The Illuminati Formula Used to Create an
Undetectable Total Mind Controlled Slave
by Cisco Wheeler and Fritz Springmeier
Chapter 11
Science No. 11
Internal Controls
A. Teaching Occult Philosophies
B. Internal Computers--Perfect Delegation; Internal Computers Which
Auto-Control A Slave
C. Internal Hierarchies
A. Teaching Occult Philosophies
Learning plays an important part in perception. The Programmers try to
get their victims to subscribe to philosophies and ideas that will make it
hard for them to rebel against their controllers. This is what is termed
indoctrination. The same methods of teaching that others find useful are
employed. Ways of thinking are incorporated by the slave via handlers,
programmers, and the cult they belong to. Everyone tries in their own
way to make sense of life. This is a natural brain function, so that the
human mind can understand how to deal with the future. The mind takes
raw data, and then applies some type of logic, and comes to conclusions.
Once accepted these conclusions can be as hard as nails, and they will
defy any attempt to change them, even in the light of new evidence. If
the Programmer is smart enough, he can get an alter to logically believe
anything.
Once the belief is embedded, it will remain there tenaciously. In the
Illuminati, "great" masters and adepts teach "hidden mysteries". The slave
feels the authority that emanates from this teacher with special gifts and
abilities. The slave is hardly in a position to question the teachings being
given from on high. Circular reasoning, lies, and other tricks are used to
convince the person that the occult world is true. For instance, "God
abandoned you, therefore you need to cling to us, the only ones who
would see any use in you." (The truth is that the cult staged a crisis
where their actor playing God abandoned the child to the cult’s
abusiveness. The whole event was simply cult abuse--with God taking the
blame.)
"We are trying to fashion a better man, a man with far more capabilities
than before, with better genetics. Those who oppose us, are trying to
keep humankind back in the dark ages."
This is circular reasoning and outright lies. (They are not interested in
helping mankind, only destroying it.) To make occult philosophies more
palatable, the occult world attacks the character of anyone whose life
would dispute their false claims. They also use a great deal of
rationalization, where the end justifies the means. Many slaves have had
to sit and listen to their masters rationalize their brutality.
Within the Illuminati, ranks are achieved with much learning and ritual.
Within the Temple of Set, a member is required to read certain books.
Fritz, the co-author has a list of books a Temple of Set member is asked
to read, with the comments attached by the Temple of Set to each
suggested title.
In their suggested/required reading Category 19 entitled "The Metamind"
is Metropolis by Thea von Harbou. Their comments are "An
Expressionistic portrait of a negative utopia in which humans are
controlled by machines.. .the basis for many electronic/audio-visual
ritual techniques employed by the Church of Satan and further
developed by the Temple of Set." (p. C21-2)
Another is Physical Control of the Mind: Towards a Psychocivilized
Society by Jose M.R. Delgado. Their comments, "Delgado, Professor of
Physiology at Yale University, is one of the most distinguished
authorities in the field of Electrical/chemical Stimulation of the Brain
(ESB). This book is necessarily dated, but it is so well-written that it
deserves to be perused as a preface to more recent works on the
subject." (p.C-16?-2)
The Psychology of Anomalous Experience by Graham Reed. Their
comments, "This book addresses unusual, irregular, and puzzling
experiences- dejà vu, illusions, delusions, hallucinations, etc.-in terms of
the mind’s normal psychological processes of gathering, monitoring,
processing, and storing information." (ibid.)
This is just a brief look to illustrate to the reader that leaders of groups
like the Temple of Set are avid students of mind-control. (An almost
complete membership list of this group at one point in time, is provided
in Appendix A.) The librarian of the Multnomah County Detention Ctr.
shared with co-author Fritz that Sheila, formerly second-in-command of
the Bhagwan Shree Rajneesh’s commune at Antelope, OR studied, via
jail/prison interlibrary loan, books on Hitler’s mind-control techniques.
Many other examples could be given of how mind-control is being studied
and taught by these groups.
One more book on the Temple of Set’s reading list would be worthy to
point out, The Psychology of Man’s Possible Evolution by Peter D.
Ouspensky. Their comments, "Should be read especially by those
members whose magical ability is hampered by flaws in their balance
factor....A series of lectures which explain the Gurdjieff approach to the
concept better than G. himself was able to do." There is an important
link between Gurdjieff, mind-control, MPD, etc. but the subject is big
and needs to be further investigated. Co-author Fritz has been
investigating this link, including talking with leaders of the most
successful Gurdjieff commune. As with so many groups, what you see, is
not what you get.
Teaching The Ideologies Of War
One of the ways to control a person is to get them angry and then
channel that hate. Wars have been used for centuries by the oligarchies
that run things to control their people. Right now, the New World Order
is carrying out a Drug War, an Environmental War, and a Bosnian conflict
for the express purpose in their own plans to control us. They have a
mock-alien invasion planned to further justify more control over our
lives.
Over the years mankind has created an entire industry around warfare.
There are long traditions within military units, that for some reason must
be "upheld" by the men who serve in those units. When people buy into
the philosophies of war, they can generally be persuaded to give up or do
anything to contribute to that war. After all, any sacrifice will be minor
compare to the large numbers of bodies that will end up dead. One of
the large purposes of the Monarch type of trauma-based mind-control is
to produce robotic soldiers who will do anything. Normal military training
is usually sufficient for most military needs, so it is clear that Monarch
slaves have some ulterior uses that the military doesn’t want the public
to know about.
Various Delta Forces
The military as well as other groups have created numerous delta teams,
delta forces, delta groups etc.
Delta Assassination Teams
These teams are projects that the Satanic Hierarchy and the CIA
collaborated together on. The programming that was placed into people
was ingenious and very complex. As the program progressed over the
years, the programming became more sophisticated and past mistakes
were improved upon. The Delta Teams were programmed to carry out
various assignments such as political assassinations. The members of
these teams are housewives and other ordinary people who were
programmed years ago. The Delta Teams are part of the CIA’s psychic
warfare bag of tricks. The CIA works so closely with the military that the
Delta Force is easily expected to be tied in with the CIA & U.S.
intelligence.
Delta Force
The system tapped Frank Burns to create the Delta Force. Frank Burns
was a Green Beret. What kind of things did Frank get involved with AFTER
joining the military? Hold on. Frank Burns was an SDS (Students for a
Democratic Society--an Illuminati organization) organizer. He was also
deep into Zen Buddhism, which is the same as mysticism. Frank Burns as
an officer also studied under the Esalen Institute.
The Esalen Institute is at Big Sur, California and is the American
equivalent of the infamous Tavistock Institute. The Esalen Institute
created "sensitivity training" programs for the business world under the
title "Organizational Development (OD). Esalen people were brought in to
Fort Ord where Frank Burns was the commander and began training
people. The army promoted Burns to work in the Chief of Staffs office as
a "senior organizational effectiveness consultant", which allowed Burns to
introduce Esalen programs all through the army.
This could not have accidently happened. Frank Burns in a conversation
with a two-star General about the need for "wholistic" soldiers coined the
slogan "Be all that you can be in the army." Burns phraseology began the
army’s recruiting slogan. It refers to the Human Potential Movement that
the army has incorporated from the New Age movement. The army is
moving toward becoming an occult fighting force that practices
witchcraft with its warfare. Some of the units moving that direction are
Psy-Op operations, which has included Satanists within its officers. The
Delta Force network of various Generals and other high ranking officers is
merely one facet of the drive by the Illuminati to transform the American
army into something akin to occultic warriors that will be as fierce as the
Nazi Death head units. Bear in mind that George Bush, commander-in chief of Burn’s Armed Forces has come from an Illuminati family/ & the
Ill. Skull & Bones chapter that was part of the secret support for Hitler.
They have been using as an insignia what they themselves (the Skull &
Boners) call "the Death Head".
It is not surprising then that support for the Delta Team activities has
come from the very top. Frank Burns set out to create a warrior monk.
Lt. Col. Jim Channon, in Delta Forces, also put forward the idea. Channon
visited more than 130 New Age groups in California doing what was called
"social experimentation." It is an idea that the occult have repeatedly
carried out.
Hitler’s S.S. were a special elite group of warrior monks from which
about 3,000 went through religious initiations. (As the war progressed the
primary focus of the S.S. shifted from being the Black Order to merely
being a reliable military group called the Waffen SS.) There were 3 levels
of initiation, the last reserved for the hard-core Satanists at the top. The
Nazi initiation seems to have been an attempt to get the force of the
Vril. The Ordensburgen (Castles of the Order) were training centers for
the elite Nazis, including the S.S. (Having been in the military, I know
first hand that the success of the S.S. and Waffen S.S. units in being
fierce warriors is attributed by some of our leading military men to their
training to be warrior-monks.) One group of the S.S. called Knights of
Poseidon volunteered themselves for castration, in an experiment to
change them back to the supermen of the mythical and magical
Hyperborea.
Some of the best Sufi organizations were warrior monks. Burns and his
Task Force Delta generated the First Earth Battalion, which is an occult
military unit trained in martial arts, and witchcraft. Men who are
selected for First Earth Battalion are given an occult initiation which
includes the following oath:
"I have the capacity and therefore the duty to contribute to the
development of myself, my associates, and our planet, simultaneously
now! I take personal responsibility for generating evolutionary
conspiracies as a regular part of my work. I will select and create
conspiratorial mechanisms that are not costly in time or resources
because I am aware of the five channels available to me (such as radio,
television, and word of mouth.) I will organize a self-supporting high
commando group that will create and perform evolutionary
breakthrough actions on behalf of people and planet. One people, one
planet. I will then pass this concept on to others who are capable of
generating further self-organizing commando teams.’’
What ever happened to defending this nation? Military units such as the
First Earth Battalion although they are supported by American tax dollars
are not here to protect America. They are global minded. They are here
to protect an occult world government. They are out there actively
promoting the New World Order. Several years ago, Egendorf states that
$4.5 million (which came from you and I, and other Americans) had
already been spent on Delta Force’s 80 different projects. The Green
Berets is another organization that has been heavily targeted by the
Satanists, to indoctrinate and recruit. The Green Berets are increasingly
moving toward being warrior-monk group. Many of them are now
programmed multiples.
One man who is being looked up to by many American Patriots and
Christian Patriots as the leader to help them oppose the New World Order
is Bo Gritz. He was a recent presidential candidate. Bo Gritz was a Green
Beret and a Delta Force commander. Bo Gritz is very proud of the fact
that he wrote the manual for the Delta Forces. He also worked for the
CIA. Bo Gritz is one of the military’s best programmed multiples, and
perhaps one of the most dangerous. Insiders have told me he IS the most
dangerous. Numerous insiders both for and against Bo, have talked about
Bo Gritz, and that he is a programmed multiple. According to Bo Gritz’s
campaign literature for President he was a commander in Delta Forces.
Reproduced on a previous page is Bo’s own presidential campaign
literature where he states that he is "Intelligence Officer &
Reconnaissance Chief, Delta Force." He is also "Chief, Special Activities,
U.S. Army General Staff, the Pentagon" and "Principle Agent, National
Security Council, Intelligence Support Activity". Under qualifications Bo
states that he is a "Security & Counter-terrorist Specialist."
Within the government, they are already referring to Christians who are
against the NWO as terrorists. Bo is their greatest counter-intelligence
counter-terrorist they have. He came in like a storm and took control of
the Patriot movement, and it has been like pulling teeth to warn patriots
about who he is. Bo Gritz himself was a Green Beret, and was used to
assassinate 300 people. His blood lust caused him at one point during the
Vietnam War to shoot 30 prisoners in cold blood.
I also heard Bo talk about say being Temple recommend Mormon. That
means he was at that time in good standing with the LDS Mormon church
so that he could go to the Temple and participate in its rituals. Those
who are alert realize that the temple rituals are like Masonic and
Witchcraft rituals. Now he is no longer a Mormon. But he still continues in
the military philosophy he believes in. Bo Gritz is going around the nation
teaching SPIKE training to anyone who wants martial arts skills. Bo has
done an excellent job in identifying for the New World Order every
person in the nation who could threaten their plans for a martial law
NWO takeover.
Bo Gritz likes to call attention that he is one of this country’s foremost
counter-terrorist agents. This is true. The New World Order believes
patriots and Christians are terrorists, because they stand in the way of
the world’s acceptance of their world dictator. Bo Gritz has done a great
deal to infiltrate and neutralize the opposition to the New World Order.
He has been their best counter-terrorist agent.
B. Internal Computers--Perfect Delegation; Internal Computers Which
Auto-Control A Slave
If a master has to constantly spend time whipping and motivating his
slave, as well as forever watching that the slave doesn’t escape or do
shoddy work, or physically or verbally injure the master, then controlling
the slave can end up to be a full time job. When the master gets too
much involved in the control process, he ceases to be master, and
becomes a slave to the control process. The intelligence agencies knew
that they would have to create mind control slaves who could police
themselves. If the master has to constantly guard his slave, the slave will
be more trouble than he is worth.
Many successful people have gained their success because they knew how
to delegate. The most successful supervisor is the one who can delegate
the best. The programmers had to find ways to cut their supervisory
requirements to the bone if they were to make owning a Monarch slave
worthwhile. The method chosen was to build "computers" into the slave’s
mind that would internally regulate everything. They do this by taking
hundreds of the alters and dehumanizing them and turning them into
parts of a computer.
For instance, the shutter on the All-seeing eye of the computer, which is
seen in the mind like a camera shutter, is a child alter who's job is to
open and shut. (Another primal part is inside the eye’s pupil.) This
shutter part knows what goes on in all the system subconsciously but if
discovered by a therapist and pulled to the front of the mind will not be
able to vocalize about the system. The software for this "computer" could
be programmed into it, and all the individual programming of every alter
can then be tied back to the computer. In other words, each alter would
be programmed on how to view life, to act, to think, and to function in
their job. This programming would be linked to a computer.
The programmers invented the perfect method to decentralize their
control over their slaves and yet still supervise with the tightest of
control. Each alter is linked to a computer (internal-not an external one)
built from a foundation of fear and trauma. Since each section of alters
was to remain secret, each section of alters for a slave is given its own
computer, and then linking computers were built to link the various
sections, and then finally a major backup computer is built, and then
finally the internal Beast computer. Bear in mind that this is all built
internally in the mind of the victim. We are not talking about actual
physical computers built out of physical microchips, wires, condensers
etc.
If the programmer concentrates on a single point when giving instructions
he will get better results. Rather than complicating things for the slave,
you gain power over the slave (and any subordinate) if you can give
simple clear instructions. For this reason, a large share of the alters in an
alter system are given very clear straight forward jobs. Because their jobs
are so straightforward, these alters will often remain fragments, rather
than alter parts with full blown personalities. The programmers don’t
cloud the issue. An undeveloped alter will be given one single clear, basic
job. By stringing 1,000’s of alters together with single tasks, a highly
sensitive system of alters can be created.
Each piece of the System is separated by some degree of dissociation to
make it a separate piece. By dividing the mind so much, it is incapable of
fighting what has been done to itself. Before we begin describing the
technical details of an internal computer, bear in mind that every
Monarch System is unique and yet they all follow certain patterns &
methodologies. Most of the models for the first few decades follow these
patterns, some of the newer ones have more updated imagery.
Power Sources
In an Illuminati System, a computer is created for each section of alters.
That computer will be given a "power source", which if unscrewed like a
light bulb will go out. The light from one of these power sources might be
emerald blue or emerald green or other color. The reader may want to
refer to chapter 4 for the codes to understand the structuring of the
various computers and systems.
Color Codes And Ribbons
In a standard 13x13x13 Illuminati alter system, 13 colors were used, and
each computer was given a color. These would be pink, orange, yellow,
white, red, brown, blue, green, black, purple, silver, gold and platinum,
and clear. Color programming is reported to have been developed at
UCLA. Whatever the case, Systems all over the United States have color
programming.
The hierarchy of colors in a System is often as follows (from top power
down): Platinum, Gold, Silver, Purple, Black, Red, Green, Brown, White,
Orange, Yellow, Pink. Clear is also used as a color for secret areas of the
system. This hierarchy of color coding can be switched. The internal
programmers can reassign colors if they need to, in order to protect the
programming. Alters, sections, and parts of the computer are all color
coded. The color coding for alters is not the same just because the alters
are in the same section. The color coding within the Illuminati Mind
Control is fairly consistent, however a sample of an alternative Illuminati
color scheme will also be provided. A survey of colors is as follows:
CLEAR. Secret or shell alters who can take on any color are coded clear.
These are alters who serve as images or as a stage for other alters. This
would include "Guardian of the Vail" alters.
GOLD. This color is for the supreme leadership in the System, which
includes the Grand Druid Council.
SILVER. This color is for the Satanic alters who perform high level Satanic
rituals. The Mothers of Darkness have silver coding.
PURPLE. These alters see themselves as the abusers, rather than the
Illuminati. These alters were involved with the programming. They have
been taught to forget the abuse and to reframe it in their mind as
training.
BLACK. These alters were born out of Satanic ritual, and are Moon
children. The Delta and Beta alters are black coded. They do the dirty
work for the cult, such as blackmail and assassination.
RED. These altars see themselves as witches. They were born out of
witchcraft ritual, believe they have great spiritual power, and tend to
deny that they have been abused.
GREEN or EMERALD GREEN. These cat altars recognize they have been
abused. They still see themselves as belonging to the cult family, and
deny that they have been abused to protect their cult family.
BLUE ALTERS. Clones, armies and the ribbons appear to have blue coding.
These alters will go so far as to hurt the body to protect it from leaking
information or deprogramming.
WHITE. ‘These are Atlantean alters who have been given Aryan type
racial nonsense to think they are superior. They believe in genetic
engineering, and a master race.
ORANGE. These special protector alters are scouts who warn of danger
from internal or external threats.
YELLOW. These are the strong Christian alters of which there will only be
a few in the System. They help serve as a balancing point to control the
System as well as to hide what the System is all about.
PINK. These are core related alters. They maintain the true feelings of
the true self apart from the cult programming and the cult family’s
programming. These alters are viewed as weak because they are
emotional and often break down and weep. They are fragile emotionally.
An alternative color scheme that is used:
DARK EMERALD GREEN. This color is assigned to the AntiChrist-Satan
alter(s). Green is the occult color for Satan and happens to be the most
sacred color. Few people outside of Satanists know that Green is more
sacred for them than any other color.
LIGHT GREEN. The gods and goddess alters which are triads which
function in Illuminati ceremonies get this color coding.
WHITE. The internal programmers who come around in white robes get
this color assigned to them, as if they are doctors or angels of light.
RED. Sexual alters are given the natural color of sex and arousal red.
BLACK. Connecting alters that are Nexus alters between various system
parts.
PINK. Reporting alters.
DARK BLUE. Non hierarchy cult alters.
LIGHT BLUE. Alters in charge of the way the system runs, such as the
judges.
YELLOW. Alters which are ritually and sexually twinned with alters of
other systems.
ORANGE. Guard alters which are heavily programmed for obedience.
VIOLET-PURPLE. Front alters and small child alters placed into boxes.
CLEAR. Shell alters to deceive the outside world.
GOLD. The traumatized alters upon which the programming is built on.
Joseph Mengele and the programmers who worked with and under him,
used a large dollhouse with 26 rooms. Each of the rooms were painted
with one of the 13 different colors in order to build into the child’s mind,
the 13 front and the 13 back computers. The internal computers worked
off of color codes, as well as other codes.
A dollhouse was used to instill into the child’s minds the compartments of
the computer. Each room was done up in a different color. One particular
room was a secret room, and this represents the secret world of Petra
which is hidden behind two large rocks. This secret world is coded the
color clear.
Besides the special color clear, the following colors appear in the system:
Gold, Silver, Purple, Black, Red, Green, Blue, Brown, White, Orange,
Yellow, and Pink. Each color has meaning and a rank. Just as the hour
glasses could be turned, the color coding can be switched in rank. This is
why in some systems there is a "Computer Operator Black", a "Computer
Operator Green", and a "Computer Operator Purple", etc.
During the programming a black box with needles and wires which attach
to the body for electroshock is used. While electro shocking the victim,
colored scarfs coming out of a box are showed to the child. The scarfs
would help form the imagery needed to build colored ribbons internally.
Alters would be created using the Tall Book of Make Believe story of the
Pancake people. Using this as a base or foundation, the alters would then
be dehumanized one step further into thinking they were ribbons--such as
ticker tape, which could transmit information from one computer to
another area of the mind.
The Ribbons had the ability to travel between the different levels and to
transmit messages through the System, especially to the computers. It is
believed they could do this because they were spirit. When a System is
accessed by a programmer, one procedure is to obtain a Ribbon alter and
then inform the Ribbon what he wants. The ribbons transmit messages to
the internal computers. The ribbons on older systems use morse code.
Who are the Ribbons? The Ribbons are the beginning of the Luciferian
alter-like demons and alters. They are primarily the message bearers
from the computers to the different computers, levels and alters. The
Ribbons might have angelic names (Michael, Gabriel, etc.). The word
angel means messenger. The ribbons serve a very similar function. They
transmit ticker tape with morse code messages. They are at work most of
the time for a System. A sample cover story for what they guard--which is
the main computer with the gems and the core, is that the ribbons guard
the System’s "Garden of Eden".
Some more of the cover story that may be given is this: Ribbons were
supposedly formed out of the dust of the ground and were placed in the
Garden of Eden to create every pleasant tree. (See Genesis 1.) The
ribbons relate to the Tree of Life. But to eat of the Tree of Knowledge of
Good and Evil will cause death. The name of the first river of four in the
garden is Pashon. Out of the first river come four heads. The River
Pashon has gold, ballium, onyx, rubies, diamonds and precious stones.
These gems are the programs the dwarfs mine. If the System has
charismatic programming, the alters will have porcelain face
programming. In this case each ribbon’s color will match the color of the
stones in the masks--that is yellow, white, blue, green, purple, red and
black.
The colors of the ribbons correlate or match the colors of the Dollhouse
rooms. What do ribbons do? The Ribbons serve the programmers and the
computers, who in turn serve the evil master Spirits. Things that the
Ribbons do for the computers have been identified as follows:
a. The Ribbons eat from the system’s internal "Tree of Good and Evil".,
b. Ribbon programming consists of several things--where they reside, who
they are and what they are to protect.,
c. Ribbons must protect the computers in order to protect their own life.
The Ribbons will be programmed to believe that reversing the computer
will reverse the Ribbons’ life. The ribbons themselves operate with
mechanical hearts (not human hearts).
The cover stories may include the following: All Ribbons are hid behind a
little girl, who is a front for them & who tells the creation story. The
little girl will tell the creation story which included the Ribbons. Behind
her runs a silver cord. The silver cord has to do with heart programming.
The silver cord has 3 strands that cannot be broken as per ECL 4:12. This
silver cord goes off if the Ribbons are touched. Ribbons are set up so that
suicide programming is triggered if they are cut.
Actually, french braiding conceals a 4th strand. In review as stated,
during the programming, a box with colored scarfs was shown the child
while severe electro-shock was given to the body. A colored scarf
represents a ribbon which runs a message from a colored room to a
similar colored alter.
In a System which is structured into families and cities and worlds and
sections, these "geographically different" structures in the mind of the
victim can be connected via the color coding. In other words, the alters
are structured into a 3-D cube structure. Then a fourth dimension (the
color coding) is added to tie in all of the three dimensions. A central
computer was placed in at the bottom of the mind. Using various
techniques the victim is brought to the deepest altered state possible,
and a computer is built into the mind via hypnosis and alters. This can be
done by freezing the entire body and just keeping the head active. Or it
can be done by bringing the body to a comatose state where the heart is
beating faintly. This step can only be done under the strictest medical
supervision.
The memory storage area for the computers include the Emerald City
Library (staying with the Wizard of Oz theme) which contains alters who's
only function is to memorize & retain with photographic memories pages
and pages of information. The layout with codes of the entire system can
be stored in a storage bank, so the programmer could access this area if
his own records were lost. The libraries contain the historical genealogies
of satanic iniquity from early ancient times to present. This ancient
occult information has been reported by at least half a dozen Illuminati
slaves as being retained internally by demons.
How Monarch Slaves Are Designed To Interface With The Unix System
Of The Beast Computers
In line with what is being done by the Illuminati around the world with
their network of computers--the computers have access codes similar to
666 666 666, and back out and close down codes similar to 999 999 999.
These are the codes that the UNIX universal system uses, and the
Monarch slaves are being created with codes that interface with the UNIX
system for computers. (On some systems if the computer is shutdown it
will request an input code of 666fff666fff666fff666...This can then be
reversed F6F6F6F6F6F6F6F6F6F6.)
The UNIX system is being used to allow the New World Order’s big BEAST
computers to communicate with any known computer, including the
minds of their Monarch mind-controlled slaves. In the 1960s, the U.S.
Department of Defense began linking computers together into a
superhighway now developed into the Internet. Hundreds of thousands of
computers around the world are tied in. Like buildings in a city, each
computer has its own unique address. Most of these addresses are
registered at the Network Information Center in Menlo Park, CA.
Individuals can also be registered at the NIC too. The U.S. Military links
into the system with their Arpanet and Milnet networks, which tie
together such divergent things as MIT computers, West Point computers,
NORAD computers, Air Force Systems Command Space Division computers
at El Segundo, CA and U.S. Army DARCOM at Seckenheim, Ger. (to name
a few). These are all being tied together to form one vast electronic
brain.
There are nine secret BEAST computers of the New World Order, at the
time this was written. "Big Bertha" is the nickname of the BEAST
computer located at the secret military installation called Dreamland at
the secret Groom Lake, NV test site facility. Papoose Lake is referred to
as S-4. The other super-secret facilities in the area are named S-2, 8-6,
and S-66. This area has become the Illuminati’s prime programming
facility for turning out Monarch slaves, and the Monarch slaves which are
turned out from this area have turned out to be the worst basket cases.
In other words the programming is very severe which is carried out in this
area. This area has also been used for the space program, for the U-2 &
SR-71, for the CIA’s A-12 spy plane, for the Stealth fighters (Lockheed F-1
17A Attack plane) and bombers, the Aurora, and for the U.S.
government’s "Above Top Secret" flying saucers. The Big Bertha computer
(named after the Illuminati Mother-of-Darkness Bertha Krupp) can be
talked to in half a dozen languages and will answer a person back in the
language they speak.
On a daily basis, airplanes fly into the Groom Lake facility. The callname
of flights bringing workers and people go by the call name "Janet". About
12 Janet flights come into the facility everyday. These flights are usually
Boeing 737s and arrive from places like a secure terminal run by EG&G at
McCarran Airport in Las Vegas and from the military’s Palmdale, CA
facility. These 737s are unmarked except for a red stripe running down
the fuselage. Large military C-130 arrive with cargo, and Illuminati
dignitaries arrive in smaller twin-engine craft. Victims for the
programming are brought in via planes, & other routes.
One of the BEAST computers occupies three floors of the headquarters of
the European Economic Community building in Brussels, not far from the
important Illuminati Mother-of-Darkness worldwide headquarters castle
near the Fr.-Bel. border near Muno, Belgium. Another BEAST computer is
in Luxembourg. In observing the operations of the Illuminati, it has been
seen that telephone area codes are used as part of a mind-controlled
slave’s code. We do not understand everything about their codes, but it
does tie in with other things that are happening.
Every person in the world has been assigned an 18 digit tracking number,
which consists of 3 groups of 6 numbers. The first 3 numbers assigned in
the BEAST computer to everyone are 666. The next is one’s national
code. The U.S. national code is 110. Then the next 3 numbers are your
telephone area code, and then finally your 9 digit Social Security number.
The code then is 666 + Nation code + Tel. area code + social security no.
= BEAST I.D. no. for an individual.
According to Dwight Kinman’s book The World’s Last Dictator, 2nd ed.,
(Woodburn, OR: Solid Rock Books, p. 256) VISA has already begun issuing
VISA cards using the BEAST 18 digit number. When an American makes a
bank transaction on an auto teller within a matter of seconds the BEAST
has been informed of the activity. These computers use UNIX.
The particular programs for the economic transactions just described are
a worldwide computer network called SWIFT (Society For Worldwide
Interbank Financial Transactions). The SWIFT works off of the UNIX
system and can communicate with any computer. It was developed by
AT&T and uses C language. (Bear in mind that there are dialects of UNIX,
such as the standard AT&T UNIX and for instance Berkeley UNIX. The
UNIX system uses both time sharing and multitasking.
The mind of a Monarch slave also does both multitasking and time
sharing. One of the nice UNIX features, is "protected memory", which is
also part of the Monarch programming. A kernel is what the UNIX
programmers call a "protected person". It is very similar to the internal
"person" (alter) who helps the Monarch slave’s programming functions.
The big item about UNIX is that it has permissions granted. This is similar
to the Monarch programming. Permissions are granted to 3 types of
entities. The Top Programmer or "god" as he is called, of the UNIX System
receives what is called the individual permission. The next permission is
called group permission, and it is given to insiders who work with the
system. The final permission type is the world, which has very limited
access. The parallel between this and the Monarch programming is
surprising. In some cases the programmers may have matched things on a
one-to-one correspondence.
The Monarch program also has a Top Programmer who is called "god" to
the System. He has total control over the system. His programming
permissions can not be deprogrammed out by others who might want to
usurp his power.
Hidden from the casual user of the UNIX system are the Daemons and
Demons. The UNIX programmers decided to use the old english spelling
for demon = Daemon. These are computer processes which work secretly
behind the scenes and are given actual demonic names--some
corresponding to actual names of historically known demons, such as
Asmodeus. Asmodeus is also a demon which is placed into many Monarch
slaves.
In the UNIX system these demons are treated like persons in the
computer’s user director. Demons in the computer system do not have to
log onto the computer, but they work behind the scenes and are given
the same powers that people users are given. They are set up in the same
structure as how the computer treats people. Permission in the UNIX
system is granted using an 8 bit count with 0 through 7. The three kinds
of permission are the read, write, and execute permissions. If no
permission were granted in any way the UNIX system would indicate" "on
the screen which means 000000 000 or nine 0’s.
The super user called god is given the code 777 which means super user.
However, the permission of 666 gives the user the power to everything
the 777 permission gives, except that the 777 permission allows the god
the master programmer to execute not executable programs.
The Postmaster Demon is the head demon, and his permission level in
UNIX is 666. (In the Monarch Programming "Mr. Postman" is a code word
used internationally.) The most important part of the BEAST system is its
communication power. The Electronic Mail System of the BEAST allows it
to communicate worldwide, and along with electronic mail comes levels
of permission to super user (god) is called Root.
A programmer on the Beast must get permission. His program must get
permission. That program that gives permission must also get permission.
In other words, there are levels of permission that must be gone through.
This is similar to the Monarch program. For instance, the alters
personalities which would control the body during Illuminati gatherings
have very tight access permission. It is very hard to access these
hierarchy personalities. Both the UNIX system (and the Monarch
programming) creates "children" by "spinning". The "child" spins off. When
the "child" is finished it is "killed" in UNIX lingo.
When the programmers created child processes in the computer, they
were having problems with the child processes killing the parent
processes. The same type of problems have had to be dealt with in the
Monarch programming. The initial programmer is often the biological
parent of the child, and this parent is very responsible for extreme
tortures being applied to the child who is being programmed--not to
mention all of the expendable children, who are killed in front of the
child to highlight the reality of the trauma. The natural reaction of the
child being created is to hate the programmer.
Naturally, the Monarch programming had to overcome that natural
tendency, which it does very successfully. The UNIX system uses an
internal clock within its computer system. The UNIX clock is called CRON.
CRON checks files to see if the programmer has put in any files to run.
The UNIX system uses data bus lines, which are like the Monarch
programming ribbons, which go through the system. These ribbons or
data bus lines take information and commands from the computers to
other computers.
Within the UNIX system, insiders have revealed that the Daemon (Demon)
processes of all the UNIX systems have a security flaw. That flaw is that
the Postmaster Daemon has access to them in spite of who the god is of
that particular UNIX computer system. So while owners, who purchase
UNIX systems think that they have exclusive control over their system, an
external Postmaster Daemon coming from the Beast could use its
permission levels to over ride the power of the local owner of the system.
The Monarch system has a similar feature, the Illuminati programmers
know how to access the base or primal anchors to the programming and
yank out any programming they want. All the slaves of these lesser
groups such as the CIA, Church of Satan, Mafia, etc. can all be
reprogrammed rather quickly to serve the Illuminati, if they are not
already due to the Illuminati programmers extra knowledge on how to
get into the base programming. In these many ways, the UNIX system
serves both real computers and also for the internal computers of some
slaves’ mind.
The slave’s system becomes a computer system. It functions as a series of
computers that are connected to the master computer which is sunk into
the mind at the lowest hypnotic level, which is a level often placed even
below an internal "hell pit". To access the different computers,
combinations of cards were used for the codes (numbers are also used.
See Chapter 4.). Various parts of a Monarch system correspond to what
any computer would have. A microprocessor register has 3 sections on a
computer to make it functional. In Monarch Systems, you would find
these 3 represented by 1. stored data in the library and alters with
photographic memories, 2. an instruction section with codes, and 3.
stacking mechanisms.
Linked to all this were a crystal, clock, hour glasses, a compass and an
entire demonic command structure. The eye in front of the big computer
will be protected by legions of spirits. The front big computer runs front
quadrants and the back computer runs the deeper quadrants.
The software so to speak for the Omega programming (computer) may be
set up to include a stacking program called the Potter’s Wheel. The
Potter’s Wheel is a misuse of the Bible, and is a type of programming that
the Charismatic/pentecostal movement carries out. The Mormons and
the Catholics have their own distinctive "software" programs.
An initial stacking mechanism would work by telling alters to "Stand in
Order according to rank and serial no." Another code along with a hand
signal would place the Gatekeeper alters up on the Potter’s wheel for
their "creator" to work on them. A group of alters could be taught to go
up on their Potter’s wheel by seeing a pattern of dominoes. It is whatever
the programmer decides.
The dominoes were used for coding, but they also had the programming
feature of being able to tie alters together so that if the System is
tampered with out of sequence, a domino effect would take place. This
domino effect is for one program to set off another program to set off
another program. Soon the Monarch slave’s mind is trying to deal with
dozens of suicide programs running simultaneously, along with perhaps
other programs such as scrambling programs.
For instance, one story line used is the mice run up and down and open
up new levels of programming and are tied to the pendulum/clock
mechanism. The mice can activate the hour glass, and a gold-winged
green skirted fairy Whisper balances the hourglass on her wings. If the
slave goes toward freedom, the slave’s mind triggers programs of all
kinds, and the mind ends up not knowing if it was coming or going with
all the different programs which activate.
A more exhaustive look at all the craziness and activity of the Omega &
Gamma programs which activate to defend the Illuminati’s Mind Control
are given in other chapters. The programming has been designed that if it
was taken out improperly, it is to come back Seven times Seven stronger.
This is also a clue that the programming is partly a demonic
manifestation, cf. MT 12:43-45 et al.
Components Of The Controls
At the center of the System are the mechanisms that control it, such as
the Master Computer, the All-Seeing Eye, the Compass, the Master Clock,
and the Quadrants that tie in together. The System may have 3
hourglasses spinning on axes. These hour glasses can also be called
matrixes, which are on your standard 3 axes, a X axis, a Y axis & a Z axis.
The worlds are various sections of these matrix's.
There are backup worlds & mirror image worlds. Occasionally, there will
be a double system. Some of the more important alter System are even
far more complex than a double System or a double Double System. Each
alter is split so that every alter has another alter created from it.
Then there are demonic doubles--demonic mirror images in the System.
The double images shown in the picture are very real when describing our
System. Some therapists have noticed "Satanic Guardian Angels" which
talk to their patients. They do not know what to make of these. Some
classify them as hallucinations, because they do not have any room in
their belief system for demonology. These are the demons that do
control the multiple’s mind.
Thor, with his huge hammer is a painful demon. Thor’s image is made of
cast iron & carried an iron mallet. Thor is a black strong figure. When his
hammer strikes, the slave gets split brain headaches.
Programmers can use the story of the Giant with the Hammer in the
Ozma of Oz book (pp. 141-155) to give the imagery when programming. A
special series of sweeping motions with both hands will relieve the split
brain programming, but some alters can only tolerate these hand signals
being done by the master. By the way, Thor is an important protector in
Satanic/occult beliefs, & the religion of Thor now has equal
stature/popularity in Germany as the Lutheran church.
The programs are put into a System and given codes. These programs use
Greek, Hebrew and Druidic letters (or other esoteric languages) in their
activation codes. Actually, these alphabets also are the way these people
numbered with, and the Greek, Hebrew & Druid letters were used as
numbers. These programs could be called Utility Programs, because they
function much like the utility programs of a computer.
Along with all the programming comes cover programming. Generally,
front stories cover almost everything in a System. Dominos have been
used in Monarch programming as the basis for what is called a "Mother
Board" in actual computers. Telephone tones key in on a slave’s
computer matrix. At times, telephone tones in everyday life will make
slaves accidently wacky.
All computers run off of base 2--which uses the numbers 0, and 1. 0 and 1
can be represented as on and off. In the programming, they were
represented by "He Loves Me", "He Loves Me Not." The Programmers,
especially Dr. Mengele, enjoyed taking a daisy and pulling its petals off
one at a time. First petal, "I love you". Second Petal, "I love you not." IF
the last daisy petal was "I love you not"--then the child was dramatically
killed in front of other children to be programmed.
The Illuminati’s method of death--skinning alive--has been developed into
a fine art, for both programming and ceremonies. A drawing of this
skinning procedure by a witness is on pg. 338.
The daisy game, which was scary for a child, heightened the victim’s
attention. Matrixes were built upon this deadly game. How did it feel to
be programmed with Mengele’s "I love you, I love you not" programming?
A victim recalls, "The child was placed in a cage exposed and naked. The
low voltage wires were rigged to the metal of the cage. The child
experienced a continual erratic or sporadic prolonged voltage of shock
until the heart would pulsate and the anxiety level of the child became
out of control. "Then the Dr. would enter the scene with his sneering
taunting smile while holding a daisy in his hands. The sporadic voltage
would continue to flow through the child’s body. As the shock continued,
the Dr. stood before the child pulling petals off the daisy. His only
communication was voiced in these words, "LOVE YOU, LOVE YOU NOT,
LOVE YOU, LOVE YOU NOT," while pulling off the daisy petals. This action
would drive the child crazy because the child knows full well if that last
petal is pulled off it meant death.
The child that is not loved is skinned alive before the other children.
"...we can now begin to understand that the expendable children were in
other cages placed all around us for the eye to see. They went through
the same process as we watched. When the last petal of the daisy was
pulled from the flower they were killed. Then the terror of what we had
just experienced through the seeing and hearing, let us know we were
next, but when? By the time the doctor got to "He loves me not" some
children no longer knew fear. Their ashes were taken from the
crematorium and used in the garden for fertilizer, as a reminder to all
what happens to unloved children. "In the clinical room, the lights were
used to program the day’s events. The bright light continually flashed
starting with 7 lights, then six dots, then five dots, then four dots, then
three, then two dots, then 1 dot. In the blindness of the lights, we could
hear the doctor’s voice, "LOVE YOU, LOVE YOU NOT." over and over
again. A child could have a false trust when the lights flashed 7 dots. By
the time one dot was flashing, the child’s terror had once again risen.
The doctor never pulled the last petal off for us, but we can’t forget how
he teased us. He smiled and walked away, ‘NO, I LOVE YOU.’ and walked
away."
If we use L=I love you and N=I love you not we can build the following
matrix for the internal computer:
L N L N L N
1 2 3 4 5 6
2 3 4 5 6 1
3 4 5 6 1 2
4 5 6 1 2 3
5 6 1 2 3 4
6 1 2 3 4 5
This type of configuration can even be tied to color programming, and to
dominoes, where the numbers are represented as the dots on a domino.
By making numbers into dots--the numbers can be represented by lights
in the same patterns of black domino dots. This means that dominos can
be used to program a child, and who would suspect anything about
dominoes?
Another thing that lends itself well to use as a programming code are a
deck of cards. Many slaves have this. It can be tied in with the Alice In
Wonderland story. When cards are used, a section (also called a world or
city) of alters will be given its own computer. To access that computer, a
code consisting of several things including 2 cards can be used.
In review of what Chapter 4 said about codes, often double codes are
employed--what is meant by that is that suppose we have 13 important
alters in a section. They will designate each of these "A" alters. Then they
number them each 1 through 13. But then they will double code them so
that as we count up, we also count down. Then they attach a generic
level number to them, say 2,000. So putting this together we have
Emerald Green 2001-13a for our first alter, then next is Emerald Green
2002-12a, the next is Emerald Green 2003-11a, and so on. Then the
magical name of the alter or the Tribal name of the alter can be
attached onto this to complete an access code.
While it seems perhaps complex at first, all an alter is remembering is a
color, a common section no. and their rank no. and their file letter, and
their magical name. (The name to pull them up--will not be their name
for public use.) Alice In Wonderland, the Wizard of Oz and the Tall Book
of Make Believe played a fundamental role as "software" in a System. The
Wizard of Oz stories are often used to show how & what structures to put
in the small victim’s internal world. The stories even teach HOW to
create an internal world and its parts. Some of the T.V. shows & movies,
which served as Monarch programming scripts (i.e. the software) include:
Batman
Bewitched
Bobby’s World Cartoons (deliberate triggers)
Dameon/Omen movies
Disney movies (all of them, some with deliberate triggers)
Duck Tails Cartoon (deliberate triggers)
ET (used in alien programming)
Fantasy Island (deliberate triggers)
Ghost Busters (used for "who ya’ gonna call" theme)
Love Boat (used for mind control of cruise prostitutes)
My Fair Lady (finishing school for slaves, such as Youngstown, OH)
Star Wars
Steven King Horror Movies
Tiny Toons Cartoons of Steven Spielberg (deliberate triggers)
Wizard of Oz movies
Some of the books which were used as programming scripts, which
haven’t been mentioned yet, are the Dead Sea Scrolls, the Egyptian Book
of the Dead (satanic rituals follow closely the rituals of the Egyptian Book
of the Dead), Steven King novels, & Wilbur Smith’s. The Mother Goose
nursery rhymes were used prolifically for internal codes in slaves.
Now that we have discussed the widely used "software" available to the
programmers, we don’t want to forget the root program, the tree which
was used as a method of organizing the various programs, just like a
computer’s subdirectories branch out more subdirectories. If the
programming is tampered with, the slave will want to cut the tree--
however, since the tree is in them, this means they will want very badly
to cut their arms, especially their veins.
The programming is not guarded as much as the computers. Everything
guards the BEAST computer including deaf alters who have to be
communicated with using a hand number code system. Such a code might
resemble finger signing 1,2,3,4,5,10 = 15 & following this with a
shutdown code which simply reverses the access equation. Surrounding
the central All-seeing-eye will be alters & programs with insanity, fear,
hopelessness, cutting, burning, aloneness, etc. Strong demonic forces are
attached to these alters & programs. They also can trigger the slave to
have abusive behavior as punishment. A System is given a life force which
is able to regenerate a system, the jokers who protected the
programming, and you have the alpha-numeric codes, the cards, and
dominoes (represented by a dice) that formed the access codes to parts
of the System.
The alters will often feel the heartbeat (which may be an alter)
associated with the computer. In the background is a Luciferian blue
light. This Satanic light empowers the Joker. It along with the Joker and
the internal programmers give a System the ability to regenerate itself.
One can shut down internal computers which run programming to the
levels of the System using the same codes that the original programmers
use, but until one also takes care of the 13 Jokers & the faceless white coated programmers who control the Omega Programming, then the back
up computers can regenerate the programming & rebuild the system.
Jokers
If the computers are given cards as access codes--it works in well to
create Jokers who are wild cards within the system, which can imitate
anything. The Jokers have a Luciferian form. Luciferian is the term that
the programmers used. This means that it is spirit. Because the Jokers
are Spirit, they can take any form they need to and they can do what
they want to do, until they are bound & cast out with the rest of their
hierarchy of demons. The Jokers will pop up when a victim tries to study
the codes & programming that direct that victim’s life. Around this cult
core are the jewels (which are the programs the dwarfs mine).
Remember the story of Snow White and the Seven dwarfs? Also swirling
around Silence are ribbons which we will discuss later.
TREES. The trees bud at certain times. This is one way the imagery of the
tree to connect to the time that rituals are to happen. If the tree is
barren of leaves (no programs--i.e. deprogrammed), then the system is to
grow more leaves.
C. Internal Hierarchies
The programmers build chains of command within the groups of alters
that they create. They credit themselves with bringing order out of
chaos. When a system of multiple personalities thinks of rebelling, they
are in the similar situation as a colony wanting freedom from its mother
country.
Can we govern ourselves, and what governing structures can we keep--
since the structure itself is colonial? Can the mind work together to help
itself? The concerns are legitimate questions. And yes, the multiple’s
mind can function outside of the control of the programmer’s hierarchical
arrangement, but not without alters taking on different job assignments.
In the slave’s hierarchical chain of command, adult alters are assigned to
insure that child alters don’t get out, unless the abusers want a child
alter out. Likewise, commander alters are needed to keep the switching
smooth, and to keep things orderly. Subordinate alters are taught to
submit to their king, or governor, or queen alter. Immense power and
indoctrination is given to the key cult alters ruling a system.
The internal hierarchical arrangement means that the host alter coming
into therapy (often a Christian) may not be as completely open as
therapists think. They must play an internal game of going toward health
while not pushing the buttons of deeper more powerful alters. A lot of
internal politics may go on. A front alter may promise a deeper alter
secrecy in order to consult with it. This makes for all kinds of
triangulation and manipulation within the alter system itself. The entire
hierarchy of alters has a lot invested in protecting the core from trauma,
which was why the core was split in the beginning. Trad. therapy goes
after the core & the multiplicity that protects it, thus insuring resistance
from the entire hierarchy incl. front alters, who in MPD systems seeking
help are often close to the core. The core self is best not directly pursued
by the therapist, but gently encouraged on its own to reconnect.
next
The Science Of External Controls
Monitoring (Asset Control)490s
No comments:
Post a Comment