Deeper Insights into the Illuminati Formula



Yüklə 0,58 Mb.
səhifə30/45
tarix08.08.2018
ölçüsü0,58 Mb.
#61755
1   ...   26   27   28   29   30   31   32   33   ...   45

When a slave is programmed with multiple functioning sub-systems (aka "systems"), the Illuminati call it MULTIPLEX. In such as case, types and names of alters may be duplicated in systems that are mirror images of each other or of a similar design. Traver reports that one MULTIPLEX system had 55 Daves per sub-system with 7 subsystems, making a total of 385 Dave alters for the 7 subsystems in just one particular slave. (see Traver, Dan. Dissociative Disorders & Mind Control, p. 84) The construction of an Illuminati system can not be divorced from the demonology and rituals that are performed throughout the life of the system. The Illuminati use mystical terms when programming, which reframes psychological processes in the language of magic. Programming and hypnosis are referred during programming as "SPELLS". The programmers will use fictional magical names for items, for instance, the subconscious mind may be referred to as the "HYPNOGOURD, A VINE THAT GROWS GOURDS." Creativity and imagination will be termed "MAGIC", and the programmer "A MAGICIAN". The programmer would instruct his assistant in language like this, "WOULD YOU PUT THIS GAP FORGET SPELL IN?" The Generational Spirit (or Spirits from each occult bloodline) is laid into the child in the womb. It stays hidden deeply in the system, and plays a fundamental role in the system’s creation empowering other demonic forces. In order to construct the trees that provide the structure for the internal worlds-programming, the Illuminati programmer will tell the victim the following hypnotic ritual:

"AS YOU BREATHE, REMEMBER TO SIT ERECT, AND AS YOUR SPINE STRAIGHTENS, FEEL THE ENERGY RISING [PAUSE] NOW IMAGINE YOUR SPINE IS THE TRUNK OF A TREE, AND FROM ITS BASE ROOTS REACH DOWN DEEP INTO THE EARTH. [PAUSE] INTO THE CENTER OF THE EARTH HERSELF [PAUSE] AND YOU CAN DRAW UP

POWER FROM THE EARTH, WITH EACH BREATH [SHORT PAUSE] FEEL THE ENERGY RISING, LIKE SAP RISING THROUGH A TREE TRUNK, AND FEEL THE POWER RISE UP YOUR SPINE, FEEL YOURSELF BECOMING MORE ALIVE, WITH EACH BREATH, AND FROM THE CROWN OF YOUR HEAD, YOU HAVE BRANCHES, THAT SWEEP UP AND BACK DOWN TO TOUCH THE EARTH [PAUSE] AND FEEL THE POWER BURST FROM THE CROWN OF YOUR HEAD, AND FEEL IT SWEEP THROUGH THE BRANCHES UNTIL IT TOUCHES THE EARTH AGAIN, MAKING A CIRCLE, MAKING A CIRCUIT, RETURNING TO ITS SOURCE."

The part of the system that will function within the Illuminati hierarchy will all be intimately part of either the SPIRIT TREE (that is the Caballistic Tree of Life) or the TREE OF EVIL (which is the evil mirror

image of the Tree of Life). Both trees were discussed in the Vol. 2 Formula book. These trees are both totally connected to the Spirit of the AntiChrist and rooted in Lilith and Tubal-cain. The Moon child ritual is not only performed when the child is still a fetus, but also at age 3, 4, 5, 6, and 16. When the Illuminati child is in their teens they do the Caballistic Tree of Life pathworking. The pathworking rituals are severe, and many splits of the mind will occur due to these rituals. All the alters created during this work will be arranged at the GATEWAYS that pertain to that particular ritual. Therapists who do not realize how the pathworking of the 22 paths develops entire sections of deeper alters, may incorrectly think they can simply toss out the caballistic Tree of Life from the victim. Countless deeper alters are part of this tree. It has been said in the Illuminati that in general an Illuminati system consists of "the father (core), the son (the programming), the holy spirit (the spirit Tree

Page 193 ...

also called the Tree of Life)."

DATA ENTRY POINTS

The programmers have designed their systems so that one can only get into the Systems via a SEQUENCE. However, sometimes they themselves want to quickly down load information into the computer-like mind of their slaves, and they don’t want to have to go through a sequencing procedure. For quick and sloppy downloading of information to their slave or quick deletions to the programming (there is only limited access to quick deletions), programmers put DATA ENTRY POINTS into most systems. This allows for an emergency entry and/or downloading. General codes most often open these points, rather than long specific codes. The trick is being able to know where those DATA ENTRY POINTS are on the person’s alter grid or as the programmers say the slave’s SCREEN. (With the advent of lap-top computers, what the master of the slave sees if he has to refer to his own reference notes is just that a screen with the system’s layout. (Vol.2 pg. 88 gave a sample of how a page on the lap top computer or in a master’s black or grey 3-ring binder would look like.) An example of a data-entry point would be a gatekeeper which has learned the entire system via trained LSD trips and then has been programmed to keep this understanding on a subconscious level.

TESTING ALTERS TO SEE IF THEY CAN BE USED.

When a trauma is carried out upon a child, the child is then debriefed and all the splits from the trauma identified. Generally only the first 10 splits will be used to create alters, and the rest of the splits will become special purpose fragments. The programmers begin with the first split and identify how strong the split is. The programmers test for four things:

a. how well can this split take a hypnotic suggestion?

b. how creative is this split?

c. Can this split hold memory?

d. Can this split hold the structuring that will given it?

If the split passes positive on these four criteria, then it will be used to make a full blown alter. The programmers move down the line, testing the splits in the sequence that they were created. If no. 4 split is unable to pass the 4 criteria, then they know that the rest of the top splits will also have to be "thrown away" and used as special purpose fragments. If they need 12 splits from an alter, and they only get 5 usable splits from the first torture, they will retorture the alter to get more first splits. They will continue the process until they get the splits they need. Usually they can use the first 10 splits. Seldom do they use anything beyond the first 10 splits for alters, they are just to weak mentally. If an alter shows extra promise the programmer may say, "This part was going to be a bit part, but we’ll make her into a real character." If a special purpose fragment leans in a needed direction mentally, they may take what was to be a minor part, and develop it into an interesting alter. Alters that are waiting to be used are stored as gems that the dwarfs mine, and then the programmers program them. An Illuminati system has thousands of these clean slates. Diamonds are preprogrammed alters that are stored to be used in the end-times during the reign of the Anti-Christ.

THE SCRIPTS.

Each master programmer is responsible for the scripts that he uses. He will invoke the leading geographic spirits, and even Lucifer to gain up-to-date wisdom on what is best for that time at that location. A master programmer will get assistance from his Mother of Darkness or Grande Dame. The master programmer may use a written script of his own such as Michael Aquino uses his own version of Star Wars, or he may borrow from established sources, for instance, Dr. Star of Corpus Christi, TX, who uses the The Goetia The Lesser Key of Solomon the King (Clavicula Salomonis Regis). Dr. Star especially uses the Shemhamphorash, which is the first part of

Page 194 ...

that ancient magical book. Recently Avon books (which has been owned by Hearst Illuminati family, and which has published over 30 editions of the Satanic Bible) published a book by Piers Anthony entitled Visual Guide to Xanth. This amazing book Visual Guide to Xanth is based on Anthony’s Xanth series. It contains so many programming scripts, that it is hard to imagine that Anthony is not a programmer. The scripts are too intact for it to be coincidence. The title page has a hoofed tailed Satan on his throne. It is popular among satanists to use X words, like Michael Aquino signs off his personal letters "Xeper", rather than "sincerely". Anthony was born in Britian but now lives in Florida. He has had over 60 fiction books published, many of the early ones were very well promoted by the Illuminati, and became top best sellers. The back cover advertizes this Visual Guide to Xanth this way, "Learn about the astonishing hierarchy--and lowerarchy--of sorcerers and shape-changers, of goblins, harpies and half-humans who inhabit this extraodinary universe! [internal worlds] Explore the perilous Ogre-fen-ogre-Fen and the inner chambers of the mysterious Castle Roogna! Revel in the history and culture of the most remarkable civilization this side of Ozz!"

The co-authors would have to agree that Piers Anthony’s story telling ability rivals, if not surpasses Baum’s Oz series. In fact Anthony has put out numerous series of books, not just one series like Baum. The Xanth series is the one that contains more of the programming scripts. For instance, a script would be used to get suicide alters to want to take drugs & champagne on an empty stomach, or to get into a bathtub of water & throw in an electric blow drier which is on.

Assassination Models (Delta Models).

A great deal was explained in the Vol. 2 book about Delta alters, Delta models, Delta teams, and Delta Forces. All of these are involved with killing humans. It is not the purpose of this section to cover what has already been written in the Vol. 2 Formula book on these various Deltas. Mind-controlled Amphibious men, (genetically altered Navy Seals--see Vol. 2 p. 26 1-262, the latter no. is a significant no. for these programmed men) are the Navy’s attempt to get something similar to what is depicted on the film Universal Solders. These Navy Seals are not allowed to be touched by other sailors when they are on a ship. There is still a number of deeper insights that can be provided to understand how assassin personalities are conditioned to be able to kill. Researchers in how the brain functions have found that our forebrains (the thinking part that makes us humans) shut down when we are angry or frightened and the midbrain (which resembles the brain of animals) takes over. The only programming that works for the midbrain is the same type of training that works for dogs, which is classical and operant conditioning. This type of conditioning is simply stimulus-response, such as IF fire bell--THEN walk the fire escape exit plan. When it comes to killing, the forebrain will listen to many suggestions such as orders from a gang leaders, an officer, or the pressures of life when they demand that a person kill, but the midbrain has the instinct that is born into 98% of the population NOT to kill another human. This innate human resistance to killing is far stronger than has popularly been realized, and has historically stopped most people from killing. This may surprise most readers, because Hollywood movies would lead us to think otherwise. A number of top researchers, including Lt. Col. Dave Grossman, author of the excellent book On Killing, have uncovered irrefutable (albeit still controversial) proof that historically most soldiers have secretly refused to kill in battle. Grossman was a Military Psychology professor at West Point, as well as

Page 195 ...

having a long list of other military credentials. His suberb book On Killing gives numerous reasons (proofs and evidences) that numerous soldiers have typically only pretended to try to kill the enemy. Many fired over the heads or only pretended to fire their weapons, if even that. During W.W. II, Brig. Gen. S.L.A. Marshall discovered that only 15 to 20 % of men on the front line would actually use their weapons against the Germans even during action over several days. 75% of the American soldiers would not even fire at the enemy to save their own lives. He made some suggestions on how to improve this dismal firing rate. By operant conditioning the U.S. military took those dismal firing rates to 55% in the Korean War and to a 95% firing rate in the Vietnam War. What are behavior modification techniques that turn teenagers into reliable killing machines? These conditioning and psychological tricks are the same methods that are used on the Delta alters and the Delta systems of Total Mind-controlled slaves, and we will discuss those next. The factors that are weighed as an equation in the human mind to determine whether a human will kill another human are as follows:

· What is the benefit of the kill?

· How do recent experiences relate to the victim?

· How much physical, cultural, moral, social and mechanical DISTANCE is between the killer and the target.? The more distance the easier it gets.

· How intense is the demand from some authority to kill, and legitimate is this authority? If the killer respects the authority that is asking for him to kill, and is in close proximity of that authority he will likely obey that authority.

· Are there a group dynamic working, and if so what is the power and legitimacy of this

group to absolve the killer from guilt?

· Are there any stumbling blocks from unresolved guilt from previous killings?

· What is the temperament of the potential killer?

AUTHORITY FACTORS ARE MAXIMIZED

In the programming, the programmer can set himself up as God, or a god. The programmer may also be a satanic cult leader which further increases the victim’s regard for his power and authority. The programmers of total mind-controlled slaves have tremendous potential to cause their assassin alters to overcome any resistance to kill.

ACCOUNTABILITY & ANONYMITY

A Delta Model with many multiple alters incorporates a built in ability to remove personal accountability. If need be, the person can split off a new personality to perform a particularly odious job. The alters form a peer group which works just like a military unit to inhibit the natural reluctance to kill. This is because the closer a group of persons is, and the closer bonded, the more powerful the enabling. When military units lose 50% or more, the men often lose the will to continue killing, because the group dynamic fizzles out. The programmers who program in the programming, and then later the programmers who program in specific killing missions, have worked long hours insuring that the assassin alters feel morally distant (superior), and socially distant. The victim is made out to be an inferior being who deserves to be punished and killed. The killer will be doing a great service to his fellow man and country to kill the "target". It may be refrained as if it is a holy mission, almost a crusade. Often times the "target" is not even spoken about in human terms. Perhaps the target is hypnotically portrayed as an ant, a bug, or some wild beast, or simply a target. Hitler helped his military to kill by labelling non-Germans as Untermensch (subhumans). The Americans called the communist Vietnamese "gooks", and they in turn called Americans "monkeys". Because the mind-controlled assassin will not see the face

Page 196 ...

of their victim due to hypnotic programming, they are also limited in seeing the humanness of their victims. Most of the missions for Delta slaves allow them to kill without the threat of being killed. But the Programmer may put the fear of being killed into the slave. They may hypnotically see some object of victim as a threat. One killer (due to programming) saw the men she killed as having a big penis that would hurt her, so her instinct to survive would kick in to help her assassinate these men. Practice in given to assassins with situations similar to actual hand-to-hand killings to desensitize them to close range killing. With mind-controlled slaves usually actual live victims are used to get the slaves totally desensitized to killing. Because assassin parts are stripped of conscious thinking and empathy they are handicapped to really think about what they are doing to another human when they kill. Still the intelligence agencies and the Illuminati know that somehow the brain still can latch onto guilt--somehow the brain still can perceive in some dim way that it is guilty of killing another human, so they cover their tracks by warrior cleansing rituals. Warriors and soldiers have traditionally done cleansing rituals when they finish a war. An example of a cleansing ritual would be a parade at the end of the war, where the country turns out to tell the soldiers what a great job they did. A programmed assassin in many cases can not receive a parade, but he can be given lots of praise for having done a great job for humanity, or his country, or whatever ideal the Programmer uses as a rationale.

Clock-Time Programming. The victim may see their head as a clock and may be tortured in such a fashion. Twelve o’clock is straight up between the eyes. Six o’clock is straight below the chin.

Monkey Alters.

The creation of animal alters has been covered in previous locations in this book and Vol. 2. However, I felt Lynne Moss-Sharmon’s description of Monkey programming was worth including here. Lynne is a victim of mind control living at Halifax, Nova Scotia. In her description of the memory that goes to her drawing no. 29 she quotes what was said during the cages, "You stupid monkey. Into your cage. Hit her and put her back in her cage. Lights on. Monkey time. Monkey business."

Plant alters.

In the older models, they used plants and fruit, but in some of the newer models it appears that they are using samphires (combination beast-plant creatures) and hamadryads (man-plant creatures). Magic from underground springs is the cover story for how these plant-animal hybreds are made.

Presidential Models.

Include both children and adults. They carry NWO messages to world leaders. They often have passports with accordion additions stapled in, because they do so much travelling overseas. Presidential models are kept in numerous locations. If high level individuals need to slip away for nefarious use of slaves, they employ look-alikes to stand in for them, while they do their dirty activities. This is why Presidents such as Clinton and Bush got away with sexually using far more slaves than their schedule seems to indicate. Bush was a pedophile, while his double (who has recently lived in France) was a womanizer.

Prostitute Models.

Slaves designed to function as prostitutes must receive training to protect themselves. One possible problem might be a female prostitute who is accosted by an aggressive male, when she is not to allow herself to be used by him. She can be trained to jump up slap the man on the face, warn him that she kick his testicles next time, and then

Page 197 ...

kiss the man in a submissive makeup fashion to smooth his bruised ego. A prostitute slave will also receive code words to let people, say people in a casino, know who she is. Deeper prostitute parts which need to perform sex for long periods of time accomplish this for their masters by switching alters and by ingesting speed. The mechanical nature that sexual alters have is illustrated by the "I CAN WALK, I CAN TALK" phrases of alters with doll programming.

Psychic models.

Both men and women slaves were created to carry out various psychic functions. For instance, the AntiChrist needs to be able to look at people and totally understand them psychologically and their systems of mind-control (alter systems, programming etc.). The abilities to successfully perform psychic functions have been tested for years before they were created within the AntiChrist.

Reporting Alters.

The construction of reporting alters is very straightforward behavior modification. For programming reporting alters, they use purpose fragment splits. In other words, these reporting alters are not given the full range and exposure to life, but they experience life from the vantage of their single purpose. Some therapists are reporting that they are converting reporting alters over by giving them ice cream. They are most likely only dealing with fronts. Since most therapists only deal with front alters, and front systems, these front reporting alters may even be set up so that these therapists think they have converted the reporting alters. The truth is that most of these reporting alters are fragments that don’t know what hunger is. All the ice cream in the world is going to mean anything to them. (Cisco will deal with these issues in her part of this book.) The point is simply, these are special purpose fragments who only see life from the vantage point of their little job. Now we will explain what first and second stage reporting alters are, and then how they are created. Some of the first stage reporting alters are trained to respond to 3-taps, some to telephone calls, lights, and some to codes. The first stage alters are children from 6 to 10. In an Illuminati system there will be families of reporting alters. Every level ("section") will have at least one group (family) of reporting alters. The second stage reporting alters are also children from 6 to 10, and they are taught to want Daddy’s or Mommy’s love. Girl systems seek "Daddy" (the Master) and boy systems often seek "Mommy" (the Master). They are taught to talk about therapy issues, programming issues, and movements by the system. They are linked to the computers, and the eye of the computer. Just to hear "Daddy’s voice" is gratification to them. At stage 1 of the creation of reporting alters, they are the result of the sensory deprivation tank, and are taken from the dissociated part of the mind that feels like it doesn’t have a body, or that it is nothing. Stage 1 Reporting-special-purpose fragments of the mind are painfully shocked in some sensory deprivation environment when the hear 3 taps. The pain ceases when they open the door. They continue to be locked in place in the mind and painfully shocked until they learn the lesson, which is that the pain stops when the door is opened. Over and over they are taught, THE PAIN STOPS WHEN THE DOOR IS OPENED. When they hear tapping they want the pain to stop (probably they abreact their previous tortures) and they open the door to stop the pain. They have only one job, stop the pain by opening the door when three taps (or whatever other trigger/code/signal they are programmed for.) Stage 2 Reporting-special-purpose alters are given a fuller view of life. They are the watchers in the system. They were created under such horrible torture that they left the body and hover over the body. These are Out-

Page 198 ...

of-Body alters. They are also placed in a fogged room, where they are taught to become one with the fog. They are also told ghost stories like Casper the Ghost. Through the combination of all these programming tactics and techniques, they learn to be invisible. They hover over their assigned position in the system, invisible to all the other alters of that section. These alters have excellent rapid recall. They have none of the Straw Man programming that Gatekeeper receive to make them think they are stupid. To reinforce the programming, the reporting alters are always treated kindly when they obey. (If you get one that hasn’t been, suspect a plant, a setup.) Internal protector alters are given the job to insure that reporting alters never miss a call, or never miss responding to a cue. They will go to work and punish lax Stage 1 alters. Again, several therapists claim to have gotten reporting alters to defect from their jobs, but haven’t dealt with their protector alters who are taskmasters. If the taskmasters haven’t been dealt with, then suspect a ruse to get the therapist to think all is well. The reason this subject is dealt with here, is that some of the top well known therapists have spread information contrary to what is actually happening. That doesn’t mean that there may not be an exception to the rule, but the Illuminati is not so stupid as to make reporting alters that defect because someone offered them an ice-cream cone.

Reporting alters are very hard to convert, because during their lifetime they are treated nicely. They experience a nice life if they behave (its the other alters that suffer.) The Stage 1 reporting alter merely says


Yüklə 0,58 Mb.

Dostları ilə paylaş:
1   ...   26   27   28   29   30   31   32   33   ...   45




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©genderi.org 2024
rəhbərliyinə müraciət

    Ana səhifə