Deeper Insights into the Illuminati Formula



Yüklə 0,58 Mb.
səhifə40/45
tarix08.08.2018
ölçüsü0,58 Mb.
#61755
1   ...   37   38   39   40   41   42   43   44   45

To fully understand what the computers are, we must understand the mind-set of the programmers. The programmers are looking to Lucifer for their inspiration. An imitation of God’s Book of Life for people, is for Lucifer to construct an internal computer that will contain all the history of all the alters. It might be helpful if some items that were in the illustrated Guidebook and in the Vol. 2 book were briefly touched upon again, as we discuss how the internal computers are made. Remember, that a computer is placed one per layer (section) and that they also build in back up computers, and that the computers have coded memories stored in them, as well as coded programs. The deepest computer is called the Beast computer, and it has an eye (the all-seeing-eye) that opens and shuts like a camera lens. It can go behind the veil, and this is in mockery of the rent veil of the Holy of Holies. When the internal computers are built, the Illuminati use a doll house with different colored rooms for the child to visualize what is being done. Each room in the dollhouse has a different color. Each family of alters (a group of alters that are on the grid together) has the exact same color code. In the Vol. 2 book, we showed the color coding differently--we showed the color coding running diagonally across the grid, it can be done in any fashion, but generally the color code for a single family (alters a-through-in on the chart) is the same, and the cover program to hide it is that the colors run diagonally. What that means is that an entire family of alters, say alters Mary 1 through Mary 13 will all be connected by a color

Page 271 ...

ribbon alter (who works just for them) back to that same color of computer room. All the family get the same programming, although they hold separate memories. This will help therapists understand the behavior & programming patterns of various alters. The Beta and Delta alters, who as the readers realizes live in entirely a deep trance imaginary life, have entirely negative programming in their computer section. The Betas and Deltas have two ribbons per alter, which is an exception to the rule. This is so they can function together--espionage, seduction, and assassination all go together. Another type of alter who gets two ribbons are the 13th alters which connect two levels. These poor alters have so much programming going off, and mixed signals, that they are real basket cases. When a system is seen in its entirety, the more powerful system hierarchy and illuminati hierarchy alters will be coded with Platinum, Gold, White, Purple, Bronze & Silver. Front alters who will be helpful will be coded pink and yellow. Orange alters will be perceived as helping alters, but they are actually guards, protectors, and they protect sections of the system below them, which they usually can’t see, and often don’t know that they guard. Alters coded brown, tan, grey, or clear will give the therapist & support team fits, because they are full of deceptions & cover programs, and illusions. Host alters or key front alters may have a clear or white diamond as their gemstone. Alters who cover things up may have obsidian as their gemstone. Other alters who play along with the programming may have such gemstones as Fire Opal, Topaz, and Turquoise. (Also see Vol. 2 , p. 328-29.)

Front Programs of Front Computer.

The front computer that is linked to the front section will be different than the deeper computers. It’s big difference is that its programs (which are linked to all the front alters) are logical. The logical programs of this level provide the alters with logical reasons and excuses to believe the lies, and to reason their life out. Of course they draw false conclusions from good logic using faulty information.

Misinformation Computers.

Misinformation computers are laid in on the 3, 6, 9 and 12 levels. Thousands of demons are placed into the Misinformation computers to not only run them, but to dispense misinformation. Since the demons are not under drugs or hypnosis, they are under full awareness and are very crafty in their deceptions. When memories are too clean and too complete, the therapist should suspect that they are getting a demonic false memory. Bear in mind the child is in a drugged state during much of the programming and has blurry eyes and may have their eyes rolling in the back of their head. They have their short term memories splintered by electro-shock, and are fed lies about their memories via hypnosis. Real memories are in bad shape when retrieved. (This is why some persons apply "hypnotic correction programs" to restore the memories back closer to the original event, such as reversing the hypnotic air-brushing/blurring of faces that was programmed into deeper alters. The mind put in the distortion program and seems in some cases to be able to reverse the distortion program.)

Beast Computer.

End time names such as Gog, etc. are believed to be given to some of the computers within recent years, to represent the names of the 10 countries that will make up the global government of the New World Order. For years the computers have been called "Beast" computers with the big important Beast computer laid in at the bottom of the mind in the hell pit. Remember that the core is at the bottom of the mind below the hell pit--but she is almost always never connected to the Beast computer. This is because the core receives very little programming. The core is told she is

Page 272 ...

sleeping beauty and that her father Lucifer, who she is married to, will someday return for her and wake her up. Lucifer wanted the purest virgin bride he could get, so he marries as his top bride within the system the innocent core. The core is told she belongs to Lucifer. The core is protected by the false trinity in the pyramid and the Grand Druid Council. The core is linked to the Grand Druid Council, but not the carousel. In the VoL 2 book, we reported the cover program, which is that the core is in the carousel. If therapists want to take out computers they need to take them out from the first computer that was laid in, the Beast computer (at the bottom of the mind), and take them out in the sequence they were put in.

Programmer Access to the Computer Areas.

When the external programmer wants to put information into the computer he opens up the various "rooms" (areas or programs so to speak) and then the internal programmers take over. The story line used to build in access to the computer is the King’s Chamber story in Alice In Wonderland. The king comes to the chamber and he has the right to make 3 wishes (the 3-part access code). If he doesn’t make 3 wishes, everything disappears like in the Alice In Wonderland story. 3-part access codes are usually DATE, COLOR, ALPHA-NUMERIC CODE. But they could be three objects within the room, or they could be a sound, a touch, and a third-sight signal. Generally, the Illuminati have used the actual date that an alter (a part) or a family of alters was created as the actual code for that chamber of the computer. That chamber will then be linked to all the alters of that family. So lets say a family of alters was created on 4-30-64. This would normally be written on the charts as 43064 or because the Illuminati often work with things backward, some programmers will write it 46034. Which ever method, forward or backwards, will then be used consistently as the first part of the access to that family’s computer chamber.

There are 26 rooms in the dollhouse, or in other words, 13 families of alters on a grid with 13 mirror images to mirror those 13. This was very standard for years. When the programmer places the information in it is put on a mental imaginary "computer disk" or in the older models "spools". The reader needs to remember back to the hypnotic surgery that we discussed in the Illustrated Guidebook and the Vol. 2 book, to remember that the victim has their insides hypnotically removed and the spools or computer disks placed inside of them. Let’s say a therapist touches one of the misinformation computers, which are the most assessable. These computers will then activate mirror images and lots of demonic activity. The therapist may end up integrating demons, and working with constructs and mirror images, and the proper excitement by the real alters is even programmed in. These are what may be termed "FALSE HOPE PROGRAMS". The system will rest and relax and the therapist will declare everything finished. (For years, the two authors have tried to explain this, but it seems to be a hard subject for therapists to understand.) Finally, a very important warning, tampering with the computers is serious business, from the co-authors experience in working with therapists, we strongly advise them not to tamper with the computers, because the self-destruct programs are so strong. The self-destruct programs will turn the person into a vegetable, or into pure insanity if the victim survives the suicide programs. The skill level among the therapeutic community is not yet at the level needed to tamper with the computers, but we hope with the publication of this book and with more experience that that will someday become a reality. This author, Fritz, is aware of therapists that have tried to tamper with the computers, but the programming has beaten both them and this author. For instance, it took lots of work to discover that this author’s week of work with a front computer actually was only

Page 273 ...

playing with a misinformation computer and its

FALSE HOPE PROGRAMS.

C. INTERNAL HIERARCHIES

OVERVIEW.The internal structuring of alter systems are built with alters being arranged in hierarchies. Often the hierarchal arrangement is a mirror of the group carrying out the programming. The CIA and other intelligence groups use SECTIONS. You will find the grids of alters arranged in SECTIONS. The Illuminati have a Grand Druid Council and other councils, which will be mirrored within the system. Alter families will be set up as mini-covens within the system, often with 13 to an alter families. HUBS will be created in reflection of how Satanic groups are organized into hubs.

THE INTERNAL HIERARCHIES form RATIONALES

Some of the structures within the programmed alters reflect the philosophies of the ancient occult world. The structures are buttressed by the occult beliefs that are connected to them. Cisco, who has helped me co-author two books on mind-control, pointed out how the ancient world had a god which could only be adored by one family. Each city had its own gods, and religion was tied to the family and the city units. This was the Religion of the Hearth, as some have called it. The Roman Gens was an extension of this, the Gens were political associations of several families who collected into a religious union, as the Illuminati families have done. When we see how the ancient religious customs were, we see how the internal Illuminati structuring parallels this thinking. Each internal city or world is assigned a god (demon) during the programming. The Illuminati families have collected themselves into a Gen. This is an example of how the internal structuring is buttressed by some occult philosophy which will in turn buttress itself by its claim to antiquity, as if length of practice makes a mistaken superstition valid. The myths of the occult world and their symbology are very extensive. The programmers have many items to choose from as they construct the deeper internal worlds of an Illuminati slave. There is a twisted logic to many of the names they give. The Magna Mater is the sybil, the symbol of truth, a goddess who can take the form of a city in the occult world. To apply the name MAGNA MATER to a part of the mind then creates a triple or quadruple pun--we have something that can be truth, a city, a goddess, and a sybil. The programmers thrive on puns. The personification of the stages of spiritual life which are called fairies are named White Ladies, Green Ladies, and Black Ladies. Dissociated parts of the mind can be given the name Green Ladies, and then the secret meaning attached that they are fairies that connect to the system’s spiritual development. The possibilities seem endless. Since cabalism is behind much of the Illuminati programming, and double images are so important--some systems may incorporate the dual being known as Metatron on top, and Samael on the bottom. This is the occult concept that all phenomena has an essential ambivalence. This is the Gemini concept. Another Cabalistic concept that appears in programming is the silver palace also known as the silver thread that connects man to his origin and to his end. The palace in the occult world was to have secret chambers (dissociated areas in the subconscious) which hold treasure (programming truths). In the occult world’s beliefs, it has been said that the palace of glass represents the magically appearing ancestral memories of mankind from the Golden Age. In Druidism, the horse was linked to the solar wheel, which had more wheels within itself.

During programming: Concepts are linked in series, Concepts are mirrored, and Concepts are related to the whole. The function of occult symbols lends itself to such applications.

p_11-2.jpg

p_12_1.jpg

about the pic

Barbie Dolls are used for the mind-control programming. Interestingly in 1995, while fighting over Barbie dolls a 6-yr. old girl in Modesto, CA stabbed a 7-year-old playmate with a knife while telling her she was going to kill her. Police did nothing with the girl who had used the knife except to have the parents take her. One wonders what was this all about. Meanwhile Barbie Dolls have drastically changed and are now very occultic.

Chapter 12

Click here for picture

Page 275 ...

CHAPTER 12

SCIENCE No. 12-

EXTERNAL CONTROLS

Advertizing & Trauma-based programming.

The Oregonian newspaper, Sat. Mar. 9, 1996, (p. E1) ran a story about women entitled, "She sells, She purrs, she percolates, she’s a power player: Ads reflect society’s view of women." At the top right is a ad with a Marilyn Monroe type of model with puckered lips selling cigarettes. Below her is a picture of a girl with the caption, "You were born a daughter. You looked up to your mother. You looked up to your father. You looked up to everyone. You wanted to be a princess. You thought you were a princess." The themes in this article match the thinking within Monarch type programming scripts. Is this coincidence, or just a sign of the times, that so much in our lives echoes programming scripts? Some of the ads in today’s magazines are obvious manipulations of the Monarch trauma-based mind-control. For instance, Royal & Sun Alliance Insurance Group controlled by the Rothschilds had an add in a recent popular magazine which has nothing but an entire page of violet-blue haze with an eye [an allusion to the All-seeing eye] staring out of the haze along with the big caption "YOU HAVE OUR ATTENTION." This would reinforce many of the mind-control programs. Ostensibly, the ad was for insurance.

Another ad that is an obvious manipulation of mind-control programming is an Aveda ad placed in Vogue & Vanity Fair magazines, where a woman’s face is broken up into 4 pieces and put into a glass bottle along with a white daisy type flower & a yellow flower. The caption reads ‘You, bottled." the subcaption reads "what would you be if you came back as a pure-fume?" Notice the play on words that the programmers love. Another more subtle example is a Virginia Slims ad which is designed to hit the subconscious of the Monarch slave. This ad has three thrones across the top of the page. In front of the three thrones is the Virginia Slims lady. The first two thrones have a chubby queen sitting on them & the third on the far right is vacant. The 3 queens are an allusion to the 3 hierarchy queens and the maiden-mother-hidden crone sequence in programming. The queen holds a scepter which adds some more power to this as a subconscious trigger. The caption reads, "Virginia Slims remembers the shortest reign of a female monarch. Queen Katrina of Valenski was crowned at 10 past the hour, lit a cigarette at 12 past the hour and was dethroned at 13 past the hour." The hidden meaning behind this is that the front woman, remembers on a subconscious level the threat that if you don’t remember the authority & power (thrones), and the power structure (the triad), then you shall remember the programming threat. This ad subtly reinforces the programming threats to slaves. Other ads that manipulate programming. use Wizard of Oz, Alice In Wonderland and Star Wars themes. They use allusions to the programming scripts and show subtle occult symbols. The hypnotic eye is very popular in ads. Some ads simply seem to be a reflection of how our culture has become part of the programming, for instance a Sportsman device that is sold by an add with a big caption "Split personality", or a Merit cigarette ad that sells its product with the caption "Split personality." A watch ad for Bulova has an empty chair with a banner over it "Personality of the year’ and the caption "Is your watch making you a missing person?" During the programming, shifts in time certainly do make certain alters disappear, so although this ad is may not be a direct attempt to manipulate programming, it certainly is a product of today’s mind-controlled society. >>>On the next pg. is an ad appealing directly to the thinking of a programmed multiple.>>

Page 276/277

p_12_eve1.jpg

p_12_eve2.jpg

Page 278 ...

ASSET CONTROL

SURVEILLANCE.

Over the years of watching the Illuminati manage their slaves, it is clear that they like to have their slaves under constant surveillance. Often times they use friends of the slave to keep tabs. For instance, the teams that they put together are great for using to monitor other team members. If they find that the acquaintances and friends of the slave are not contributing enough, they will send out people to keep tabs on the slave. Surveillance of a slave is done either to let the slave know that he or she is being watched (obviously as an intimidation device), or is done in line with common intelligence/police type tactics. Many times the Illuminati surveillance is so obvious, that this author has to conclude that it is intentionally so. For understanding undetectable surveillance, Hollywood movies are not teaching manuals. To watch someone’s house the people working for the Illuminati will often try to maintain about 2 blocks distance. If they have to they can use battery operated bugs or bugs installed using the wiring in the house. If they want to get high-tech they can use fiber optics or even go to satellite-ground antenna monitoring of what a person is doing. If you are looking for a bug, get a counter that will go up into the higher ranges, & expect them to stick bugs away from equipment like refrigerators and air conditioners which make a lot of noise. They also have directional microphones called bionic ears which can be used to pick up outside sounds from a distance. Sophisticated filters can be placed on their listening devices to screen out background noise. Lasers beamed onto windows can be used to listen to conversations within a building, but these have the drawbacks of picking up building noises, & noises from the street. Laser listening devices are going to function better at night. Telephone taps are commonly done by the Network to control and monitor their slaves. There are low-tech and high-tech ways to do this. The bottom line is that all telephone conversations in this nation (U.S.), all CB-radio traffic, all radio traffic has been totally monitored since before the 1970’s. It is a given that anything you say on the telephone will be fed into a large computer which has words to watch for. Unless you believe you are a high-profile person, who is monitored 24-hours a day, it is best to stay away from mentioning trigger words in your conversation. Often times, the people monitoring slaves team trail the slave. Teams of people can track a person on foot or in a car. Using a team is the best method in many situations. Often they tag team follow a person. They also have team formations that are used to keep track of a person, such as one person on the opposite side of the street, and one immediately behind and one far behind. Having a distant tracker allows the close one to avoid being caught if the slave tries to take evasive action or to ambush the stalker.

If the person watching the slave gets really concerned they may end up using special headlights called "blackout lights" to shadow the slave at night, which are shielded to keep the beams of light from showing in front or to the side of the car. These special lights light up the road in front of the car only, so the car remains unseen by the stalked mind-controlled victim. There are a number of secret devices to aid the abusers in their control over environment that the slave must live in. The intelligence groups often use a radio device called AGENT ALERT which looks like a ballpoint pen which sends out a continual beeping when it is activated. Besides their Global Positioning Satellites, intelligence has Pegasus, a ship that can monitor & record electronic transmissions while sailing offshore. After reading the mind-control significance of Pegasi, it clearer the Navy picked an appropriate horse to record electronic transmissions. Even though all slaves have Reporting Alters, & are tracked in other ways, the Illuminati often has redundant safety features to monitor their "human assets". Because the slave is monitored from so many different unseen methods, it does begin to seem hopeless to some to ever be free of Big Brother. If you add to all this, that the slave has been programmed repeatedly that there is no escaping their All-seeing eyes, then it is easy to see why so many slaves acquiesce & just comply. A Vol. 2 reader, who caught onto to what the book is about, pointed out how the new film The Juror reflects their approach to control. The movie shows a controller who is obsessed with who he is controlling. This holds true in real life for the programmers too. Even though Dr. Mengele programmed thousands of people in his lifetime, he had his "pets" (Lieblings), pet slaves that he was obsessed with. In the movie, the controller says, "Do what I say." and "If I can keep you scared, I can save your life." These could have come straight out of a programmer’s mouth. He picks out a juror who is creative & intelligent to control, which are the criteria for selecting victims in real life. The movie illustrates some of the concepts which actually happen that this chapter 12 is trying to describe.

HARASSMENT

One of the things that the Network does to any slave that tries to break free, and the Illuminati does to any of their hierarchy slaves (like this book’s co-author Cisco) who tries to get free is to harass them constantly. Stephen Knight who researched the Freemasons wrote a chapter in his book The Brotherhood, The Secret World of the Freemasons about how they harass any opposition. (See chapter 16, pp. 140-149). When Knight interviewed

Page 279 ...

ex-Masons they were in abject fear of the Masonic system. They didn’t even want to talk about how much power the Freemasons have to ruin careers, spy, and harass people. Since Knight’s book is available for the reader, and since there are a number of books (like those from Loompanics) that are very detailed on harassment techniques, this book will only briefly touch on the subject. However, just because it is only briefly mentioned please don’t mistakingly think this is a minor topic. The Illuminati and their co-workers the Freemasons, the Mishpucka, and CIA put outrageously great amounts of efforts into harassment. It is not unusual for a recovering victim of mind-control to find their favorite pet killed, or human faeces in their oven, and other bizarre harassments that show the warped character of the controllers. The CIA, the Masonic leaders, and the Mishpucka keep extensive files on everyone for purposes of blackmail, and coercion. The masonic leadership of Freemasonry in a given area will have thousands of "blackmail" files on essentially everyone of importance in their area. Upper echelon people such as judges, lawyers, and politicians are generally controlled via IRS infringements, and many of the lower echelon people are controlled through weird sexual items. This is where the Delta and Beta Monarch slaves are so helpful to the Illuminati. The Freemasons can have a sexual alter seduce a man, contrive a scene, and then an alter that is in a death trance takes the body so that the target of blackmail thinks he has killed the woman. It works great for blackmail. (This information comes from several witnesses who are informed about the blackmail files & the their methods for blackmailing.)


Yüklə 0,58 Mb.

Dostları ilə paylaş:
1   ...   37   38   39   40   41   42   43   44   45




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©genderi.org 2024
rəhbərliyinə müraciət

    Ana səhifə