27.07.2013 Views

The Illuminati Formula Used to Create an ... - Get a Free Blog

The Illuminati Formula Used to Create an ... - Get a Free Blog

The Illuminati Formula Used to Create an ... - Get a Free Blog

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

programming) creates "children" by "spinning". <strong>The</strong> "child" spins off. When the "child" is<br />

finished it is "killed" in UNIX lingo.<br />

When the programmers created child processes in the computer, they were having<br />

problems with the child processes killing the parent processes. <strong>The</strong> same type of<br />

problems have had <strong>to</strong> be dealt with in the Monarch programming. <strong>The</strong> initial programmer<br />

is often the biological parent of the child, <strong>an</strong>d this parent is very responsible for extreme<br />

<strong>to</strong>rtures being applied <strong>to</strong> the child who is being programmed--not <strong>to</strong> mention all of the<br />

expendible children, who are killed in front of the child <strong>to</strong> highlight the reality of the<br />

trauma. <strong>The</strong> natural reaction of the child being created is <strong>to</strong> hate the programmer.<br />

Naturally, the Monarch programming had <strong>to</strong> overcome that natural tendency, which it<br />

does very successfully. <strong>The</strong> UNIX system uses <strong>an</strong> internal clock within its computer<br />

system. <strong>The</strong> UNIX clock is called CRON. CRON checks files <strong>to</strong> see if the programmer has<br />

put in <strong>an</strong>y files <strong>to</strong> run. <strong>The</strong> UNIX system uses data bus lines, which are like the Monarch<br />

programming ribbons, which go through the system. <strong>The</strong>se ribbons or data bus lines take<br />

information <strong>an</strong>d comm<strong>an</strong>ds from the computers <strong>to</strong> other computers.<br />

Within the UNIX system, insiders have revealed that the Daemon (Demon) processes of<br />

all the UNIX systems have a security flaw. That flaw is that the Postmaster Daemon has<br />

access <strong>to</strong> them in spite of who the god is of that particular UNIX computer system. So<br />

while owners, who purchase UNIX systems think that they have exclusive control over<br />

their system, <strong>an</strong> external Postmaster Daemon coming from the Beast could use its<br />

permission levels <strong>to</strong> over ride the power of the local owner of the system.<br />

<strong>The</strong> Monarch system has a similar feature, the <strong>Illuminati</strong> programmers know how <strong>to</strong><br />

access the base or primal <strong>an</strong>chors <strong>to</strong> the programming <strong>an</strong>d y<strong>an</strong>k out <strong>an</strong>y programming<br />

they w<strong>an</strong>t. All the slaves of these lesser groups such as the CIA, Church of Sat<strong>an</strong>, Mafia,<br />

etc. c<strong>an</strong> all be reprogrammed rather quickly <strong>to</strong> serve the <strong>Illuminati</strong>, if they are not<br />

already due <strong>to</strong> the <strong>Illuminati</strong> programmers extra knowledge on how <strong>to</strong> get in<strong>to</strong> the base<br />

programming. In these m<strong>an</strong>y ways, the UNIX system serves both real computers <strong>an</strong>d<br />

also for the internal computers of some slaves’ mind.<br />

<strong>The</strong> slave’s system becomes a computer system. It functions as a series of computers<br />

that are connected <strong>to</strong> the master computer which is sunk in<strong>to</strong> the mind at the lowest<br />

hypnotic level, which is a level often placed even below <strong>an</strong> internal "hell pit". To access<br />

the different computers, combinations of cards were used for the codes (numbers are<br />

also used. See Chapter 4.). Various parts of a Monarch system correspond <strong>to</strong> what <strong>an</strong>y<br />

computer would have. A microprocessor register has 3 sections on a computer <strong>to</strong> make it<br />

functional. In Monarch Systems, you would find these 3 represented by 1. s<strong>to</strong>red data in<br />

the library <strong>an</strong>d alters with pho<strong>to</strong>graphic memories, 2. <strong>an</strong> instruction section with codes,<br />

<strong>an</strong>d 3. stacking mech<strong>an</strong>isms.<br />

Linked <strong>to</strong> all this were a crystal, clock, hour glasses, a compass <strong>an</strong>d <strong>an</strong> entire demonic<br />

comm<strong>an</strong>d structure. <strong>The</strong> eye in front of the big computer will be protected by legions of<br />

spirits. <strong>The</strong> front big computer runs front quadr<strong>an</strong>ts <strong>an</strong>d the back computer runs the<br />

deeper quadr<strong>an</strong>ts.<br />

<strong>The</strong> software so <strong>to</strong> speak for the Omega programming (computer) may be set up <strong>to</strong><br />

include a stacking program called the Potter’s Wheel. <strong>The</strong> Potter’s Wheel is a misuse of<br />

the Bible, <strong>an</strong>d is a type of programming that the Charismatic/pentecostal movement<br />

carries out. <strong>The</strong> Mormons <strong>an</strong>d the Catholics have their own distinctive "software"<br />

programs.<br />

An initial stacking mech<strong>an</strong>ism would work by telling alters <strong>to</strong> "St<strong>an</strong>d in Order according <strong>to</strong><br />

r<strong>an</strong>k <strong>an</strong>d serial no." Another code along with a h<strong>an</strong>d signal would place the Gatekeeper<br />

116

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!