The Illuminati Formula Used to Create an ... - Get a Free Blog
The Illuminati Formula Used to Create an ... - Get a Free Blog
The Illuminati Formula Used to Create an ... - Get a Free Blog
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
computers around the world are tied in. Like buildings in a city, each computer has its<br />
own unique address. Most of these addresses are registered at the Network Information<br />
Center in Menlo Park, CA. Individuals c<strong>an</strong> also be registered at the NIC <strong>to</strong>o. <strong>The</strong> U.S.<br />
Military links in<strong>to</strong> the system with their Arp<strong>an</strong>et <strong>an</strong>d Milnet networks, which tie <strong>to</strong>gether<br />
such divergent things as MIT computers, West Point computers, NORAD computers, Air<br />
Force Systems Comm<strong>an</strong>d Space Division computers at El Segundo, CA <strong>an</strong>d U.S. Army<br />
DARCOM at Seckenheim, Ger. (<strong>to</strong> name a few). <strong>The</strong>se are all being tied <strong>to</strong>gether <strong>to</strong> form<br />
one vast electronic brain.<br />
<strong>The</strong>re are nine secret BEAST computers of the New World Order, at the time this was<br />
written. "Big Bertha" is the nickname of the BEAST computer located at the secret<br />
military installation called Dreaml<strong>an</strong>d at the secret Groom Lake, NV test site facility.<br />
Papoose Lake is referred <strong>to</strong> as S-4. <strong>The</strong> other super-secret facilities in the area are<br />
named S-2, 8-6, <strong>an</strong>d S-66. This area has become the <strong>Illuminati</strong>’s prime programming<br />
facility for turning out Monarch slaves, <strong>an</strong>d the Monarch slaves which are turned out from<br />
this area have turned out <strong>to</strong> be the worst basket cases. In other words the programming<br />
is very severe which is carried out in this area. This area has also been used for the<br />
space program, for the U-2 & SR-71, for the CIA’s A-12 spy pl<strong>an</strong>e, for the Stealth<br />
fighters (Lockheed F-1 17A Attack pl<strong>an</strong>e) <strong>an</strong>d bombers, the Aurora, <strong>an</strong>d for the U.S.<br />
government’s "Above Top Secret" flying saucers. <strong>The</strong> Big Bertha computer (named after<br />
the <strong>Illuminati</strong> Mother-of-Darkness Bertha Krupp) c<strong>an</strong> be talked <strong>to</strong> in half a dozen<br />
l<strong>an</strong>guages <strong>an</strong>d will <strong>an</strong>swer a person back in the l<strong>an</strong>guage they speak.<br />
On a daily basis, airpl<strong>an</strong>es fly in<strong>to</strong> the Groom Lake facility. <strong>The</strong> call name of flights<br />
bringing workers <strong>an</strong>d people go by the call name "J<strong>an</strong>et". About 12 J<strong>an</strong>et flights come<br />
in<strong>to</strong> the facility everyday. <strong>The</strong>se flights are usually Boeing 737s <strong>an</strong>d arrive from places<br />
like a secure terminal run by EG&G at McCarr<strong>an</strong> Airport in Las Vegas <strong>an</strong>d from the<br />
military’s Palmdale, CA facility. <strong>The</strong>se 737s are unmarked except for a red stripe running<br />
down the fuselage. Large military C-130 arrive with cargo, <strong>an</strong>d <strong>Illuminati</strong> dignitaries<br />
arrive in smaller twin-engine craft. Victims for the programming are brought in via pl<strong>an</strong>es,<br />
& other routes.<br />
One of the BEAST computers occupies three floors of the headquarters of the Europe<strong>an</strong><br />
Economic Community building in Brussels, not far from the import<strong>an</strong>t <strong>Illuminati</strong> Motherof-Darkness<br />
worldwide headquarters castle near the Fr.-Bel. border near Muno, Belgium.<br />
Another BEAST computer is in Luxembourg. In observing the operations of the <strong>Illuminati</strong>,<br />
it has been seen that telephone area codes are used as part of a mind-controlled slave’s<br />
code. We do not underst<strong>an</strong>d everything about their codes, but it does tie in with other<br />
things that are happening.<br />
Every person in the world has been assigned <strong>an</strong> 18 digit tracking number, which consists<br />
of 3 groups of 6 numbers. <strong>The</strong> first 3 numbers assigned in the BEAST computer <strong>to</strong><br />
everyone are 666. <strong>The</strong> next is one’s national code. <strong>The</strong> U.S. national code is 110. <strong>The</strong>n<br />
the next 3 numbers are your telephone area code, <strong>an</strong>d then finally your 9 digit Social<br />
Security number. <strong>The</strong> code then is 666 + Nation code + Tel. area code + social security<br />
no. = BEAST I.D. no. for <strong>an</strong> individual.<br />
According <strong>to</strong> Dwight Kinm<strong>an</strong>’s book <strong>The</strong> World’s Last Dicta<strong>to</strong>r, 2nd ed., (Woodburn, OR:<br />
Solid Rock Books, p. 256) VISA has already begun issuing VISA cards using the BEAST<br />
18 digit number. When <strong>an</strong> Americ<strong>an</strong> makes a b<strong>an</strong>k tr<strong>an</strong>saction on <strong>an</strong> au<strong>to</strong>teller within a<br />
matter of seconds the BEAST has been informed of the activity. <strong>The</strong>se computers use<br />
UNIX.<br />
<strong>The</strong> particular programs for the economic tr<strong>an</strong>sactions just described are a worldwide<br />
computer network called SWIFT (Society For Worldwide Interb<strong>an</strong>k Fin<strong>an</strong>cial Tr<strong>an</strong>sactions).<br />
<strong>The</strong> SWIFT works off of the UNIX system <strong>an</strong>d c<strong>an</strong> communicate with <strong>an</strong>y computer. It<br />
114