The Illuminati Formula Used to Create an ... - Get a Free Blog
The Illuminati Formula Used to Create an ... - Get a Free Blog
The Illuminati Formula Used to Create an ... - Get a Free Blog
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
programming) creates "children" by "spinning". <strong>The</strong> "child" spins off. When the "child" is<br />
finished it is "killed" in UNIX lingo.<br />
When the programmers created child processes in the computer, they were having<br />
problems with the child processes killing the parent processes. <strong>The</strong> same type of<br />
problems have had <strong>to</strong> be dealt with in the Monarch programming. <strong>The</strong> initial programmer<br />
is often the biological parent of the child, <strong>an</strong>d this parent is very responsible for extreme<br />
<strong>to</strong>rtures being applied <strong>to</strong> the child who is being programmed--not <strong>to</strong> mention all of the<br />
expendible children, who are killed in front of the child <strong>to</strong> highlight the reality of the<br />
trauma. <strong>The</strong> natural reaction of the child being created is <strong>to</strong> hate the programmer.<br />
Naturally, the Monarch programming had <strong>to</strong> overcome that natural tendency, which it<br />
does very successfully. <strong>The</strong> UNIX system uses <strong>an</strong> internal clock within its computer<br />
system. <strong>The</strong> UNIX clock is called CRON. CRON checks files <strong>to</strong> see if the programmer has<br />
put in <strong>an</strong>y files <strong>to</strong> run. <strong>The</strong> UNIX system uses data bus lines, which are like the Monarch<br />
programming ribbons, which go through the system. <strong>The</strong>se ribbons or data bus lines take<br />
information <strong>an</strong>d comm<strong>an</strong>ds from the computers <strong>to</strong> other computers.<br />
Within the UNIX system, insiders have revealed that the Daemon (Demon) processes of<br />
all the UNIX systems have a security flaw. That flaw is that the Postmaster Daemon has<br />
access <strong>to</strong> them in spite of who the god is of that particular UNIX computer system. So<br />
while owners, who purchase UNIX systems think that they have exclusive control over<br />
their system, <strong>an</strong> external Postmaster Daemon coming from the Beast could use its<br />
permission levels <strong>to</strong> over ride the power of the local owner of the system.<br />
<strong>The</strong> Monarch system has a similar feature, the <strong>Illuminati</strong> programmers know how <strong>to</strong><br />
access the base or primal <strong>an</strong>chors <strong>to</strong> the programming <strong>an</strong>d y<strong>an</strong>k out <strong>an</strong>y programming<br />
they w<strong>an</strong>t. All the slaves of these lesser groups such as the CIA, Church of Sat<strong>an</strong>, Mafia,<br />
etc. c<strong>an</strong> all be reprogrammed rather quickly <strong>to</strong> serve the <strong>Illuminati</strong>, if they are not<br />
already due <strong>to</strong> the <strong>Illuminati</strong> programmers extra knowledge on how <strong>to</strong> get in<strong>to</strong> the base<br />
programming. In these m<strong>an</strong>y ways, the UNIX system serves both real computers <strong>an</strong>d<br />
also for the internal computers of some slaves’ mind.<br />
<strong>The</strong> slave’s system becomes a computer system. It functions as a series of computers<br />
that are connected <strong>to</strong> the master computer which is sunk in<strong>to</strong> the mind at the lowest<br />
hypnotic level, which is a level often placed even below <strong>an</strong> internal "hell pit". To access<br />
the different computers, combinations of cards were used for the codes (numbers are<br />
also used. See Chapter 4.). Various parts of a Monarch system correspond <strong>to</strong> what <strong>an</strong>y<br />
computer would have. A microprocessor register has 3 sections on a computer <strong>to</strong> make it<br />
functional. In Monarch Systems, you would find these 3 represented by 1. s<strong>to</strong>red data in<br />
the library <strong>an</strong>d alters with pho<strong>to</strong>graphic memories, 2. <strong>an</strong> instruction section with codes,<br />
<strong>an</strong>d 3. stacking mech<strong>an</strong>isms.<br />
Linked <strong>to</strong> all this were a crystal, clock, hour glasses, a compass <strong>an</strong>d <strong>an</strong> entire demonic<br />
comm<strong>an</strong>d structure. <strong>The</strong> eye in front of the big computer will be protected by legions of<br />
spirits. <strong>The</strong> front big computer runs front quadr<strong>an</strong>ts <strong>an</strong>d the back computer runs the<br />
deeper quadr<strong>an</strong>ts.<br />
<strong>The</strong> software so <strong>to</strong> speak for the Omega programming (computer) may be set up <strong>to</strong><br />
include a stacking program called the Potter’s Wheel. <strong>The</strong> Potter’s Wheel is a misuse of<br />
the Bible, <strong>an</strong>d is a type of programming that the Charismatic/pentecostal movement<br />
carries out. <strong>The</strong> Mormons <strong>an</strong>d the Catholics have their own distinctive "software"<br />
programs.<br />
An initial stacking mech<strong>an</strong>ism would work by telling alters <strong>to</strong> "St<strong>an</strong>d in Order according <strong>to</strong><br />
r<strong>an</strong>k <strong>an</strong>d serial no." Another code along with a h<strong>an</strong>d signal would place the Gatekeeper<br />
116