27.07.2013 Views

The Illuminati Formula Used to Create an ... - Get a Free Blog

The Illuminati Formula Used to Create an ... - Get a Free Blog

The Illuminati Formula Used to Create an ... - Get a Free Blog

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

World Dolls, <strong>an</strong>d its theme song. Some of Wizard of Oz <strong>an</strong>d the Cinderella programming<br />

was also done at Disneyl<strong>an</strong>d using costumes. Preverbal children are taken <strong>to</strong> Disneyl<strong>an</strong>d<br />

<strong>to</strong> get them ready for the scripts.<br />

* Disneyworld, FL - Disneyworld was created as the eastern counterpart <strong>to</strong> the<br />

Disneyl<strong>an</strong>d programming site. One of the rides in Disneyworld plays "It’s a small, small<br />

world" which is Disneyl<strong>an</strong>d developed programming theme.<br />

* Ft. Campbell, KT - Base programs are placed in here.<br />

* Ft. Detrick, MD - involved with medical/biological experimentation.<br />

* Ft. Holabird, MD - This site is no longer in existence, but was the Army Intelligence<br />

School. CIC used the school. <strong>The</strong> place was known as "the Bird."<br />

* Ft. Hood, TX - programming involving military uses of Delta Monarch slaves was done<br />

here.<br />

* Ft. Huahuachua, AZ - HQ for Army Intelligence.<br />

* Ft. Knox, KT - <strong>The</strong> 1st Earth Batt. was developed here.<br />

* Ft. Lewis, WA - involved with the Psychic warfare part of the Monarch Programming.<br />

* Ft. McClellen - Ft. Meade, MD - <strong>The</strong> National Security Agency was created on 4 Nov<br />

1952. Its headquarters were Fort Meade, VA. <strong>The</strong> National Security Agency (NSA)<br />

employs tens of thous<strong>an</strong>ds of employees <strong>an</strong>d has a budget larger th<strong>an</strong> the CIA. It has<br />

also been kept far more secret, while the CIA has been used as the fall guy <strong>to</strong> protect the<br />

National Security Agency’s reputation. In the late 1960’s, under Operation Minaret <strong>an</strong>d<br />

Program Shamrock, the NSA <strong>an</strong>d its British counterpart GCHQ beg<strong>an</strong> moni<strong>to</strong>ring much of<br />

the communication within the USA <strong>an</strong>d UK.<br />

<strong>The</strong> NSA moni<strong>to</strong>rs all americ<strong>an</strong> calls via computers using trip words, specific names,<br />

specific addresses, specific telephone numbers, etc. NSA has several computer <strong>to</strong> record<br />

all the millions of conversations which the computers have examined <strong>an</strong>d deemed worthy<br />

of recording. How the NSA c<strong>an</strong> get <strong>an</strong>y use out of millions of recorded telephone<br />

conversations is beyond me? What intelligence agency could adequately process so much<br />

information?<br />

<strong>The</strong>se org<strong>an</strong>izations now moni<strong>to</strong>r all communications within both countries. At least one<br />

congressm<strong>an</strong> got upset that his phone was bugged by the NSA. (see David Corn’s article,<br />

"<strong>The</strong> case of the bugged sena<strong>to</strong>r" in Nation, Feb. 6, ð89, p. 152).<br />

NSA has developed a fiberoptics network called Internet computer network. An or<strong>an</strong>ge<br />

book is used <strong>to</strong> specify some of the NSA’s security levels.<br />

An inform<strong>an</strong>t in the National Security Agency states that establishment newspapers like<br />

the Wall Street Journal <strong>an</strong>d the New York Times are used <strong>to</strong> communicate secret<br />

messages which are placed within w<strong>an</strong>t ads, buzz words in edi<strong>to</strong>rials, <strong>an</strong>d via other<br />

methods. Because of some of what this person <strong>to</strong>ld me, I have given some possible<br />

examples in this newsletter of how people might be using the papers for secret messages.<br />

For inst<strong>an</strong>ce using Michael Jackson with his h<strong>an</strong>ds making some type of sign might be a<br />

signal. M<strong>an</strong>fried Adler <strong>an</strong>d the US Senate Committee investigating the CIA found that 90%<br />

of the CIA’s secret messages are tr<strong>an</strong>smitted via the media, with the aid of coded texts<br />

<strong>an</strong>d pictures.<br />

134

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!