Conn. which was built by A.W. Mellon of the Mellon Illuminati family via their Mellon Foundation. This list is not put forth as comprehensive. Without question, this list is only the tip of the iceberg.

²

* 29 Palms, CA

* Area 51 (Dreamland, Groom Lake), NV - Area 51 is also known as Dreamland. There are a number of extensive underground facilities in the area. This was one of the first genetic research facilities in the U.S. and perhaps the first major genetic research facility. The people/workers & victims are brought in by airplane and tube shuttle. The worst cases of UFO/alien type of Monarch programming is coming out of Area 51. The eggs from slaves are being harvested and weird genetic creatures are being developed from human eggs which have been genetically mixed with other things.

* Bethseda, MD - The Bethesada Naval Hospital

* Bingham, UT - A red brick house, which was a closed House of Prostitution. The building was used for KKK programming. Child porn was produced in the basement, and upstairs programmed child slaves serviced KKK members. The KKK activity in the area connects in with the Illuminati controlled Kennecott Copper Co. (aka Utah Copper Co.) Russell G. Frazer, head of Bingham’s Klavern & doctor for Kennecott Copper Co. did the electro-shock to split personalities.

* Black Forest, Germany - Because the U.S-U.K. and Germany do so much programming, and some of the people in the U.S. were programmed in the U.K., Germany or Russia, it is worthwhile to mention some of the German programming sites. A number of witnesses report about castles in the Black Forest which are used for programming & ritual. Basal, Sw. on the border with Germany is a important Illuminati center. Frankfurt, Berlin and Zurich are all important programming/ritual sites. The Jesuits and the Catholic churches are very active in programming in Germany.

* Boulder, CO - The headquarters for EMC, a type of electra-magnetic mind control that is being broadcast to modify the thinking of Americans, and to control slaves.

* Butner, N.C. - Center of Correctional Research, all types of mind control are carried out and experimented with on the inmates.

* Camp Peary, VA - The CIA’s The Farm is located on a narrow strip of land between the York & James Rivers near Williamsburg, VA, used for programming CIA slaves. It has red brick buildings, and looks similar to a small college. The official crytonym was ISOLATION. People who are brought in who don’t know where they are for training are called Black Trainees.

* China Lake Naval Research Base (Inyokern), CA - This facility had a country store, and hangers, and a hospital (address for the hospital is the code- 232 Naval Air Weapons Station) which all provided sites for programming. This site has been operational since the early 1950s. Large numbers of children (batches of 1000 or 2,000 or 3,000 children) were run through this facility at a time. This facility did much of the original traumas and mind-splitting tortures that created the MPD. Other facilities then specialized in further programming that was then layered in on top of the original China Lake programming. A great deal of dehumanization in cages was done to large numbers of tiny children at China Lake Naval Facility. Nimitz Hospital did drug testing of the children prior to their programming.

* Colorado Springs, CO - The ALEX system programming and end-times Military programming is coming out of Colorado Springs and is connected to NORAD. One of the Colorado sites is doing alien programming with mock UFOs.

* Dillsboro Nike Base - Monarch programming of many kinds.

* Disneyland, CA - Disneyland has been an off hour site for Illuminati and satanic rituals for years. Programming has gone on using Disneyland as one big prop for programming. Many of the Disney movies are used for programming, and some Disney scripts are especially tailored for Monarch slave programming. The Peter Pan programming can use the ship. The space programming can use the space props. The satanic programming can use the castles. Lots of mirror programming is done at Disneyland, and Disneyworld. There is also Magic Mountain programming, and programming using the Around the World Dolls, and its theme song. Some of Wizard of Oz and the Cinderella programming was also done at Disneyland using costumes. Preverbal children are taken to Disneyland to get them ready for the scripts.

* Disneyworld, FL - Disneyworld was created as the eastern counterpart to the Disneyland programming site. One of the rides in Disneyworld plays "It’s a small, small world" which is Disneyland developed programming theme.

* Ft. Campbell, KT - Base programs are placed in here.

* Ft. Detrick, MD - involved with medical/biological experimentation.

* Ft. Holabird, MD - This site is no longer in existence, but was the Army Intelligence School. CIC used the school. The place was known as "the Bird."

* Ft. Hood, TX - programming involving military uses of Delta Monarch slaves was done here.

* Ft. Huahuachua, AZ - HQ for Army Intelligence.

* Ft. Knox, KT - The 1st Earth Batt. was developed here.

* Ft. Lewis, WA - involved with the Psychic warfare part of the Monarch Programming.

* Ft. McClellen - Ft. Meade, MD - The National Security Agency was created on 4 Nov 1952. Its headquarters were Fort Meade, VA. The National Security Agency (NSA) employs tens of thousands of employees and has a budget larger than the CIA. It has also been kept far more secret, while the CIA has been used as the fall guy to protect the National Security Agency’s reputation. In the late 1960’s, under Operation Minaret and Program Shamrock, the NSA and its British counterpart GCHQ began monitoring much of the communication within the USA and UK.

The NSA monitors all american calls via computers using trip words, specific names, specific addresses, specific telephone numbers, etc. NSA has several computer to record all the millions of conversations which the computers have examined and deemed worthy of recording. How the NSA can get any use out of millions of recorded telephone conversations is beyond me? What intelligence agency could adequately process so much information?

These organizations now monitor all communications within both countries. At least one congressman got upset that his phone was bugged by the NSA. (see David Corn’s article, "The case of the bugged senator" in Nation, Feb. 6, ð89, p. 152).

NSA has developed a fiberoptics network called Internet computer network. An orange book is used to specify some of the NSA’s security levels.

An informant in the National Security Agency states that establishment newspapers like the Wall Street Journal and the New York Times are used to communicate secret messages which are placed within want ads, buzz words in editorials, and via other methods. Because of some of what this person told me, I have given some possible examples in this newsletter of how people might be using the papers for secret messages. For instance using Michael Jackson with his hands making some type of sign might be a signal. Manfried Adler and the US Senate Committee investigating the CIA found that 90% of the CIA’s secret messages are transmitted via the media, with the aid of coded texts and pictures.

A raised forefinger or two raised forefingers while a speaker is talking means that the message is a masonic message coming from a masonic speaker.

The Illuminati uses code words within the large establishment papers to warn their people what they are going to do with the economy. In this way, people in the Illuminati can take appropriate responses.

* Goddard Space Flight Center - NASA mirror-theme programming.

* Grissom AFB, IND

* Hollywood, CA - One of the programmers/handlers in the Hollywood area is surprisingly Anton LaVey. This is one reason Anton LaVey has followers who will carry out his very wishes. LaVey’s children of course were programmed too. His own girls have been participating in the nude in satanic rituals since little children.

* Homestead AFB, FL

* Kirkland AFB, NM - Lampe, MO - This has been the site of a CIA near-death trauma center where slaves are programmed. It is an R&R center for the CIA where they can have any sexual perversion or drug they want. This has been a large cocaine supply depot also. Hal Meadows was director of this center which is deep in the woods surrounded by cabin chalets overlooking a small deep lake. A gravel road leads to the site which is fenced and well-guarded. Hal Meadows address was Box 27, Lampe, MO 65681.

* Langley, VA - Slaves for the wants of intelligence.

* Las Vegas (sites in and around Las Vegas), NV – MGM’s Grand Hotel and Theme park were built for programming, but there are also some sites outside of the city used. In the general area of Las Vegas in remote sites, the elite gather for slave auctions once a year where Monarch slaves are sold and traded. One of the favorite slave auction sites was 20 miles out of Las Vegas and 10 miles off the main road into the site. The Mob is involved with Monarch slaves in Las Vegas. A blue-eyed 11 year old girl will go for $50,000. Toronto, Canada is another regular site for Monarch slave auctions.

* McClellan AFB, CA - Very bad Child and adult porn using Monarch victims is distributed through this base as well as the other bases listed in this list. A T.W. Sanderson worked with Monarchs at this base.

* MacDill AFB, FL - Near Tampa, FL

* Maxwell AFB, AL

* Montreal, Que., Canada - McGill Univ., McGill Psychiatric Training Network, Allan Memorial Inst., St. Mary’s Hosp.- The Zombie Room (Sleep Room) in the basement, the Isolation chamber and the Grid Room at St. Mary’s Hospital were used for programming.

* Mt. Shasta, CA - Underground facilities around this hugh mountain in the Lake Shasta area are putting out Monarch programming that makes the people think they are in communication with aliens. This facility is for torturing & reprogramming captured runaway Monarch slaves. People are brought into the area via helicopter, plane, or flying saucer. This site is probably the largest mind-control programming center. It is in a remote wooded area. It is heavily guarded, has fences, and a large contingent of black helicopters. Mt. Shasta is equipped with state of the art high tech programming equipment. Mind-controlled slaves who are soldiers are programmed and trained at the Mt. Shasta facility.

* Nashville, TN - These sites work with the Country Western Music Industry which is actually a CIA front for moving drugs to finance their dirty black activities. Fiddler’s Inn, Nashville fits in with the Monarch Programming.

* Papillion, NE

* Patrick AFB - Portland (Old OMSI, New OMSI, Bldg. Near Monarch Hotel at 8800 SE Sunnyside Rd., Mormon Temple, etc.), OR. The Old OMSI building had a back door on the west side in which slaves were taken in to the bottom floor and reprogrammed. Although security guards aren’t visible, they are there with electronic surveillance. The people running OMSI are tied in the Illuminati. The DC-3 airplane outside of the building was used in the programming as a hypnotic trigger. The submarine docked outside of the new OMSI building is also used as a programming hypnotic tool. The new Mormon Temple has an extremely high tech underground tunnel facility for programming built underneath it. Witnesses have collaborated their testimony on this high tech programming site under the Portland Mormon Temple. Although building plans are to be public information, the city of Lake Oswego makes it very difficult to view the temple’s building plans. The plans show that the foundation walls are far thicker than any conceivable earthquake would ever call for. The reason is that the foundation helps house an underground arena for the Illuminati & and their guests to watch perverse shows.

* Presideo, CA (incl. Alcatraz, San Francisco) - The Illuminati and various Satanic cults used the Presideo for their programming. Split-brain & other programming was done at Letterman hospital. Fort Point was used for Illuminati ritual & programming, as well as a number of churches, underground gun emplacements and the large circular Greek column art building at the Presideo. Alcatraz, abandoned as a prison, was used for water tortures and other programming. Tunnels connected buildings, and the Mule/Horse buildings and the cemetery also were used. This is one of the older programming sites. Psychic warfare activity also was experimented on in this area. Letterman Hospital has been used for the initial drug testing of the infants before programming. Lots of isolation programming in damp cold places was done at the Presideo. Lots of porn and military programming have also been done here.

* Redstone Arsenal, AL

* San Antonio, TX

* Salt Lake City (Mormon Temple) - This underground facility works in conjunction with the Mormon hierarchy who are allowed to create slaves. The Illuminati put in base programming that still gives them ultimate control beyond the control that the Mormon programming has.

* Scotty’s Castle, Death Valley, CA - Mengele (Dr.Green) programmed in some of his "internal boxes" as well as other Illuminati programming was done at this site. Mengele had a large circular red bed in the castle which he stocked with his little girl slaves, who already had kitten sexual alters.

Scotty’s Castle is a castle located in Death Valley CA. It has a very interesting history. To reach the castle one is required to drive through many miles of desert. If one drives to lnyo County, CA, the same county that has China Lake Naval Testing Grounds, and Inyokern, and then you drive on Hwy. 190 into Death Valley National Monument (it is not a park or forest, dead valleys are called monuments), next you go north on a road after Stove Pipe for 35 miles.

The man who built Scotty’s Castle was Walter Perry Scott (1872-1954). Walter P. Scott was the son of an alcohol distiller and horse breeder in Kentucky. Walter did not get any formal education. He left home and went west where he worked as a mule driver, and a water boy. From there he became a horse wrangler. Because of his talent with horses Buffalo Bill made him the feature rider along with Annie Oakley in Buffalo Bill’s family show. The show travelled and Scotty was with it eleven years. During this time, Scotty made many important friendships with men of power and wealth. In 1900, Walter married and left the show. He got a loan from Julian Gerard, a NY banker, to go prospecting for gold which he failed to pay back. Julian Gerard was repeatedly sending people to hassle Scotty to get his money back. In 1905, Walter Scott ("Scotty") scattered gold nuggets and $100 bills from N.Y. to L.A. Where he got all this gold and $100 bills is a mystery, but it wasn’t from prospecting. The idea of finding a secret mine was very obviously a cover for however Scotty managed to get his money. Scotty is well-known for his penchant to throw away $20 gold pieces as if they were candy wherever he went.

Nobody believed he had a mine, strangely the IRS never got interested in Scotty. Why? The IRS went after Charles Caughlin who was exposing the elite, the bankers, the Freemasons, etc. in the early 1930’s on his radio show. There was no reason to suspect Caughlin of any cheating on his Income Tax, and the audits found the IRS actually owed Caughlin money. However the national papers printed front page stories of the IRS investigation, and practically ignored that the man was exonerated. Yet, the IRS left Scotty alone. Hmmm.

Although Scotty was married, he became intimate friends with Albert Mussey Johnson (1872-1948), a Chicago millionaire, who was v.p. from 1906 to 1926 of the National Life Insurance Co. Albert M. Johnson was born in Ohio, and lived in Arkansas and Missouri before moving to Chicago. Johnson came out and stayed in Death Valley. The stay helped his health, and he and Scotty remained close friends.

In 1924, construction secretly began on a castle in Death Valley. The best of materials were used and the materials had to be hauled clear out in the desert by truck to Grapevine Canyon where the castle sits. Hundreds of workers were hired. The castle got its kitchen tiles from Spain. Special rugs were made on the European island of Majorca for the castle. Tiles for the incompleted pool came from the Mediterranean. Many of the furnishing of the castle came from cathedrals and palaces in Spain and Morocco. Draperies made for the castle were hand-tooled in selected sheepskin leather. Sixty hand-carved panels, each of a different design, were installed in the music-room ceiling. A Welte Mignon organ reported to have cost $160,000 --the finest of its kind in Western United States was placed in the music room, even though Scotty could not play the organ. Twelve bathrooms were installed. Several kitchens were installed. Tunnels and secret rooms were built under the buildings. Around $2 million (dollars of that time period) were spent on building the castle, supposedly from Scotty’s "gold mine." The castle became known as Scotty’s Castle. It is ideal as a Satanic ritual site. It can accommodate numerous people. It is remote. It has hidden rooms and areas and tunnels.

* Tavistock, England - This has been the primary programming center for England. The Rothschild programmers work out of Tavistock. A large number of slaves in America have been programmed there. Tavistock has been doing mind-control since before W.W.ll. Under the supervision of London’s W Board & 20 Committee MI6 and MIS’s Section BIA ran double agents and mind-controlled spies/couriers during W.W. II.

MI6 has had an office at Century House, No. 100, Westminster Bridge Road. MI5 offices have been in part on Curzon St. MI5 has operated behind a number of fronts, incl. their fake travel agency Casuro Holidays. MI-5’s address for mail is Room 055, The War Office, London. Special Intelligence Service (SIS) dealt with all types of mind control. Tavistock was under SIS.

The British government has had their own telephone exchange with a 222 prefix, which was later linked to another secret exchange YTAN. Outsiders could dial 222 8080 to get into the secret govt. exchange. Men like mind-control expert/hypnotist Eric Trist worked for Tavistock. A six-man team which wore black berets also helped w/ mind control at Tavistock. Two people who became terrorists after their visits to Tavistock are Angela Davis and Stockley Carmichael who went to a conference at Tavistock entitled Dialectics of Liberation in 1967.

Its main building is a bland 6-story building. The address is The Training Office, The Tavistock Clinic, 120 Belsize Lane, London, UK NWs SBA. Tel. no. 071-435 7111. The chief exec. is Anton Obholzer. The Chair of Prof. Comm. is Nicholas Temple. Both are skilled in psychology.

The Tavistock Clinic was founded in 1920, and in 1946 the Tavistock Institute was created as an independent body to assist the Tavistock Clinic. The Institute does more of the research. The Royal Free Hospital at the University of London works with Tavistock Clinic, as well as the Science Policy Research Unit (SPRU) of Sussex University. A large number of Britian’s psychologist, social workers and police get their training at Tavistock. Tavistock has set themselves up as the authority on ritual abuse and MPD (DID). In other words, the primary programming site, is pretending to be the leading institution trying to solve the problem! That’s a good cover.

* Tinker, AFB, OK - Tinkerbell programming is carried out here. This programming makes alters think they are like Tinkerbell in that they will never grow up or age.

* Titusville, FL - At the Kennedy Space Center. Mind control testing is done, and base programming such as the Wizard of Oz programming is done here. Also NASA high tech programming is done here.

* Tulsa, OK - Believed to have an Alice In Wonderland theme to their programming. Oral Roberts University is used for programming. The programming to infiltrate and capture the Christian church via the healing/charismatic movement has centered around Tulsa and Oral Roberts University.

* Utah State Prison - The prison has carried out mind control for over 30 years on their inmates for the intelligence agencies with the help of the U.S. government’s power to cover it up.

* Versailles, IL - Brain implants are put into Monarchs here.

* Washington, D.C. area - The basement of the Pentagon and other facilities around Washington D.C. such as the Jesuit Georgetown Univ. Hosp. are involved with Mind-Control. Presidential Models are moving in and out of Washington, D.C. carrying messages and performing their sexual acts for the lusts of politicians. There is also a NASA Mind-control Programming Center in Washington D.C. Secret tunnels connect the White House to other buildings. These tunnels are used to bring in slaves. Some secret rooms in the lower White House are set aside for rituals.

* Wright-Patterson AFB - Near Dayton, OH, Virtual reality programming is carried out here.

* Youngstown, OH - The Youngstown Charm School has been run by Illuminatus Prosser Seward Mellon along with a U.S. Congressman named Jim Trafficant. The old stone building originally belonged to one of the railroad elite. This school is for Beta models and gives them advance sexual charm training. This school produces about 6 new Monarch slaves every three days. Mafia deals are carried out on the second floor of the charm school. A slave who is being trained/programmed at the Charm school will take a course that last a few days. The first day may be spent hanging in a dungeon which was once a basement wine celler. The torture dungeon has all the traditional torture devices, a stretching rack, whips, hanging chains, etc. In the dungeon rooms were a black Nubian goat "Satan", a small donkey "Nester", and a small white pony "Trigger", as well as dogs and snakes. The slave is taught silence in the dungeon as they are subjected to bestiality.

²

We have just touched the surface of the vest network of programming sites. Two examples of an entire series of programming sites--(1) the Coast to Coast campground resorts and (2), the Jesuit-run institutions, which are often programming sites incl. Jesuit College, WV. An example of the former is the Park City Diamond Caverns. KT Coast to Coast resort, which has had a sensory deprivation tank, headphones for state of the art harmonic programming. etc. These membership camp sites are used to program children. Nor have we touched upon the large numbers of programmed Russians & Eastern Europeans that are coming Into this nation. When this book was written more people immigrated to the U.S. from Russia than anywhere else. Europe is teeming with programming sites, including the Vatican. Sebulun Zuflucht in Marienheide, Germany is about the only European attempt at deprogramming.



BIBLIOGRAPHY & SOURCES
The co-authors bring much experience and study with this subject into the creation of this book. The sources that have contributed to their knowledge would take a book as long as this to list every source that has gotten them to their understanding of the subject.

PRIMARY SOURCES ON PRIMARY SUBJECT - TRAUMA-BASED TOTAL MIND-CONTROL

1. Numerous professional papers.

2. Personal accounts about slaves (published).

3. Unpublished paperwork, tapes, interviews of slaves.

4. Therapists.

5. Books on Mind-control.

6. Books on associated topics, such as PTSD, the Mind, hypnosis, drugs, witchcraft, and the various aspects of control.

1. Numerous Professional Papers.

Carole Goettman, George B. Greaves and Philip M. Croons put out a reference book Multiple Personality & Dissociation 1791-1992 A Complete Bibliography, 2nd edition. (Lutherville, MD: The Sidran Press, 1994). Co-author Fritz has gone through the Bibliography which lists in 150 pages essentially all the articles ever published on MPD and Dissociation, and he has read all that he could obtain via the large research libraries. Dozens of the articles, and many of the books which appear in this complete bibliography have been read. Most of the professional literature on the subject is trash. During the 1970s, Americans got interested in Multiple Personalities, after having lost interest in the subject as W.W. I got started. I believe the therapeutic community was probably nudged by the military/intelligence agencies to lose interest when W.W. I broke out, and that anyone who did get interested got scooped up into the government during W.W. II and the Cold War. Some of the helpful professional papers have been notated in the book itself. A perusal of the index will provide part of the sources for this book.


2. All the Personal Account (Auto Biographical Accounts) that are available.

The list of auto-biographies (or biographies) of victims which were consulted include the following:

CHASE, TRUDY

Chase. Trudy. When the Rabbit Howls. NY: Dutton, 1987.

DORSETT, SYBIL ISABEL.

Schreiber, Flora Rheta. Sybil. Chicago, IL: Henry Regnery Co., 1973.

FORD, SUE.

Taylor, Brice with Patrick Stone. (written as a novel). Starshine. Huntsville, AL: The Brice Taylor Foundation, 1995.

JONES, CANDY. (born Jessica Wilcox).

Bain, Donald. The Control of Candy Jones. Chicago: Playboy Press, 1976.

LYNN, LORETTA.

Vecsey, George with Loretta Lynn. Loretta Lynn A Coal Miners Daughter. Rockefeller Plaza, NY: Warner Books, 1976.

MONROE, MARILYN.

Pepitone, Lena. Marilyn Monroe Confidential An Intimate Personal Account. NY: Simon & Schuster, 1979.

O’BRIEN, CATHY.

O’Brien, Cathy with Mark Phillips. Trance Formation ofAmerica, The True Life Story of a CIA Slave. Nashville, TN: Global Trance Formation Info, Ltd., 1995. Also Cathy O’Brien and Mark Phillips put out numerous monographs and a number of articles in the Contact magazine, which were also consulted in writing this book.

STRATFORD, LAUREN.

Satan’s Underground: The Extraodinary Story of One Woman’s Escape., 1991.

WHEELER, CISCO.

Wheeler, Cisco with Fritz Springmeier. They Know What They Do, An Illustrated Guide to Monarch Programming-MindControl. Oregon City, OR: Springme ier & Wheeler, 1995.

OTHERS VICTIMS:

* Casey, J.F. & Wilson, L. The Flock. Alfred A. Knopf, 1991.

* LaCalle, TM. Voices. NY: Dodd, Mead, & Co., 1988.

* Lancaster, E. & Polney, J. The Final Face of Eve. NY: McGraw-Hill, 1958.

* Schoenewolf, G. Jennifer and her selves. NY: Donald I. Fine, 1991.

* Sizemore, C. & Pittillo, E. I’m Eve. Garden City, NY: Doubleday & Co., 1977.

* Smith, Michelle & Lawrence Padzer. Michelle Remembers: A Story of Satanic Possession.

* Thigpen, C.H. & Cleckley, H. The three faces of Eve. NY: McGraw-Hill, 1957.

3. Unpublished Papers, Tapes and Interviews With Victims

These sources will have to remain confidential. Over a dozen Illuminati slaves provided notes from what they have found out about their lives and mind-control systems. The co-authors have interviewed and personally known dozens more, who have been visited with. Notes were kept on some of these interviews. Fritz taped some of his interviews, and in more than one case got a computer disk of the person’s life story with colloborating evidence.

4. Therapists

Fritz is appreciative to the following therapists for the help he received:

Dale Calvocade, Ukiah, CA, who helped me understand the religious covers better.

Dr. Carol Clifton, Portland, OR, who helped me understand the value of patience, kindness and listening in helping victims help themselves.

Dr. Loreda Fox, Denver, CO, who helped give a better understanding of the spiritual dimensions.

Catherine Gould, TX, who helped me understand the role of alters within programs.

Denny Hilgers, Pasadena, TX, who helped me understand the deeper codes, and the deeper systems better, and the importance of a person’s identity.

David W. Neswald, Irvine, CA, who helped me understand the primal traumas better.

Randy Noblitt, Dallas, TX, who helped give a better understanding of overall picture, and how some of the codes are constructed.

Mark Phillips, Nashville, TN, who opened up a deeper understanding of how the Network operates, and provided some direction for how we should approach dealing with mind control.

Doug Riggs, Tulsa, OK, who helped give a better understanding of the religious fronts, and who helped tremendously understand how this trauma-based mind-control fits in with the Word of God.

5. Books (and long papers) on Mind Control

Bowart, Walter H. Operation Mind-Control, original edition and the totally revised Researchers edition of 1994, which carried the same title.

Chavkin, Samuel. The Mind Stealers, Psychosurgery and Mind Control. Westport, Conn: Lawrence Hill & Co., 1978.

Estabrooks, G.H. Hypnotism. NY: EP. Dutton, 1957.

Lockwood, Craig. Other Altars, Roots and Realities of Cultic and Satanic Ritual Abuse & Multiple Personality Disorder. Minneapolis, MN: CompCare Publishers, 1993.

Marks, John. The Search For The "Manchurian Candidate" The CIA & Mind Control. NY: W.W. Norton & Co. (paperback version), 1991.

Mediaecco. When The State Rapes, Part I & 2. Gorredijk, Netherlands

Thomas, Gordon. Journey into Madness. NY: Bantam Books, 1989

White, John. Psychic Warfare, Fact or Fiction? (An investigation into the use of the mind as a military weapon.) Wellingborough, Northamptonshire, UK: The Aquarian Press, 1990(?).

De Laurence, editor. The Lesser Key of Solomon Goetia, The Book of Evil Spirits. Chicago, 1916.

6. Books on Associated Topics

Both authors have read many books on tangent subjects. The list of books that have been read and researched prior to writing this would take another book to record. The co-author Fritz found himself consulting his own books, Be Wise As Serpents (1991), The Top 13 Illuminati Bloodlines Vol. 1 (1995), and Exodus 20:4-5 (1978). The co-authors purchased and read the 14 Oz books. They also have a number of the other books used for scripts such as, Mother Goose Rhymes, The Tall Book of Make Believe, Michael Aquino’s version of Star Wars, etc., Snow White & the 7 Dwarfs, The Island of the Blue Dolphins, Through the Looking Glass, etc. Fritz purchased his own copy of The Graphic Work of M. C. Esher. NY: Ballantine Books, 3rd edition, 1972. in order to have on hand the artwork which contains so many mirror images and inversions and is so often used for programming.

As I, Fritz, sit down to provide the sources for the reader, it is apparent that the task is beyond my time restraints. Knowledge accumulates. A random sample of just two of almost countless references looked at to come to the author’s level of understanding would be Jean L. Sutton’s workshop book Ritualistic Abuse of Children Identification and Case Management Strategies which was used in workshops for teachers and child services division people on Fri. Sept. 11, 1992 at 815 N.E. Davis St., Portland, OR. Another example is The New Yorker’s, May 24, 1993, article "Remembering Satan - Part II". Neither one was referred to in writing the book, but these two and countless others over the years form the accumulation of understanding that is needed to tackle writing a book on Multiple Personality Disorder (Dissociative Identity Disorder).

To be able to write this book, Fritz, the co-author has studied material, books, newspapers clippings, articles, etc. from the following ASSOCIATED TOPICS with a close estimate of the number of items studied in each area: Aliens & UFOs (40 items), Amish-Mennonite (30 items), Astronomy & astrology (25 items), Behavior Modification (12 items), Black religions in the New World and Africa (6 items), Brain (30 items), Caballa (10 items at least), Computers (25 items), Computer languages (8 items), Crime (25 items), Demonology (30 -items), Druidism (20 items), ELF waves (20 items), Fairy Tales (7 items), False Memory Syndrome (5 items), Freemasonry (35 items), Holograms (6 items), Hypnosis (12 items), Intelligence (20 items), Jesuits (6 items), Ku Klux Klan (15 items), Medical technology (15 items), Memory (20 items), Mental Hospitals (5 items), Military (10 items), Mind (25 items), Movies (20 items), NeuroLinguistic Programming (6 items), New World Order (50 items), Particular Individuals such as the Rothschilds, Rockefellers, Collins, Mengele, Cameron, Wheeler, LaVey, Aquino, Elvis Presley, Doris Duke, and many others mentioned in the book (50 items at least), Personality (25 items), Satanic Ritual Abuse (50 items), Spiritual warfare (40 items), Spying (25 items), Underwater research (40 items), Voodoo (3 items), Witchcraft (50 items). Some of the books that would have been cited if every detail had been footnoted can be found footnoted in other writings by Fritz Springmeier.

Also I, Fritz, have spent time examining the Word of God to try to understand what God’s written word revealed by His Spirit would teach me about this situation. There are numerous Bible verses that pertain to the information in this book which are not referred to in this volume. The primary issues created by the traumas are a. identity issues, and b. issues concerning fellowship with God. Much of the trauma and programming is cloud the issue of who the person really is, and how they can have a beneficial relationship to God Almighty.

The Bill Gothard Basic Youth Seminar which the co-author Fritz has attended 6 times, has been very helpful to him to understand what the programmers do, and how they strip a person of what they need to be spiritually strong. In fact, Fritz knows a number of the programmers have attended the Bill Gothard Seminar themselves, and know how to use beneficial information for evil purposes.

Likewise, the Christian can take the occult knowledge of revealed in this book and use it for good instead of the evil that it was designed for. The Institute has a hard volume reference book on Research in Principles of Lfe as well as a workbook.

Cisco, the other co-author, has studied MPD, SRA, Bible issues, and occult topics in depth. Her personal knowledge added a depth to the book that could not have been achieved without her.

William Frost of San Antonio, TX was a good friend of a tall lean Texan named David Hill. David Hill had been taken in by Mafia boss Joseph Bonanno, who was as a surrogate father to him. After David Hill became a Christian, he used his first hand knowledge of the Mafia, the occult world such as his Masonic experience to put the pieces together about the NWO. He had just completed a very detailed manuscript for a book exposing the NWO, when he was murdered. After David’s murder, William Frost was able to retrieve David’s manuscript and sent me a copy. The death was not ruled a murder by the authorities, but men who have written lengthy exposes on the New World Order do not commit suicide before they get their books published.

It was keen-minded David Hill who warned Billy Graham for many hours about the New World Order, only to be told by Billy Graham, that Billy was ‘a captive’ (Graham’s own words) of the New World Order. The information William Frost gave me about David Hill, was later verified in many ways by Joseph Bonanno’s surprising autobiography A Man of Honor, Simon & Schuster, Rockefeller Center, N.Y., 1983.

It’s somewhat unusual for Mafia chiefs to write autobiographies. In it, Joseph Bonanno says he looked up to Billy Graham, and that David Hill joined up with Billy Graham. In 1974, Billy Graham came to Joseph Bonanno’s house in Tuscon with David. Graham sent him a Christmas card every year, and called him soon after his wife died to offer condolences. These things are mentioned on page 333 of his autobiography. David Hill’s manuscript was encouraging to me, Fritz, because he verified many of the same things that I’d found. His manuscript was quoted in Vol. 1 concerning the top families.

Information about the names of programmers and programming sites and the Temple of Set membership has come from recovering victims of Trauma-based mind-control. Information about Illuminati bloodlines, ritual sites, and important buildings has also come from Illuminati members who are recovering from Illuminati mind-control. Many more witnesses to Illuminati Mind-control will come forward if people learn how to help these people, and to believe the things that have happened to them. Now that this legitimate information is being circulated, it can be expected that "witnesses" with bogus information/bogus memories will come forward to detract from the credibility of this book.

All Items By Fritz Springmeier, Copyright © By Fritz Springmeier

Reply With Quote
  #39  
Old 11-03-2012, 10:39 PM
crmnlelemnt's Avatar
crmnlelemnt
Offline:
My Rank: CORPORAL
Poster Rank:960
engendered
Join Date: Sep 2012
 
Mentioned: 2 Post(s)
Quoted: 62 Post(s)
Activity Longevity
0/20 9/20
Today Posts
0/11 ssssss460
Re: Trauma-based Mind Control? (or Torture-porn?)

yaaaa..this is all far too complicated for it to be real...things just do not work this way in real life, christ I dont know one person that can keep the simplest of secrets...good story though

Reply With Quote

Powered by vBulletin Copyright 2000-2010 Jelsoft Enterprises Limited.

Search Engine Friendly URLs by vBSEO