27.07.2013 Views

The Illuminati Formula Used to Create an ... - Get a Free Blog

The Illuminati Formula Used to Create an ... - Get a Free Blog

The Illuminati Formula Used to Create an ... - Get a Free Blog

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

a. <strong>The</strong> Ribbons eat from the system’s internal "Tree of Good <strong>an</strong>d Evil",<br />

b. Ribbon programming consists of several things--where they reside, who they are <strong>an</strong>d<br />

what they are <strong>to</strong> protect.,<br />

c. Ribbons must protect the computers in order <strong>to</strong> protect their own life. <strong>The</strong> Ribbons will<br />

be programmed <strong>to</strong> believe that reversing the computer will reverse the Ribbons’ life. <strong>The</strong><br />

ribbons themselves operate with mech<strong>an</strong>ical hearts (not hum<strong>an</strong> hearts).<br />

<strong>The</strong> cover s<strong>to</strong>ries may include the following: All Ribbons are hid behind a little girl, who is<br />

a front for them & who tells the creation s<strong>to</strong>ry. <strong>The</strong> little girl will tell the creation s<strong>to</strong>ry<br />

which included the Ribbons. Behind her runs a silver cord. <strong>The</strong> silver cord has <strong>to</strong> do with<br />

heart programming. <strong>The</strong> silver cord has 3 str<strong>an</strong>ds that c<strong>an</strong>not be broken as per ECL 4:12.<br />

This silver cord goes off if the Ribbons are <strong>to</strong>uched. Ribbons are set up so that suicide<br />

programming is triggered if they are cut.<br />

Actually, French braiding conceals a 4th str<strong>an</strong>d. In review as stated, during the<br />

programming, a box with colored scarf's was shown the child while severe electro-shock<br />

was given <strong>to</strong> the body. A colored scarf represents a ribbon which runs a message from a<br />

colored room <strong>to</strong> a similar colored alter.<br />

In a System which is structured in<strong>to</strong> families <strong>an</strong>d cities <strong>an</strong>d worlds <strong>an</strong>d sections, these<br />

"geographically different" structures in the mind of the victim c<strong>an</strong> be connected via the<br />

color coding. In other words, the alters are structured in<strong>to</strong> a 3-D cube structure. <strong>The</strong>n a<br />

fourth dimension (the color coding) is added <strong>to</strong> tie in all of the three dimensions. A<br />

central computer was placed in at the bot<strong>to</strong>m of the mind. Using various techniques the<br />

victim is brought <strong>to</strong> the deepest altered state possible, <strong>an</strong>d a computer is built in<strong>to</strong> the<br />

mind via hypnosis <strong>an</strong>d alters. This c<strong>an</strong> be done by freezing the entire body <strong>an</strong>d just<br />

keeping the head active. Or it c<strong>an</strong> be done by bringing the body <strong>to</strong> a coma<strong>to</strong>se state<br />

where the heart is beating faintly. This step c<strong>an</strong> only be done under the strictest medical<br />

supervision.<br />

<strong>The</strong> memory s<strong>to</strong>rage area for the computers include the Emerald City Library (staying<br />

with the Wizard of Oz theme) which contains alters who's only function is <strong>to</strong> memorize &<br />

retain with pho<strong>to</strong>graphic memories pages <strong>an</strong>d pages of information. <strong>The</strong> layout with<br />

codes of the entire system c<strong>an</strong> be s<strong>to</strong>red in a s<strong>to</strong>rage b<strong>an</strong>k, so the programmer could<br />

access this area if his own records were lost. <strong>The</strong> libraries contain the his<strong>to</strong>rical<br />

genealogies of sat<strong>an</strong>ic iniquity from early <strong>an</strong>cient times <strong>to</strong> present. This <strong>an</strong>cient occult<br />

information has been reported by at least half a dozen <strong>Illuminati</strong> slaves as being retained<br />

internally by demons.<br />

How Monarch Slaves Are Designed To Interface With <strong>The</strong> Unix System Of <strong>The</strong><br />

Beast Computers<br />

In line with what is being done by the <strong>Illuminati</strong> around the world with their network of<br />

computers--the computers have access codes similar <strong>to</strong> 666 666 666, <strong>an</strong>d back out <strong>an</strong>d<br />

close down codes similar <strong>to</strong> 999 999 999. <strong>The</strong>se are the codes that the UNIX universal<br />

system uses, <strong>an</strong>d the Monarch slaves are being created with codes that interface with the<br />

UNIX system for computers. (On some systems if the computer is shutdown it will<br />

request <strong>an</strong> input code of 666fff666fff666fff666...This c<strong>an</strong> then be reversed<br />

F6F6F6F6F6F6F6F6F6F6).<br />

<strong>The</strong> UNIX system is being used <strong>to</strong> allow the New World Order’s big BEAST computers <strong>to</strong><br />

communicate with <strong>an</strong>y known computer, including the minds of their Monarch mindcontrolled<br />

slaves. In the 1960s, the U.S. Department of Defense beg<strong>an</strong> linking computers<br />

<strong>to</strong>gether in<strong>to</strong> a superhighway now developed in<strong>to</strong> the Internet. Hundreds of thous<strong>an</strong>ds of<br />

113

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!