The child that is not loved is skinned alive before the other children. “…we can now begin to understand that the expendable children were in other cages placed all around us for the eye to see. They went through the same process as we watched. When the last petal of the daisy was pulled from the flower they were killed. Then the terror of what we had just experienced through the seeing and hearing, let us know we were next, but when? By the time the doctor got to “He loves me not” some children no longer knew fear. Their ashes were taken from the crematorium and used in the garden for fertilizer, as a reminder to all what happens to unloved children. “In the clinical room, the lights were used to program the day’s events. The bright light continually flashed starting with 7 lights, then six dots, then five dots, then four dots, then three, then two dots, then 1 dot. In the blindness of the lights, we could hear the doctor’s voice, “LOVE YOU, LOVE YOU NOT.” over and over again. A child could have a false trust when the lights flashed 7 dots. By the time one dot was flashing, the child’s terror had once again risen. The doctor never pulled the last petal off for us, but we can’t forget how he teased us. He smiled and walked away, ‘NO, I LOVE YOU.’ and walked away.”
If we use L=I love you and N=I love you not we can build the following matrix for the internal computer:
L N L N L N 1 2 3 4 5 6
2 3 4 5 6 1
3 4 5 6 1 2
4 5 6 1 2 3
5 6 1 2 3 4
6 1 2 3 4 5
This type of configuration can even be tied to color programming, and to dominoes, where the numbers are represented as the dots on a domino. By making numbers into dots–the numbers can be represented by lights in the same patterns of black domino dots. This means that dominos can be used to program a child, and who would suspect anything about dominoes?
Another thing that lends itself well to use as a programming code are a deck of cards. Many slaves have this. It can be tied in with the Alice In Wonderland story. When cards are used, a section (also called a world or city) of alters will be given its own computer. To access that computer, a code consisting of several things including 2 cards can be used.
In review of what Chapter 4 said about codes, often double codes are employed–what is meant by that is that suppose we have 13 important alters in a section. They will designate each of these “A” alters. Then they number them each 1 through 13. But then they will double code them so that as we count up, we also count down. Then they attach a generic level number to them, say 2,000. So putting this together we have Emerald Green 2001-13a for our first alter, then next is Emerald Green 2002-12a, the next is Emerald Green 2003-11a, and so on. Then the magical name of the alter or the Tribal name of the alter can be attached onto this to complete an access code.
While it seems perhaps complex at first, all an alter is remembering is a color, a common section no. and their rank no. and their file letter, and their magical name. (The name to pull them up–will not be their name for public use.) Alice In Wonderland, the Wizard of Oz and the Tall Book of Make Believe played a fundamental role as “software” in a System. The Wizard of Oz stories are often used to show how & what structures to put in the small victim’s internal world. The stories even teach HOW to create an internal world and its parts. Some of the T.V. shows & movies, which served as Monarch programming scripts (the software) include:
- Bobby’s World Cartoons (deliberate triggers)
- Dameon/Omen movies
- Disney movies (all of them, some with deliberate triggers)
- Duck Tails Cartoon (deliberate triggers)
- ET (used in alien programming)
- Fantasy Island (deliberate triggers)
- Ghost Busters (used for “who ya’ gonna call” theme)
- Love Boat (used for mind control of cruise prostitutes)
- My Fair Lady (finishing school for slaves, such as Youngstown, OH)
- Star Wars
- Steven King Horror Movies
- Tiny Toons Cartoons of Steven Speilberg (deliberate triggers)
- Wizard of Oz movies
Some of the books which were used as programming scripts, which haven’t been mentioned yet, are the Dead Sea Scrolls, the Egyptian Book of the Dead (satanic rituals follow closely the rituals of the Egyptian Book of the Dead), Steven King novels, & Wilbur Smith’s. The Mother Goose nursery rhymes were used prolifically for internal codes in slaves.
Now that we have discussed the widely used “soft ware” available to the programmers, we don’t want to forget the root program, the tree which was used as a method of organizing the various programs, just like a computer’s subdirectories branch out more subdirectories. If the programming is tampered with, the slave will want to cut the tree–however, since the tree is in them, this means they will want very badly to cut their arms, especially their veins.
The programming is not guarded as much as the computers. Everything guards the BEAST computer including deaf alters who have to be communicated with using a hand number code system. Such a code might resemble finger signing 1,2,3,4,5,10 = 15 & following this with a shutdown code which simply reverses the access equation. Surrounding the central All-seeing-eye will be alters & programs with insanity, fear, hopelessness, cutting, burning, aloneness, etc. Strong demonic forces are attached to these alters & programs. They also can trigger the slave to have abusive behavior as punishment. A System is given a life force which is able to regenerate a system, the jokers who protected the programming, and you have the alpha-numeric codes, the cards, and dominoes (represented by a dice) that formed the access codes to parts of the System.
The alters will often feel the heartbeat (which may be an alter) associated with the computer. In the background is a Luciferian blue light. This Satanic light empowers the Joker. It along with the Joker and the internal programmers give a System the ability to regenerate itself. One can shut down internal computers which run programming to the levels of the System using the same codes that the original programmers use, but until one also takes care of the 13 Jokers & the faceless white-coated programmers who control the Omega Programming, then the back up computers can regenerate the programming & rebuild the system.
If the computers are given cards as access codes–it works in well to create Jokers who are wild cards within the system, which can imitate anything. The Jokers have a Luciferian form. Luciferian is the term that the programmers used. This means that it is spirit. Because the Jokers are Spirit, they can take any form they need to and they can do what they want to do, until they are bound & cast out with the rest of their hierarchy of demons. The Jokers will pop up when a victim tries to study the codes & programming that direct that victim’s life. Around this cult core are the jewels (which are the programs the dwarfs mine). Remember the story of Snow White and the Seven dwarfs? Also swirling around Silence are ribbons which we will discuss later.
TREES. The trees bud at certain times. This is one way the imagery of the tree to connect to the time that rituals are to happen. If the tree is barren of leaves (no programs–i.e. deprogrammed), then the system is to grow more leaves.
The programmers build chains of command within the groups of alters that they create. They credit themselves with bringing order out of chaos. When a system of multiple personalities thinks of rebelling, they are in the similar situation as a colony wanting freedom from its mother country.
Can we govern ourselves, and what governing structures can we keep–since the structure itself is colonial? Can the mind work together to help itself? The concerns are legitimate questions. And yes, the multiple’s mind can function outside of the control of the programmer’s hierarchial arrangement, but not without alters taking on different job assignments. In the slave’s hierarchal chain of command, adult alters are assigned to insure that child alters don’t get out, unless the abusers want a child alter out. Likewise, commander alters are needed to keep the switching smooth, and to keep things orderly. Subordinate alters are taught to submit to their king, or governor, or queen alter. Immense power and indoctrination is given to the key cult alters ruling a system.
The internal hierarchial arrangement means that the host alter coming into therapy (often a Christian) may not be as completely open as therapists think. They must play an internal game of going toward health while not pushing the buttons of deeper more powerful alters. A lot of internal politics may go on. A front alter may promise a deeper alter secrecy in order to consult with it. This makes for all kinds of triangulation and manipulation within the alter system itself. The entire hierarchy of alters has a lot invested in protecting the core from trauma, which was why the core was split in the beginning. Trad. therapy goes after the core & the multiplicity that protects it, thus insuring resistance from the entire hierarchy incl. front alters, who in MPD systems seeking help are often close to the core. The core self is best not directly pursued by the therapist, but gently encouraged on its own to reconnect.
The Art of Stunning as Used For Mind Control Programming Purposes
The Science Of External Controls Monitoring (Asset Control)
Every intelligence service since time began has sought methods of owning people and ensuring they stayed loyal. Two of 13 Illuminati families who are known to have developed extremely well-run bloodline intelligence groups are the Li family and the Rothschild family. The Li’s family started its Chinese intelligence back in 1400 A.D. They had already been an ancient chinese aristocratic family for many centuries prior to this. Some of their techniques for their agents were state of the art mind control techniques. The Rothschild’s personal spy network and their own mail service was known to be superior to the national european governments during the 19th century. Traditional spycraft has involved the ability to recruit and keep agents loyal. The professional spook manipulates his recruits for a living. He becomes adept at controlling people.
For thousands of years, spy operations have honed their skills at controlling people. Because they work secretly, they generally have done whatever they wanted. When you combine the resources and centuries of intelligence operations of the Illuminati, along with the credibility of government intelligence agencies supposedly guarding our national security, the combination is horrific. There are no moral or financial restraints on what is being done. If the intelligence groups want to dabble in keeping a severed head alive apart from the body, (or a frozen body with an active head) which they have done, there is no one to stop them. Handlers of slaves use both natural and contrived cues to convey to the slave that they want obedience.
A natural non-verbal threat cue would be brusque movements, and an innuendo in their voice. A contrived cue would be placing both hands behind the head, which is a code for “I AM YOUR MASTER, OBEY ME.” Another cue for slaves to obey is when the master makes a fist with his right hand and touches his forehead. This means, “OBEY.” Even children, who were multiples, who were being taught to control their mother who wanted to leave the cult, have been observed using the fist to the forehead to try to get obedience from their mother. Staring is one method that the Programmers use. Charles Manson, who was both a slave and a handler, is an example of how a penetrating hypnotic stare is used by the Programmers.
One way to control people is to wear clothes of authority. Dr. Green, Dr. Black, Dr. Star, Michael Aquino and other programmers have worn Nazi uniforms while programming, and at other time have worn Satanic Priestly garb.
For instance, if a Monarch slave’s day to day alters want ego-gratification, a creative outlet, and reassurance of worth, the Illuminati may promise the slave that if the alters comply they will give them a singing contract in Las Vegas. If they need to appeal to their emotional security–they can promise a big salary and a nice house. If they need to appeal to immortality they can promise to award them a star on Hollywood Boulevard or whatever religious immortality they can credibly offer.
Learning to listen without interrupting is a guarantee of success. CIA handlers/ programmers have an extremely personable side to them–and a very deadly animalistic side to them too. They will be trained to look anyone they want to recruit in the eyes and withstand their stare.
“Friendship begins with a smile; recruitment with a stare.” (This is a quote from the book Suvorov, Viktor. Inside The Aquarium. New York: Macmillan, p. 108.
During training, men in U.S. Army Intelligence are told to read this book to understand how U.S. intelligence works.) The entire lives of Monarch slaves are kept on records. Zbigniew Brezinski, and the heads of the CIA, and Sec. of Defense Cheney are just some of the men known about who have access to the computer records that contain records on every active Monarch slave.
Not everyone has a price, but everyone will respond to their needs being met. James K. Van Fleet, an important military intelligence officer, wrote about how to manage people. In military intelligence, they keep files on people where they identify which subconscious desires of people are important to the person at the time.
All this information is kept in SOFT FILES–which are not official files, so these files have never officially existed and are not given up even to Congressional subpoenas. The Intelligence agencies know that if they find out what the person wants above all else in life, they can control the person. The nine areas that are monitored to see if they are important at the moment are:
- emotional security
- recognition of efforts or reassurance of worth
- creative outlets
- a sense of personal power
- a sense of roots–belonging somewhere
- love in all its forms
- new experiences
Once they monitor these areas and then they determine which needs are priority needs for the person, then they will use what they call “the depth approach” to subconsciously gratify those needs in a way that they gain control over the person. Modern companies are doing this too. Dough mix isn’t sold, but making a family memory with the children is. Soap isn’t sold to get dishes clean–but rather soft beautiful hands are sold. Cosmetic companies don’t sell an item–they sell you hope or an image. Fruit dealers don’t sell fruit, they sell health and vitality. Car dealers don’t sell cars, they sell prestige and images. Freezers aren’t sold, emotional security from having a full freezer is sold. They have learned to genuinely appeal to the 9 subconscious desires.
«- Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 | View All | Next -»