13.10.2012 Views

Monarch-mind-control

Monarch-mind-control

Monarch-mind-control

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

chapter_1<br />

The UNIX system is being used to allow the New World Order’s big<br />

BEAST computers to communicate with any known computer,<br />

including the <strong>mind</strong>s of their <strong>Monarch</strong> <strong>mind</strong>-<strong>control</strong>led slaves. In the<br />

1960s, the U.S. Department of Defense began linking computers<br />

together into a superhighway now developed into the Internet.<br />

Hundreds of thousands of computers around the world are tied in. Like<br />

buildings in a city, each computer has its own unique address. Most of<br />

these addresses are registered at the Network Information Center in<br />

Menlo Park, CA. Individuals can also be registered at the NIC too.<br />

The U.S. Military links into the system with their Arpanet and Milnet<br />

networks, which tie together such divergent things as MIT computers,<br />

West Point computers, NORAD computers, Alr Force Systems<br />

Command Space Division computers at El Segundo, CA and U.S.<br />

Army DARCOM at Seckenheim, Ger. (to name a few). These are all<br />

being tied together to form one vast electronic brain.<br />

There are nine secret BEAST computers of the New World Order, at<br />

the time this was written. "Big Bertha" is the nickname of the BEAST<br />

computer located at the secret military installation called Dreamland at<br />

the secret Groom Lake, NV test site facility. Papoose Lake is referred<br />

to as S-4. The other super-secret facilities in the area are named S-2,<br />

8-6, and S-66. This area has become the Illuminati’s prime<br />

programming facility for turning out <strong>Monarch</strong> slaves, and the <strong>Monarch</strong><br />

slaves which are turned out from this area have turned out to be the<br />

worst basket cases. In other words the programming is very severe<br />

which is carried out in this area. This area has also been used for the<br />

space program, for the U-2 & SR-71, for the CIA’s A-12 spy plane,<br />

for the Stealth fighters (Lockheed F-1 17A Attack plane) and bombers,<br />

the Aurora, and for the U.S. government’s "Above Top Secret" flying<br />

saucers. The Big Bertha computer (named after the Illuminati<br />

Mother-of-Darkness Bertha Krupp) can be talked to in half a dozen<br />

languages and will answer a person back in the language they speak.<br />

On a daily basis, airplanes fly into the Groom Lake facility. The<br />

callname of flights bringing workers and people go by the call name<br />

"Janet". About 12 Janet flights come into the facility everyday. These<br />

flights are usually Boeing 737s and arrive from places like a secure<br />

http://mercury.spaceports.com/~persewen/fritz/fritz-ch11-1.html (17 of 32) [7/15/2000 8:09:34 PM]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!